Download: Brill.Com/Brill-Typeface

Total Page:16

File Type:pdf, Size:1020Kb

Download: Brill.Com/Brill-Typeface Poets of Hope and Despair Russian History and Culture Editors-in-Chief Jeffrey P. Brooks (The Johns Hopkins University) Christina Lodder (University of Kent) Volume 21 The titles published in this series are listed at brill.com/rhc Poets of Hope and Despair The Russian Symbolists in War and Revolution, 1914-1918 Second Revised Edition By Ben Hellman This title is published in Open Access with the support of the University of Helsinki Library. This is an open access title distributed under the terms of the CC BY-NC-ND 4.0 license, which permits any non-commercial use, distribution, and reproduction in any medium, provided no alterations are made and the original author(s) and source are credited. Further information and the complete license text can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/ The terms of the CC license apply only to the original material. The use of material from other sources (indicated by a reference) such as diagrams, illustrations, photos and text samples may require further permission from the respective copyright holder. Cover illustration: Angel with sword, from the cover of Voina v russkoi poezii (1915, War in Russian Poetry). Artist: Nikolai K. Kalmakov (1873-1955). Brill has made all reasonable efforts to trace all rights holders to any copyrighted material used in this work. In cases where these efforts have not been successful the publisher welcomes communications from copyright holders, so that the appropriate acknowledgements can be made in future editions, and to settle other permission matters. The Library of Congress Cataloging-in-Publication Data is available online at http://catalog.loc.gov Typeface for the Latin, Greek, and Cyrillic scripts: “Brill”. See and download: brill.com/brill-typeface. ISSN1877-7791 ISBN 978-90-04-36680-0 (hardback) ISBN 978-90-04-36681-7 (e-book) Copyright 2018 by the Authors. Published by Koninklijke Brill NV, Leiden, The Netherlands. Koninklijke Brill NV incorporates the imprints Brill, Brill Hes & De Graaf, Brill Nijhoff, Brill Rodopi, Brill Sense, Hotei Publishing, mentis Verlag, Verlag Ferdinand Schöningh and Wilhelm Fink Verlag. Koninklijke Brill NV reserves the right to protect the publication against unauthorized use and to authorize dissemination by means of offprints, legitimate photocopies, microform editions, reprints, translations, and secondary information sources, such as abstracting and indexing services including databases. Requests for commercial re-use, use of parts of the publication, and/or translations must be addressed to Koninklijke Brill NV. This book is printed on acid-free paper and produced in a sustainable manner. “The natives of Borneo use glow-worms on sharp poles as candles. This is the fate of writers.” Dmitrii Merezhkovskii, Bylo i budet (1915) ∵ Contents Preface to the First Edition ix Preface to the Second Edition x Introduction 1 1 Symbolism Before the War 4 The Birth of Symbolism. Two Generations 4 The Symbolists and Politics 12 2 The War: Act I (1914-1915) 26 First Reactions 26 Realities of the War 40 Valerii Briusov as War Correspondent 40 The Theme of Life at the Front 50 The Burning Questions 63 The Tragedy of Occupied Belgium 63 The Tragedy of Divided Poland 69 The Tragedy of the Victimized Jews 81 The Neo-Slavophiles 86 Viacheslav Ivanov: The Messianic Task of Russia 86 Fedor Sologub: East Against West 96 Valerii Briusov: Slavs Against Germans 106 The Dream of Tsar’grad 115 Patriotic Fiction 122 Fedor Sologub: To Believe or to Doubt 122 Konstantin Bal’mont: Cursing the Satanic Dogs 136 The Critics of Nationalism 143 Zinaida Gippius: Accepting the War Outwardly, Rejecting It Inwardly 143 Dmitrii Merezhkovskii: How to Overcome the War 159 The Outsiders 173 Aleksandr Blok: “Back to You, Russia!” 173 Andrei Belyi: “‘I’ Am the War” 182 Facing Adversity 191 Fedor Sologub: The War as a Sacrificial Feat 191 viii Contents 3 The War: Act II (1915-1917) 198 Defeats and Deadlock: Occasional Verse 198 Viacheslav Ivanov: Behind the German Threat – China! 204 Fedor Sologub: “Our Children Will Save Russia…” 209 Valerii Briusov: The Duty to Remember 219 Konstantin Bal’mont: Betrayed 222 Zinaida Gippius: Waiting for Revolution 226 Dmitrii Merezhkovskii: Waiting for the Apocalypse 231 Andrei Belyi: The Revolt of the Machines 237 Aleksandr Blok: Demoralization on all Sides 247 Valerii Briusov: After Thirty Months of War 253 4 The War: Act III (1917-1918) 258 The February Revolution of the Spirit 258 Who Is for the War? Who Is Against? 271 Russia in Deep Crisis 291 The October Revolution: The End or the Beginning? 