Ten Years of Hacking and Media Activism Autistici/ Inventati 2 Theory on Demand
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Alive Dead Media 2020: Tracker and Chip Music
Alive Dead Media 2020: Tracker and Chip Music 1st day introduction, Markku Reunanen Pics gracefully provided by Wikimedia Commons Arrangements See MyCourses for more details, but for now: ● Whoami, who’s here? ● Schedule of this week: history, MilkyTracker with Yzi, LSDJ with Miranda Kastemaa, holiday, final concert ● 80% attendance, two tunes for the final concert and a little jingle today ● Questions about the practicalities? History of Home Computer and Game Console Audio ● This is a vast subject: hundreds of different devices and chips starting from the late 1970s ● In the 1990s starts to become increasingly standardized (or boring, if you may :) so we’ll focus on earlier technology ● Not just hardware: how did you compose music with contemporary tools? ● Let’s hear a lot of examples – not using Zoom audio The Home Computer Boom ● At its peak in the 1980s, but started somewhat earlier with Apple II (1977), TRS-80 (1977) and Commodore PET (1977) ● Affordable microprocessors, such as Zilog Z80, MOS 6502 and the Motorola 6800 series ● In the 1980s the market grew rapidly with Commodore VIC-20 (1980) and C-64 (1982), Sinclair ZX Spectrum (1982), MSX compatibles (1983) … and many more! ● From enthusiast gadgets to game machines Enter the 16-bits ● Improving processors: Motorola 68000 series, Intel 8088/8086/80286 ● More colors, more speed, more memory, from tapes to floppies, mouse(!) ● Atari ST (1984), Commodore Amiga (1985), Apple Macintosh (1984) ● IBM PC and compatibles (1981) popular in the US, improving game capability Not Just Computers ● The same technology powered game consoles of the time ● Notable early ones: Fairchild Channel F (1976), Atari VCS aka. -
Confronting the Challenges of Participatory Culture: Media Education for the 21St Century
An occasional paper on digital media and learning Confronting the Challenges of Participatory Culture: Media Education for the 21st Century Henry Jenkins, Director of the Comparative Media Studies Program at the Massachusetts Institute of Technology with Katie Clinton Ravi Purushotma Alice J. Robison Margaret Weigel Building the new field of digital media and learning The MacArthur Foundation launched its five-year, $50 million digital media and learning initiative in 2006 to help determine how digital technologies are changing the way young people learn, play, socialize, and participate in civic life.Answers are critical to developing educational and other social institutions that can meet the needs of this and future generations. The initiative is both marshaling what it is already known about the field and seeding innovation for continued growth. For more information, visit www.digitallearning.macfound.org.To engage in conversations about these projects and the field of digital learning, visit the Spotlight blog at spotlight.macfound.org. About the MacArthur Foundation The John D. and Catherine T. MacArthur Foundation is a private, independent grantmaking institution dedicated to helping groups and individuals foster lasting improvement in the human condition.With assets of $5.5 billion, the Foundation makes grants totaling approximately $200 million annually. For more information or to sign up for MacArthur’s monthly electronic newsletter, visit www.macfound.org. The MacArthur Foundation 140 South Dearborn Street, Suite 1200 Chicago, Illinois 60603 Tel.(312) 726-8000 www.digitallearning.macfound.org An occasional paper on digital media and learning Confronting the Challenges of Participatory Culture: Media Education for the 21st Century Henry Jenkins, Director of the Comparative Media Studies Program at the Massachusetts Institute of Technology with Katie Clinton Ravi Purushotma Alice J. -
A History of End-To-End Encryption and the Death of PGP
25/05/2020 A history of end-to-end encryption and the death of PGP Hey! I'm David, a security engineer at the Blockchain team of Facebook (https://facebook.com/), previously a security consultant for the Cryptography Services of NCC Group (https://www.nccgroup.com). I'm also the author of the Real World Cryptography book (https://www.manning.com/books/real-world- cryptography?a_aid=Realworldcrypto&a_bid=ad500e09). This is my blog about cryptography and security and other related topics that I Ûnd interesting. A history of end-to-end encryption and If you don't know where to start, you might want to check these popular the death of PGP articles: posted January 2020 - How did length extension attacks made it 1981 - RFC 788 - Simple Mail Transfer Protocol into SHA-2? (/article/417/how-did-length- extension-attacks-made-it-into-sha-2/) (https://tools.ietf.org/html/rfc788) (SMTP) is published, - Speed and Cryptography the standard for email is born. (/article/468/speed-and-cryptography/) - What is the BLS signature scheme? (/article/472/what-is-the-bls-signature- This is were everything starts, we now have an open peer-to-peer scheme/) protocol that everyone on the internet can use to communicate. - Zero'ing memory, compiler optimizations and memset_s (/article/419/zeroing-memory- compiler-optimizations-and-memset_s/) 1991 - The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations The US government introduces the 1991 Senate Bill 266, (/article/461/the-9-lives-of-bleichenbachers- which attempts to allow "the Government to obtain the cat-new-cache-attacks-on-tls- plain text contents of voice, data, and other implementations/) - How to Backdoor Di¸e-Hellman: quick communications when appropriately authorized by law" explanation (/article/360/how-to-backdoor- from "providers of electronic communications services di¸e-hellman-quick-explanation/) and manufacturers of electronic communications - Tamarin Prover Introduction (/article/404/tamarin-prover-introduction/) service equipment". -
Battle of the Clipper Chip - the New York Times
Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp.. -
0714685003.Pdf
CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics. -
The Political Clubs of United Russia: Incubators of Ideology Or Internal Dissent?
