background preloader

The Internet Defense League - Protecting the Free Internet since 2012.

The Internet Defense League - Protecting the Free Internet since 2012.

About | When It Comes to Human Rights, There Are No Online Security Shortcuts | Threat Level Photo courtesy Benetech As one of people who built Martus, an encrypted database used by thousands of human rights activists around the world, I routinely confront the needs of users who are not in wealthy countries, as well as the difficult problem that creating real, easy-to-use security poses. My thoughts here are focused on the democracy activists, citizen journalists, and human rights workers in the world’s toughest political environments. These are our Martus users, and my colleagues and friends. Patrick Ball has spent over 20 years applying scientific measurement to human rights. One thing that makes that already difficult situation worse, though, is when otherwise well-informed people give bad advice about what is and is not secure. My concerns stem from a sharp debate over software called CryptoCat – a debate spurred largely by an admiring profile at Wired. Seems great, right? Well, not so great. But there’s a problem. Good security is about not trusting people.

The GDELT Project La Télé-démocratie 1Depuis les « techno-discours » qui, « à des niveaux culturels et idéologiques très divers, viennent activer et dynamiser la puissance de la technique, en célébrant ses vertus et presque son culte » (Janicaud, 1985) jusqu'aux analyses très ponctuelles consacrées à telle ou telle expérience, les nouvelles technologies de la communication ont engendré toute une gamme de discours prospectifs et/ou récapitulatifs qui méritent l'attention. Parmi eux, nombreux sont ceux qui portent plus spécialement sur les implications que ces technologies peuvent avoir dans le domaine politique. En particulier, leurs relations avec une amélioration éventuelle du fonctionnement de la démocratie ont été largement étudiées, dans le cadre d'une réflexion sur ce que l'on peut appeler la télé-démocratie. Ce sont les courants principaux de cette réflexion qu'on tentera de dégager, en mettant l'accent sur les problèmes proprement politiques (et non technologiques) que ces courants abordent ou ignorent.

Captives of the Cloud: Part I Metahaven We are the voluntary prisoners of the cloud; we are being watched over by governments we did not elect. Wael Ghonim, Google’s Egyptian executive, said: “If you want to liberate a society just give them the internet.”1 But how does one liberate a society that already has the internet? In a society permanently connected through pervasive broadband networks, the shared internet is, bit by bit and piece by piece, overshadowed by the “cloud.” The Coming of the Cloud The cloud, as a planetary-scale infrastructure, was first made possible by an incremental rise in computing power, server space, and trans-continental fiber-optic connectivity. A nondescript diagram in a 1996 MIT research paper titled “The Self-governing Internet: Coordination by Design,” showed a “cloud” of networks situated between routers linked up by Internet Protocol (IP).3 This was the first reported usage of the term “cloud” in relation to the internet. The US Cloud and the Patriot Act Super-Jurisdiction

The Venus Project ENMI 2013 Les Entretiens du nouveau monde industriel 2013 LE NOUVEL ÂGE DE L’AUTOMATISATION – Algorithmes, données, individuations Paris. Centre Pompidou. Grande Salle. 16 et 17 décembre 2013 7ème édition Les Entretiens du Nouveau Monde Industriel proposent cette année une réflexion prospective sur la question de l’automatisation qui affecte la notion même de travail et son évolution dans le contexte numérique. Approche L’automatisation généralisée a et aura des effets dans tous les domaines : production, enseignement, médecine, commerce, transports, recherche scientifique, édition et presse, relations sociales, vie quotidienne domestique, vie politique, relations intergénérationnelles, géopolitique, géoéconomie, diplomatie, politiques militaires, etc. Partenaires scientifiques Partenaires média Programme Lundi 16 décembre – matinée Session 1 : L’automatisation contre l’autonomisation ? 9h30 Session 2 : L’automatisation dans l’histoire technique, industrielle et économique et à l’époque contemporaine. 11h00

Alex Jones' Endgame Kim Dotcom SavoirsCom1 » The New World Order Wants You and Your Children Dead Alex Jones Hidden Agenda Behind Rise Of "Domestic Terrorist Label" Flashback: "Obama Lone Wolf Will Be Sovereign" Reid Calls Bundy Supporters Domestic Terrorists Homeland Security Says Your Children Are Terrorists Smart Guns Endanger Children Hold On To The Second Amendment! Harry Reid Blatantly Lies To America Harry Reid Says Conservatives Are Terrorists Rise of the Control Grid Witness To The Stand-Off SPECIAL REPORT-White House: Your Confrontational Children Could Be "Terrorists" Cliven Bundy And Supporters Labelled "Domestic Terrorists" White House Tells Parents: Children Could Be Terrorists! Fake Feminists Attack Kirsten Dunst For Pro-Woman Beliefs Insider Reveals More On Al Sharpton FBI Snitch Revelation Gun Owners Treated Like Sex Offenders Epic Fail: New Yorkers Disobey New Gun Laws Gremlins: Our Dear Leaders Whistleblower Nomi Prinz Exposes The Nefarious Deeds Of The Global Banking Elite Boston Globe Asks; Is The Declaration Of Independence A Terrorist Document? Our Enemy Operates Right Out In The Open - Live flight tracker! Connecting the Collaborative Economy