312 5 The Symbolist Experience 1914-1918 337 Bibliography 347 Index of Names 365 The system of transliteration used in this study is the Library of Congress sys- tem without diacritical marks. Some exceptions from the general rules (i.e. geographical names) have been made to allow for more commonly accepted spellings. Dates are given according to the Julian, or Old Style calendar, but the corresponding Gregorian calendar dates are in certain cases added. Preface to the First Edition This work was began under the tutorship of the late Professor Sven Linnér at Åbo Akademi. His generous support and unfailing belief in my work were of the most decisive importance. I dedicate this book to his memory. My col- league at the University of Helsinki, Associate Professor Pekka Pesonen, him- self a prominent specialist on Russian symbolism, has also wholeheartedly en- couraged me with much valuable advice. Concrete help has further been given by Professor Richard Stites (Georgetown University) and Dr. Efim Kurganov (Helsinki). As my work on the general topic of Russian writers and the First World War has been conducted over a long period of time, I have had the op- portunity to discuss the subject with more colleagues than can be mentioned here. To all of them – unnamed but not forgotten – my sincere gratitude. Help with the English translation has been given by several native-speakers, but the main work was proficiently done by Richard Davies (University of Leeds). I am also grateful to Paul Graves (Helsinki) who thoroughly revised the poetry translations. I myself, needless to say, bear all responsibility for the final version of the book. Financial support for my work was provided by the University of Helsinki, the Research Institute of the Åbo Akademi Foundation, Jenny ja Antti Wihurin rahasto and Svenska litteratursällskapet i Finland. Helsinki, 8 October 1995 Ben Hellman Preface to the Second Edition The centennial of the First World War brought with it a renewed interest in the topic of the present volume. The Russian literary heritage of the war years was discussed at seminars and conferences and laid out and analyzed in pub- lications. In Russia, a move away from the Soviet limited perception of the war could be seen, resulting in new, more profound perceptions of the emotional and analytical involvement of the individual writers in the event. From hav- ing been a largely forgotten war it was now seen as an integral part of Russia’s tragic twentieth century. The second edition of my Poets of Hope and Despair follows in all essen- tials the first. As fairly little new material connected specially with the Russian Symbolists at war and revolution has been published, I have mainly confined myself to correcting misprints, taking heed of reviews of the first edition of my book and adding references to new research. Helsinki, 6 December 2017 Ben Hellman Introduction Fedor Sologub called one of the articles he wrote during the First World War “Why the symbolists accepted the war” (“Pochemu simvolisty priniali voinu”). According to Sologub, the Russian symbolists had welcomed the World War in 1914, not as a struggle for territorial conquests and economic influence, or as mass annihilation, but as a phenomenon which on a spiritual level was in harmony with their world view. In their works the symbolists had repeatedly expressed contempt for the modern world and forebodings of a coming cat- aclysm. The war represented not only the judgement of humankind, but also the threshold to a transfigured world, and therefore it had been accepted by the symbolists. To back up his claim, Sologub quoted poems by Valerii Briusov and Viacheslav Ivanov.1 Presumably only modesty prevented him from refer- ring to his own works. Still Sologub’s declaration was a simplification. Perhaps he realized this, as the title of the manuscript was changed to the less chal- lenging “Faithful until the End” (“Derzanie do kontsa”) when the article was published in 1917.2 In reality the reactions of the symbolists to the World War were complicated and did not even conform to the dichotomy of acceptance or rejection. Their response to the revolutions of 1917 confirmed the difficulty of speaking in the name of all the symbolists. An important chapter in the history of Russian literature was clearly drawing to a close. Symbolism was the major literary movement in Russia in the early 20th century, gathering some of the greatest poets of the period under its banner. It is mainly these outstanding individual symbolists who have received scholarly attention, while the movement as a whole was long treated only in connection with the general history of Russian literature. Notable exceptions are Ronald Peterson’s A History of Russian Symbolism (1993) and Avril Pyman’s A History of Russian Symbolism (1994), in which, however, the period 1914-1918 is given only scant attention. In the 1910s symbolism lost its dominant role as the result of internal crises and exterior challenges, and, consequently, attempts to trace the shared features of this final period of the movement have been rare. As a reaction against realism in literature, Russian symbolism did not con- form with the aesthetic ideals that became dominant in Soviet Russia.
