A User-Defined Web. And, on Systems Modification in General. Camille Akmut
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Report to the President: MIT and the Prosecution of Aaron Swartz
Report to the President MIT and the Prosecution of Aaron Swartz Review Panel Harold Abelson Peter A. Diamond Andrew Grosso Douglas W. Pfeiffer (support) July 26, 2013 © Copyright 2013, Massachusetts Institute of Technology This worK is licensed under a Creative Commons Attribution 3.0 Unported License. PRESIDENT REIF’S CHARGE TO HAL ABELSON | iii L. Rafael Reif, President 77 Massachusetts Avenue, Building 3-208 Cambridge, MA 02139-4307 U.S.A. Phone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
You Are Not Welcome Among Us: Pirates and the State
International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring. -
Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted. -
The History of Computer Science and Technology 50 More References
The History of Computer Science and Technology 50 more references... Camille Akmut November 2, 2019 Abstract A project conceived some time ago, and now finally completed. One hundred references to create a thousand more researchers! 1 Primary sources Read : open problems. Writings by computer scientists, technologists 1. stallman.org Description a conundrum and vast labyrinth for generations upon gen- erations of historians to come. The site is roughly divided into : news notes (the bulk of it, about 10-20 a day), articles (on free software and other subjects), and more personal writings. 2. gnu.org Description the GNU project is both a philosophy and an actual, re- alized system (of inter-related software, or operating system). About 400 package maintainers and thousands of contributors, currently (first-hand source). 3. lists.gnu.org Description (the many!) mailing lists for this collaborative project. 4. planet.debian.org Description a "planet" is a collection of blogs, here from Debian's members. Not limited to technological topics. (There was never such a thing as \purely technical"...) Legal documents 5. General Data Protection Regulation. Description A landmark law (a so-called \regulation", in EU legal terminology). In particular art. 17, \The data subject shall have the right to obtain from the controller the erasure of personal data" (where, roughly, \data subject" means the user, and \(data) controller" means a company or any organization/institution). II. Monographs More open problems, at every turn of a page. 6. Black, Edwin. 2012 [2001]. IBM and the holocaust. Expanded ed.. Dialog Press. Description Watson must have thought not unlike many of our mod- ern technology CEO's in that June of 1934.. -
Online Media Piracy: Convergence, Culture, and the Problem of Media
Online Media Piracy: Convergence, Culture, and the Problem of Media Change Sean Fuller Department of Gender and Cultural Studies The University of Sydney A thesis submitted to fulfil requirements for the degree of Doctor of Philosophy at the University of Sydney i DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or any other institute of higher learning, except where due acknowledgement has been made in the text. Sean Fuller April 7, 2018 ii Abstract This thesis proposes that there is a symbiotic relationship between the emergence of online media piracy and the industrial, economic and legal changes that have shaped contemporary popular media in the early 21st century. The Internet is at the heart of most recent transformations of the popular media environment, such as the emergence of video- on-demand formats for film and television consumption and the impact this has had on the nature of those media forms. This thesis discusses the powerful role played by online media piracy in shaping these developments, both through changing the expectations of consumers, and the options that are available for distributors of media content. As well as exploring the diverse forms and practices of online media piracy today, this thesis also explores theories of media change, considering how we might understand such piracy as a force underpinning media change, and how the changes it has helped shape might be placed in a broader historical context. -
Pirates, Hydras, Trolls, And... Authors? on the Authorial Capacities of Digital Media Piracy
Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy Thomas MacDonald A Thesis in The Department of Sociology and Anthropology Presented in Partial Fulfillment of the Requirements for the Degree of Master of Arts (Social and Cultural Anthropology) at Concordia University Montreal, Quebec, Canada April 2018 © Thomas MacDonald, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Thomas MacDonald Entitled: Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy and submitted in partial fulfillment of the requirements for the degree of Master of Arts (Social and Cultural Anthropology) complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final Examining Committee: Chair Dr. Amy Swiffen Examiner Dr. Fenwick Mckelvey Examiner Dr. Martin French Supervisor Dr. Maximilian Forte Approved by ___________________________________________________ Dr. Amy Swiffen, Graduate Program Director 18 May 2018 _____________________________________________ Dr. André Roy, Dean of Faculty ABSTRACT Pirates, Hydras, Trolls, and... Authors? On the Authorial Capacities of Digital Media Piracy Thomas MacDonald In this thesis, I undertake a positive analysis of digital media piracy to examine the movement’s authorial capacities. Proposed by James Meese as a way of looking beyond the traditional “piracy is theft” framework, this perspective offers new insights about how the increasingly mundane act of downloading and sharing media files can incite social change. I begin by examining what it means to be a digital media pirate, and how that question is part of the construction of the piracy movement. -
