Blogs Jacob Appelbaum says that a number of Tor's development projects are inspired by the needs of the people that Tor works with around the world. Many of these people are working on the front lines of human rights and political activism. “When working with Laura Poitras it became clear that there were key areas where improving her ability to use anonymity and encryption software would greatly strengthen her ability to continue her work. 4chan's Chris Poole: Facebook & Google Are Doing It Wrong Chris Poole delivered the most powerful 10 minutes of Web philosophy of the afternoon at Web 2.0. The man formerly known as moot - founder of anonymous image sharing den 4chan and its new, better-lit cousin, Canvas, gave us a rousing and principled picture of what the big players get wrong about online identity. "Google and Facebook would have you believe that you're a mirror," he said, "but in fact, we're more like diamonds." - multi-faceted. It was an appeal reminiscent of the one he gave at SXSW earlier this year, but it hit harder. Google Plus has since arrived, and Poole says it's even worse than Facebook for the future of online identity. Identity Is Prismatic
Operation Mesh - Pirate Party of Canada This operation mentioned in the media: Introduction and Summary Instructions Operation Mesh is a world wide effort to establish anonymous wireless mesh networks through the use of the B.A.T.M.A.N. mesh networking protocol, I2P (a garlic routing anonymity network), and torrents. If you own a wireless router, chances are that you can hack it and turn it into a mesh network node with relative ease. This article aims to provide documentation on this process in addition to information useful for wireless mesh networking and general anonymity. 2001 : Using the Internet for Activism: listservs and web pages Using the Internet for Activism: As for getting the word out in general, here are a few guidelines on how to use the net effectively... Websites are not good for announcements of things because people don't keep going back to check the same website often.
The Evolution of People-Powered Markets: 60 Resources There is a growing movement towards peer-to-peer value exchange and production, prompted by a variety of things, like economic conditions, shifting cultural values, exploration into collective intelligence, and further enabled by social technologies. I’ve been tracking the online marketplaces that have been cropping up for sharing, swapping, gifting and renting, as well as sites that give people different kinds of opportunity to share skills and knowledge, innovate, and work collaboratively both on and offline. Below are a few sites I’ve come across, please add any I’ve missed. People-Powered Markets for Gifting / Sharing / Swapping / Renting / Value Exchange What sites have you seen that are offering new ways to exchange or create value?
Mitch Altman: The Hacker Lifestyle Mitch Altman at Chaos Communication Camp, Berlin, August 2011 When he was young, Mitch Altman didn’t like himself. Too much of an introverted geek, too ugly, too queer, in every sense of that word. Today, the first thing that strikes you when you meet him in person is the serenity that emanates from the man. These days Mitch is a respected figure in the hacker community.
Obvious ideas are better than original ideas - Entrepreneur Question: What can you sit on, sleep on, and brush your teeth with? The answer to the riddle is at the end of the post. Think about it while you read on or scroll down if you are really curious. Some people are always looking for great ideas. Original ideas.
Darknet Project "A group of Internet activists gathered last week in an Internet Relay Chat (IRC) channel to begin planning an ambitious project—they hope to overcome electronic surveillance and censorship by creating a whole new Internet. The group, which coordinates its efforts through the Reddit social networking site, calls its endeavor The Darknet Project (TDP). The goal behind the project is to create a global darknet, a decentralized web of interconnected wireless mesh networks that operate independently of each other and the conventional internet. In a wireless mesh network, individual nodes can relay data for other nodes, ensuring that the routing of data remains robust as nodes on the network are added and removed. Designing Effective Action Alerts for the Internet An action alert is a message that someone sends out to the net asking for a specific action to be taken on a current political issue. Well-designed action alerts are a powerful way to invite people to participate in the processes of a democracy. Having seen many action alerts in my years on the Internet, I have tried to abstract some guidelines for people who wish to use them. Even if you do not plan to construct any action alerts yourself, I do not recommend that you forward anybody else's alerts unless they conform to at least the spirit of these guidelines. If I sometimes seem stern or didactic in my prescriptions, please forgive me. It's just that I've seen badly designed action alerts do an awful lot of damage.
SixthSense - a wearable gestural interface (MIT Media Lab) 'SixthSense' is a wearable gestural interface that augments the physical world around us with digital information and lets us use natural hand gestures to interact with that information. We've evolved over millions of years to sense the world around us. When we encounter something, someone or some place, we use our five natural senses to perceive information about it; that information helps us make decisions and chose the right actions to take. But arguably the most useful information that can help us make the right decision is not naturally perceivable with our five senses, namely the data, information and knowledge that mankind has accumulated about everything and which is increasingly all available online. Although the miniaturization of computing devices allows us to carry computers in our pockets, keeping us continually connected to the digital world, there is no link between our digital devices and our interactions with the physical world.
How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did Target has got you in its aim Every time you go shopping, you share intimate details about your consumption patterns with retailers. And many of those retailers are studying those details to figure out what you like, what you need, and which coupons are most likely to make you happy. Target, for example, has figured out how to data-mine its way into your womb, to figure out whether you have a baby on the way long before you need to start buying diapers.
I2P The software is free and open source and is published under multiple licenses. The name I2P is derived from Invisible Internet Project, which, in pseudo-mathematical notation, is represented as I²P. Technical design