Recommended publications
  • Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1St Edition)
    R O C K i n t h e R E S E R V A T I O N Songs from the Leningrad Rock Club 1981-86 Yngvar Bordewich Steinholt Rock in the Reservation: Songs from the Leningrad Rock Club 1981-86 (1st edition). (text, 2004) Yngvar B. Steinholt. New York and Bergen, Mass Media Music Scholars’ Press, Inc. viii + 230 pages + 14 photo pages. Delivered in pdf format for printing in March 2005. ISBN 0-9701684-3-8 Yngvar Bordewich Steinholt (b. 1969) currently teaches Russian Cultural History at the Department of Russian Studies, Bergen University (http://www.hf.uib.no/i/russisk/steinholt). The text is a revised and corrected version of the identically entitled doctoral thesis, publicly defended on 12. November 2004 at the Humanistics Faculty, Bergen University, in partial fulfilment of the Doctor Artium degree. Opponents were Associate Professor Finn Sivert Nielsen, Institute of Anthropology, Copenhagen University, and Professor Stan Hawkins, Institute of Musicology, Oslo University. The pagination, numbering, format, size, and page layout of the original thesis do not correspond to the present edition. Photographs by Andrei ‘Villi’ Usov ( A. Usov) are used with kind permission. Cover illustrations by Nikolai Kopeikin were made exclusively for RiR. Published by Mass Media Music Scholars’ Press, Inc. 401 West End Avenue # 3B New York, NY 10024 USA Preface i Acknowledgements This study has been completed with the generous financial support of The Research Council of Norway (Norges Forskningsråd). It was conducted at the Department of Russian Studies in the friendly atmosphere of the Institute of Classical Philology, Religion and Russian Studies (IKRR), Bergen University.
    [Show full text]
  • Security Analysis of Instant Messenger Torchat
    TALLINN UNIVERSITY OF TECHNOLOGY Faculty of Information Technology Department of Informatics Chair of Software Engineering Security Analysis of Instant Messenger TorChat Master's Thesis Student: Rain Viigipuu Student code: 072125 Supervisor: Alexander Norta, PhD External Supervisor: Arnis Parˇsovs, MSc TALLINN 2015 Abstract TorChat is a peer-to-peer instant messenger built on top of the Tor network that not only provides authentication and end-to-end encryption, but also allows the communication parties to stay anonymous. In addition, it prevents third parties from even learning that communication is taking place. The aim of this thesis is to document the protocol used by TorChat and to analyze the security of TorChat and its reference implementation. The work shows that although the design of TorChat is sound, its implementation has several flaws, which make TorChat users vulnerable to impersonation, communication confirmation and denial-of-service attacks. 2 Contents 1 Introduction 6 2 Tor and Hidden Services 8 2.1 Hidden Services . .9 2.1.1 Hidden service address . 11 3 TorChat 12 3.1 Managing Contacts and Conversations . 12 3.2 Configuration Options . 16 4 TorChat Protocol 17 4.1 Handshake . 17 4.2 File Transfers . 18 4.3 Protocol Messages . 19 4.3.1 not implemented . 19 4.3.2 ping . 20 4.3.3 pong . 21 4.3.4 client . 22 4.3.5 version . 22 4.3.6 status . 22 4.3.7 profile name . 23 4.3.8 profile text . 23 4.3.9 profile avatar alpha . 24 4.3.10 profile avatar . 24 4.3.11 add me.............................