Keeping Secrets in Hardware: the Microsoft Xboxtm Case Study
Keeping Secrets in Hardware: The Microsoft XboxTM Case Study Andrew Huang Massachusetts Institute of Technology, Cambridge MA 02139, USA, [email protected], http://www.xenatera.com/bunnie/ Abstract. This paper discusses the hardware foundations of the cryp- tosystem employed by the XboxTM video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and verifies portions of an external FLASH-type ROM. The presence of the secret boot block is camouflaged by a decoy boot block in the external ROM. The code contained within the secret boot block is transferred to the CPU in the clear over a set of high-speed busses where it can be extracted using simple custom hardware. The paper concludes with recommendations for improving the Xbox security system. One lesson of this study is that the use of a high-performance bus alone is not a sufficient security measure, given the advent of inexpensive rapid prototyping services and affordable high-performance FPGAs. 1 Introduction and Background Every cryptosystem is based on some kind of secret, such as a key. Regardless of the cipher, the security of a cryptosystem is only as strong as the secrecy of the key. Thus, some of the most startlingly effective attacks on a cryptosystem involve no ciphertext analysis, but instead find flaws in the protocols that manage the keys. Cryptosystems based on symmetric ciphers are particularly vulnerable to protocol attacks, since both the sender and the receiver must be trusted to have a copy of the same secret key. -
Disrupting the Digital Humanities
disrupting the digital humanities Before you start to read this book, take this moment to think about making a donation to punctum books, an independent non-profit press, @ https://punctumbooks.com/support/ If you’re reading the e-book, you can click on the image below to go directly to our donations site. Any amount, no matter the size, is appreciated and will help us to keep our ship of fools afloat. Contri- butions from dedicated readers will also help us to keep our commons open and to cultivate new work that can’t find a welcoming port elsewhere. Our ad- venture is not possible without your support. Vive la Open Access. Fig. 1. Hieronymus Bosch, Ship of Fools (1490–1500) distrupting the digital humanities. Copyright © 2018 by editors and au- thors. This work carries a Creative Commons BY-NC-SA 4.0 International li- cense, which means that you are free to copy and redistribute the material in any medium or format, and you may also remix, transform and build upon the material, as long as you clearly attribute the work to the authors (but not in a way that suggests the authors or punctum books endorses you and your work), you do not use this work for commercial gain in any form whatsoever, and that for any remixing and transformation, you distribute your rebuild under the same license. http://creativecommons.org/licenses/by-nc-sa/4.0/ First published in 2018 by punctum books, Earth, Milky Way. https://punctumbooks.com ISBN-13: 978-1-947447-71-4 (print) ISBN-13: 978-1-947447-72-1 (ePDF) lccn: 2018948914 Library of Congress Cataloging Data is available from the Library of Congress Book design: Vincent W.J. -
A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production
Sandbox Culture A Study of the Application of Free and Open Source Software Licensing Ideas to Art and Cultural Production Aymeric Mansoux Supervisor: Matthew Fuller Thesis presented for the degree of Doctor of Philosophy Centre for Cultural Studies, Goldsmiths, University of London, February 2017 I, Aymeric Mansoux, confirm that the work presented in this thesis ismy own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Date: February 19, 2017 Signed: Abstract In partial response to the inability of intellectual property laws to adapt to data-sharing over computer networks, several initiatives have proposed techno-legal alternatives to encourage the free circulation and transfor- mation of digital works. These alternatives have shaped part of contem- porary digital culture for more than three decades and are today often associated with the “free culture” movement. The different strands of this movement are essentially derived from a narrower concept of soft- ware freedom developed in the nineteen-eighties, and which is enforced within free and open source software communities. This principle was the first significant effort to articulate a reusable techno-legal template to work around the limitations of intellectual property laws. It also of- fered a vision of network culture where community participation and sharing was structural. From alternate tools and workflow systems, artist-run servers, net- work publishing experiments, open data and design lobbies, cooperative and collaborative frameworks, but also novel copyright licensing used by both non-profit organisations and for-profit corporations, the impact on cultural production of practices developed in relation to the ideas of iii free and open source software has been both influential and broadly ap- plied. -