    [Show full text]
  • Introduction
    Notes Introduction 1. B. Poplavsky, Stat’i. Dnevniki. Pis’ma (Moscow: Knizhnitsa, 2009), p. 126. 2. I address here in the first instance the problem of relatively limited aware- ness beyond the Russian-speaking world of russophone literary production of the Parisian diaspora. At the same time, there were spectacular cases of success in the West of those émigrés who did participate in the intellectual life of their host country by publishing in French (L. Livak, Russian Emigrés in the Intellectual and Literary Life of Interwar France: A Bibliographical Essay (Montreal: McGill Queen’s University Press, 2010)). 3. Bunin was the first Russian writer to receive this distinction (there have been five Russian laureates to date). Perhaps to an even greater extent than today, the decision of the Nobel committee was dictated by political considerations—Bunin’s chief opponent was the Soviet candidate, Maxim Gorky. Despite the obvious prestige and an increase in book sales and trans- lation contracts, as well as a boost in self-esteem for Russian émigré writers, Bunin’s Nobel Prize provided few long-term benefits for the literary diaspora (I. Belobrovtseva, “Nobelevskaia premiia v vospriiatii I.A. Bunina i ego bliz- kikh,” Russkaia literatura 4 (2007): 158–69; T. Marchenko, “En ma qualité d’ancien lauréat... Ivan Bunin posle Nobelevskoi premii,” Vestnik istorii, literatury, iskusstva, 3 (2006), 80–91). 4. This formula was used by Varshavsky in his 1930s articles and in a later book, in which he paid tribute to his generation and documented its activities: V. Varshavsky, Nezamechennoe pokolenie (New York: izd-vo Chekhova, 1956).
    [Show full text]
  • Deep Web for Journalists: Comms, Counter-Surveillance, Search
    Deep Web for Journalists: Comms, Counter-surveillance, Search Special Complimentary Edition for Delegates attending the 28th World Congress of the International Federation of Journalists * By Alan Pearce Edited by Sarah Horner * © Alan Pearce June 2013 www.deepwebguides.com Table of Contents Introduction by the International Federation of Journalists A Dangerous Digital World What is the Deep Web and why is it useful to Journalists? How Intelligence Gathering Works How this affects Journalists 1 SECURITY ALERT . Setting up Defenses 2 Accessing Hidden Networks . Using Tor . Entry Points 3 Secure Communications . Email . Scramble Calls . Secret Messaging . Private Messaging . Deep Chat . Deep Social Networks 4 Concealed Carry 5 Hiding Things . Transferring Secret Data . Hosting, Storing and Sharing . Encryption . Steganography – hiding things inside things 6 Smartphones . Counter-Intrusion . 007 Apps 7 IP Cameras 8 Keeping out the Spies . Recommended Free Programs . Cleaning Up . Erasing History . Alternative Software Share the Knowledge About the Authors Foreword by the International Federation of Journalists Navigating the Dangerous Cyber Jungle Online media safety is of the highest importance to the International Federation of Journalists. After all, the victims are often our members. The IFJ is the world’s largest organization of journalists and our focus is on ways and means to stop physical attacks, harassment and the killing of journalists and media staff. In an age where journalism – like everything else in modern life – is dominated by the Internet, online safety is emerging as a new front. In this new war, repressive regimes now keep a prying eye on what journalists say, write and film. They want to monitor contacts and they want to suppress information.
    [Show full text]
  • 1. Coversheet Thesis
    Eleanor Rees The Kino-Khudozhnik and the Material Environment in Early Russian and Soviet Fiction Cinema, c. 1907-1930. January 2020 Submitted for the degree of Doctor of Philosophy School of Slavonic and East European Studies University College London Supervisors: Dr. Rachel Morley and Dr. Philip Cavendish !1 I, Eleanor Rees confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. Word Count: 94,990 (including footnotes and references, but excluding contents, abstract, impact statement, acknowledgements, filmography and bibliography). ELEANOR REES 2 Contents Abstract 5 Impact Statement 6 Acknowledgments 8 Note on Transliteration and Translation 10 List of Illustrations 11 Introduction 17 I. Aims II. Literature Review III. Approach and Scope IV. Thesis Structure Chapter One: Early Russian and Soviet Kino-khudozhniki: 35 Professional Backgrounds and Working Practices I. The Artistic Training and Pre-cinema Affiliations of Kino-khudozhniki II. Kino-khudozhniki and the Russian and Soviet Studio System III. Collaborative Relationships IV. Roles and Responsibilities Chapter Two: The Rural Environment 74 I. Authenticity, the Russian Landscape and the Search for a Native Cinema II. Ethnographic and Psychological Realism III. Transforming the Rural Environment: The Enchantment of Infrastructure and Technology in Early-Soviet Fiction Films IV. Conclusion Chapter Three: The Domestic Interior 114 I. The House as Entrapment: The Domestic Interiors of Boris Mikhin and Evgenii Bauer II. The House as Ornament: Excess and Visual Expressivity III. The House as Shelter: Representations of Material and Psychological Comfort in 1920s Soviet Cinema IV.
    [Show full text]
  • Russians Abroad-Gotovo.Indd
    Russians abRoad Literary and Cultural Politics of diaspora (1919-1939) The Real Twentieth Century Series Editor – Thomas Seifrid (University of Southern California) Russians abRoad Literary and Cultural Politics of diaspora (1919-1939) GReta n. sLobin edited by Katerina Clark, nancy Condee, dan slobin, and Mark slobin Boston 2013 Library of Congress Cataloging-in-Publication Data: The bibliographic data for this title is available from the Library of Congress. Copyright © 2013 Academic Studies Press All rights reserved ISBN 978-1-61811-214-9 (cloth) ISBN 978-1-61811-215-6 (electronic) Cover illustration by A. Remizov from "Teatr," Center for Russian Culture, Amherst College. Cover design by Ivan Grave. Published by Academic Studies Press in 2013. 28 Montfern Avenue Brighton, MA 02135, USA [email protected] www.academicstudiespress.com Effective December 12th, 2017, this book will be subject to a CC-BY-NC license. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc/4.0/. Other than as provided by these licenses, no part of this book may be reproduced, transmitted, or displayed by any electronic or mechanical means without permission from the publisher or as permitted by law. The open access publication of this volume is made possible by: This open access publication is part of a project supported by The Andrew W. Mellon Foundation Humanities Open Book initiative, which includes the open access release of several Academic Studies Press volumes. To view more titles available as free ebooks and to learn more about this project, please visit borderlinesfoundation.org/open. Published by Academic Studies Press 28 Montfern Avenue Brighton, MA 02135, USA [email protected] www.academicstudiespress.com Table of Contents Foreword by Galin Tihanov .......................................
    [Show full text]
  • How Do Tor Users Interact with Onion Services?
    How Do Tor Users Interact With Onion Services? Philipp Winter Anne Edmundson Laura M. Roberts Princeton University Princeton University Princeton University Agnieszka Dutkowska-Zuk˙ Marshini Chetty Nick Feamster Independent Princeton University Princeton University Abstract messaging [4] and file sharing [15]. The Tor Project currently does not have data on the number of onion Onion services are anonymous network services that are service users, but Facebook reported in 2016 that more exposed over the Tor network. In contrast to conventional than one million users logged into its onion service in one Internet services, onion services are private, generally not month [20]. indexed by search engines, and use self-certifying domain Onion services differ from conventional web services names that are long and difficult for humans to read. In in four ways; First, they can only be accessed over the Tor this paper, we study how people perceive, understand, and network. Second, onion domains are hashes over their use onion services based on data from 17 semi-structured public key, which make them difficult to remember. Third, interviews and an online survey of 517 users. We find that the network path between client and the onion service is users have an incomplete mental model of onion services, typically longer, increasing latency and thus reducing the use these services for anonymity and have varying trust in performance of the service. Finally, onion services are onion services in general. Users also have difficulty dis- private by default, meaning that users must discover these covering and tracking onion sites and authenticating them. sites organically, rather than with a search engine.