The Fibreculture Journal Issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE
The Fibreculture Journal issn: 1449-1443 DIGITAL MEDIA + NETWORKS + TRANSDISCIPLINARY CRITIQUE issue 26: Entanglements - Activism and Technology FCJ-191 Mirroring the Videos of Anonymous: Cloud Activism, Living Networks, and Political Mimesis. Adam Fish Lancaster University Abstract: Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibility that entangles both cloud activists and platform firms. doi: 10.15307/fcj.26.191.2015 Introduction In August 2012, Wikileaks was hit with a massive Distributed Denial of Service (DDoS) attack from a mysterious group appropriately titled Antileaks. DDoS assaults occur when multiple 85 FCJ-188 fibreculturejournal.org FCJ-191 Mirroring the Videos of Anonymous computers simultaneously ‘refresh’ a website causing it to overload and shutdown. A shaken-up Wikileaks tweeted: ‘The range of IPs used is huge. Whoever is running it controls thousands of machines or is able to simulate them’ (Kerr, 2012). This is a constant problem for Wikileaks. Their website reads: ‘WikiLeaks is currently under heavy attack. In order to fully protect the CableGate archives, we ask you to mirror it again’ (Wikileaks. org). Eventually repelling the Antileaks attack, Wikileaks again took to Twitter to boast: ‘DDoS proof, financially & geographically diverse. We’re ready to rumble’ (Kerr, 2012). For Wikileaks, mirroring means copying and pasting the CableGate archives in resilient servers so that the content remains visible. -
INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey
INTERNET DAEMONS ELECTRONIC MEDIATIONS Series Editors: N. Katherine Hayles, Peter Krapp, Rita Raley, and Samuel Weber Founding Editor: Mark Poster 56 INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick McKelvey 55 WHAT IS INFORMATION? Peter Janich 54 DECONSTRUCTION MACHINES: WRITING IN THE AGE OF CYBERWAR Justin Joque 53 METAGAMING: PLAYING, COMPETING, SPECTATING, CHEATING, TRADING, MAKING, AND BREAKING VIDEOGAMES Stephanie Boluk and Patrick LeMieux 52 THE PERVERSITY OF THINGS: HUGO GERNSBACK ON MEDIA, TINKERING, AND SCIENTIFICTION Hugo Gernsback, Edited by Grant Wythoff 51 THE PARTICIPATORY CONDITION IN THE DIGITAL AGE Darin Barney, Gabriella Coleman, Christine Ross, Jonathan Sterne, and Tamar Tembeck, Editors 50 MIXED REALISM: VIDEOGAMES AND THE VIOLENCE OF FICTION Timothy J. Welsh 49 PROGRAM EARTH: ENVIRONMENTAL SENSING TECHNOLOGY AND THE MAKING OF A COMPUTATIONAL PLANET Jennifer Gabrys 48 ON THE EXISTENCE OF DIGITAL OBJECTS Yuk Hui 47 HOW TO TALK ABOUT VIDEOGAMES Ian Bogost 46 A GEOLOGY OF MEDIA Jussi Parikka 45 WORLD PROJECTS: GLOBAL INFORMATION BEFORE WORLD WAR I Markus Krajewski 44 READING WRITING INTERFACES: FROM THE DIGITAL TO THE BOOKBOUND Lori Emerson 43 NAUMAN REITERATED Janet Kraynak 42 COMPARATIVE TEXTUAL MEDIA: TRANSFORMING THE HUMANITIES IN THE POSTPRINT ERA N. Katherine Hayles and Jessica Pressman, Editors (continued on page 321) INTERNET DAEMONS Digital Communications Possessed FENWICK McKELVEY Electronic Mediations 56 University of Minnesota Press Minneapolis London The University of Minnesota Press gratefully acknowledges the generous assis- tance provided for the open access version of this book by the Concordia Open Access Author Fund. Portions of chapter 7 were published in a different form in “Algorithmic Media Need Democratic Methods: Why Publics Matter,” Canadian Journal of Com- munication 39, no. -
77-Page Decision
1 Please note this translation was commissioned by IFPI and it has not been endorsed by the Stockholm District Court. STOCKHOLM DISTRICT COURT Division 5 Unit 52 VERDICT B 13301-06 17 April 2009 handed down in Stockholm Case no B 13301-06 PARTIES (Number of defendants: 4) Prosecutor District Prosecutor Håkan Roswall The International Public Prosecution Office in Stockholm Plaintiffs Plaintiffs, see Appendix 1. Defendant Hans FREDRIK Lennart Neij, 780427-2636 Östgötagatan 72 A, Lgh 1022 116 64 Stockholm Defence counsel appointed by the court: Jonas Nilsson, Attorney-at-Law Hamilton Advokatbyrå Göteborg AB Stora Nygatan 33 411 08 Göteborg VERDICT Crimes commited Complicity in breach of the Copyright Act Statutes involved §§ 1, 2, 46, 53, 57 of the Copyright Act (1960:729) and Chapter 23 § 4 of the Penal Code Sanctions etc. 1 year’s imprisonment The following indictment is dismissed 2 Preparation for breach of the Copyright Act in accordance with the 2nd count of the indictment. 1 Damages Fredrik Neij will, jointly with the other defendants, pay compensation to - Sony Music Entertainment (Sweden) AB of EUR 41,467, - Universal Music Aktiebolag of EUR 73,782, - Playground Music Scandinavia AB of EUR 28,159, - Bonnier Amigo Music Group AB of EUR 4,290, - EMI Music Sweden Aktiebolag of EUR 162,988, - Warner Music Sweden Aktiebolag of EUR 146,484, - Yellow Bird Films AB of SEK 3,150,000, - Nordisk Film Valby A/S of SEK 225,000, - Warner Bros Entertainment Inc of SEK 2,484,225, - Metro-Goldwyn-Mayer Pictures Inc and Columbia Pictures Industries