    [Show full text]
  • Detection and Analysis of Tor Onion Services
    Detection and Analysis of Tor Onion Services Martin Steinebach1;∗, Marcel Schäfer2, Alexander Karakuz and Katharina Brandl1 1Fraunhofer SIT, Germany 2Fraunhofer USA CESE E-mail: [email protected] ∗Corresponding Author Received 28 November 2019; Accepted 28 November 2019; Publication 23 January 2020 Abstract Tor onion services can be accessed and hosted anonymously on the Tor network. We analyze the protocols, software types, popularity and uptime of these services by collecting a large amount of .onion addresses. Websites are crawled and clustered based on their respective language. In order to also determine the amount of unique websites a de-duplication approach is implemented. To achieve this, we introduce a modular system for the real-time detection and analysis of onion services. Address resolution of onion services is realized via descriptors that are published to and requested from servers on the Tor network that volunteer for this task. We place a set of 20 volunteer servers on the Tor network in order to collect .onion addresses. The analysis of the collected data and its comparison to previous research provides new insights into the current state of Tor onion services and their development. The service scans show a vast variety of protocols with a significant increase in the popularity of anonymous mail servers and Bitcoin clients since 2013. The popularity analysis shows that the majority of Tor client requests is performed only for a small subset of addresses. The overall data reveals further that a large amount of permanent services provide no actual content for Tor users. A significant part consists instead of bots, services offered via multiple domains, or duplicated websites for phishing Journal of Cyber Security and Mobility, Vol.
    [Show full text]
  • Assemblies of Al #Ar1ri
    THE ASSEMBLIES OF AL #AR1RI ORIENTAL TRANSLATION FUND. NEW SEEIES. III. THE ASSEMBLIES OF AL HARIRI, Ifranstctieb from ffce Jlrabic, WITH 3TOTES, HISTORIQAL the A#8ewblie8 Q Bclitoi of latest Arable twit of Warm's t Englmh, Arabic and Persian JjictionanM. BV F. P. AEBUTHNOT, M.B.A.S. VOL, II. CONTAINING THE LAST TWENTY-FOUR P&IKTEL AND PVBLISBEV VNDER THE PATRONAGE OS1 TB.R ROYAL ASIATIC SOCIETY, AND SOI D AT 22, ALBEMAELE STREET, LONDON, THOMAS CHENERY, M.A., BORN 1826 ; DIED 1884. WE "know not what havens to UK spiritually after death, and can only repent in the words of the Koran, " IVc belong to God, and unto Him we shall surely return'' Btill, If there be sueh <t thing as continuation, should you (wherever you may be) happen io learn tliat your great worlf here hns been comjneted and indexed, the fact will not, I trust, displease you. Admirvngly 7/owrs, F. F. AEBUTHNOT. PREFACE, work of Hariri consists of or TUB great fifty Maldmfit, Assemblies. Of these the late Mr. Thomas Chenery translated and published the first twenty-six, with in 18()7. copious and valuable notes, Ho had fully intended to complete the translation of the remaining twenty-four, and also to prepare an Index to the two volumes. Rut called away to the editorship of the 7Yww in 1877, his hopes end expectations were never fulfilled, and he died in 1881, leaving his task un- finished, Tn 1891 the Oriental Translation Fund, which had existed from 1828 to 1878, was revived under the same name, but as a new series.
    [Show full text]
  • Privati Della Privacy Fabio Ginestri
    Privati della Privacy La nostra vita digitale quanto è pubblica? Fabio Ginestri Fabio Ginestri – Privati della Privacy Slide 1/34 “Controllo, controllo, controllo. Ogni giorno leggiamo sui giornali che i computer controllano qualcosa di nuovo. Credo che un giorno il governo collegherà tra loro tutti computer e ci terrà tutti sotto controllo, nessuno sarà più libero.” Intervista ad un passante inserita nel documentario “Quando l'Olivetti inventò il PC” Fabio Ginestri – Privati della Privacy Slide 2/34 Perché questo speech? Il programma di informazione Report trasmette “Il prodotto sei tu” sul mondo dei social network. Scaturiscono diversi ingiusti malumori nel mondo del web, accusando che il servizio è il solito mantra denigratorio della TV italiana contro il mondo di Internet Gli smartphone odierni gestiscono sempre più i nostri dati e forniscono servizi attraverso il cloud computing C'è una diffusa ignoranza su come utilizzare i social network e sui rischi provenienti da tale uso Recentemente si è scoperto che gli Stati Uniti d'America chiedono e ricevono dai big del settore informatico dati sui loro utenti Esistono alternative libere a molti servizi che già utilizziamo, i quali possono essere sovrabbondanti rispetto ai nostri bisogni e al contempo minare la nostra riservatezza Fabio Ginestri – Privati della Privacy Slide 3/34 Mettiamo in chiaro... Qui non si condanna il modello di business, si cerca di informare e di trasmettere ciò che in questi anni si ha visto, sentito raccontare e/o sperimentato in prima persona Si mettono in luce le criticità di certi servizi online, anche perché spesso è possibile trovare alternative più rispettose della libertà degli utenti e magari più funzionali Si cercano di illustrare alcune alternative libere, senza però entrare nei dettagli implementativi.
    [Show full text]
  • Graph Theoretic Properties of the Darkweb
    Graph Theoretic Properties of the Darkweb Kevin O’Keeffe1, Virgil Griffith1, Yang Xu1, Paolo Santi2, and Carlo Ratti2 1Urban Mobility Laboratory, Singapore-MIT Alliance for Research and Technology, Singapore, 138602 2SENSEable City Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA August 16, 2019 Abstract We collect and analyze the darkweb (a.k.a. the “onionweb”) hyperlink graph. We find properties highly dissimilar to the well-studied world wide web hyperlink graph; for example, our analysis finds that > 87% of darkweb sites never link to another site. We propose a simple network growth model that reasonably captures the data, and compare our results to prior work on world-wide-web and speculate about reasons for their differences. We conclude that in the term “darkweb”, the word “web” is a connectivity misnomer. Instead, it is more accurate to view the darkweb as a set of largely isolated dark silos. 1 Introduction Graph theory has long been a favored tool for analyzing social relationships [1] as well as quantifying engineering properties such as searchability [2]. For both reasons, there have been numerous graph-theoretic analyses of the World Wide Web (www) from the seminal [3–7] to the modern [8]. Motivated by curiosity, we repeat these analyses for the notorious “darkweb”. The darkweb is sometimes loosely defined as “anything seedy on the Internet”, but we define the darkweb strictly, as simply all domains underneath the “.onion” psuedo-top-level-domain [9], i.e., we define the darkweb to be synonymous with the onionweb. The darkweb is largely unstudied [10, 11] infamously mysterious, and any insight into it for both harnessing it or informing social policy is welcome.
    [Show full text]
  • Moderne Instant-Messaging-Systeme Als Plattform Für Sicherheitskritische Kollaborative Anwendungen
    Fachbereich 4: Informatik Moderne Instant-Messaging-Systeme als Plattform für sicherheitskritische kollaborative Anwendungen Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften (Doctor rerum naturalium) vorgelegt von Dipl.-Informatikerin Anastasia Meletiadou Gutachter: Prof. Dr. Rüdiger Grimm und Prof. Dr. J. Felix Hampe Inhaltsverzeichnis 3 Inhaltsverzeichnis Abbildungsverzeichnis ...................................................................................................... 8 Teil I Einleitung und Problemdefinition ....................................................................... 14 1 Einleitung ............................................................................................. 14 2 Motivation ............................................................................................ 15 3 Herausforderungen und Ziele ............................................................ 16 3.1 Problemstellung ................................................................................................ 16 3.2 Fragestellung ..................................................................................................... 17 3.3 Methode ............................................................................................................ 17 4 Eigener Beitrag und Struktur der Arbeit ......................................... 19 Teil II Stand der Forschung und Related Work .......................................................... 22 5 Begriffsklärung ...................................................................................
    [Show full text]