The Political Clubs of United Russia: Incubators of Ideology or Internal Dissent? Thesis Presented in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the Graduate School of The Ohio State University By Eileen Marie Kunkler, B.A. Graduate Program in Slavic and East European Studies The Ohio State University 2010 Thesis Committee: Goldie Shabad, Adviser Trevor Brown Copyright by Eileen Marie Kunkler 2010 Abstract In 2008, three political clubs were officially formed within the United Russia party structure: the Social-Conservative Club, the Liberal-Conservative Club, and the State-Patriotic Club. Membership of these clubs includes many powerful Duma representatives. Officially, their function is to help develop strategies for implementing the government‟s Strategy 2020. However, a closer examination of these clubs suggests that they also may function as an ideology incubator for the larger party and as a safety valve for internal party dissent. To answer the question of what the true function of these clubs is an attempt will be made to give: a brief overview of Unity‟s and Fatherland-All Russia‟s formation; a description of how United Russia formed; a summary of the ideological currents within United Russia from 2001-2009; a discussion of the three clubs; and a comparative analysis of these clubs to the Christian Democratic party of Italy and the Liberal Democratic Party of Japan. Based on this evidence, it will be argued that primary purpose of these clubs is to contain intra-party conflict. ii Dedication Dedicated to my family and friends iii Acknowledgements I wish to thank my adviser, Goldie Shabad, for all of her help, advice, and patience in working on this project with me. -
History of the Internet-English
Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. -
Telecommunications Infrastructure for Electronic Delivery 3
Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades. -
Final Exploitation Plan
D9.10 – Final Exploitation Plan Jorge Lpez (Atos), Alessandra Tedeschi (DBL), Julian Williams (UDUR), abio Massacci (UNITN), Raminder Ruprai (NGRID), Andreas Schmitz ( raunhofer), Emilio Lpez (URJC), Michael Pellot (TMB), Zden,a Mansfeldov. (ISASCR), Jan J/r0ens ( raunhofer) Pending of approval from the Research Executive Agency - EC Document Number D1.10 Document Title inal e5ploitation plan Version 1.0 Status inal Work Packa e WP 1 Deliverable Type Report Contractual Date of Delivery 31 .01 .20 18 Actual Date of Delivery 31.01.2018 Responsible Unit ATOS Contributors ISASCR, UNIDUR, UNITN, NGRID, DBL, URJC, raunhofer, TMB (eyword List E5ploitation, ramewor,, Preliminary, Requirements, Policy papers, Models, Methodologies, Templates, Tools, Individual plans, IPR Dissemination level PU SECONO.ICS Consortium SECONOMICS ?Socio-Economics meets SecurityA (Contract No. 28C223) is a Collaborative pro0ect) within the 7th ramewor, Programme, theme SEC-2011.E.8-1 SEC-2011.7.C-2 ICT. The consortium members are: UniversitG Degli Studi di Trento (UNITN) Pro0ect Manager: prof. abio Massacci 1 38100 Trento, Italy abio.MassacciHunitn.it www.unitn.it DEEP BLUE Srl (DBL) Contact: Alessandra Tedeschi 2 00113 Roma, Italy Alessandra.tedeschiHdblue.it www.dblue.it raunhofer -Gesellschaft zur Irderung der angewandten Contact: Prof. Jan J/r0ens 3 orschung e.V., Hansastr. 27c, 0an.0uer0ensHisst.fraunhofer.de 80E8E Munich, Germany http://www.fraunhofer.de/ UNIVERSIDAD REL JUAN CARLOS, Contact: Prof. David Rios Insua 8 Calle TulipanS/N, 28133, Mostoles david.riosHur0c.es -
Text of the German Application of Art of Coding
This is the Text of the German application of Art of Coding (www.http://demoscene-the-art-of-coding.net) with the purpose of bringing the demoscene onto the list of UNESCO intangible cultural heritage of humanity. The application was submitted in Oct 2019 and has been written in an collaborative community effort led by Tobias Kopka supported by Andre Kudra, Stephan Maienhöfer, Gleb Albert, Christian Brandt, Andreas Lange and many more who gave their hands at Digitale Kultur und Tastatur und Maus e.V. The structure depends on the form, which is given by the German UNESCO. In spite the structure differs from forms used in other countries text modules can be used for application in other countries. The texts in square brackets are part of the German form. Also every kind of feedback is welcome, which could be taken into account for future use. Use ‘team (at) demoscene-the-art-of-coding.net’ 1. Type of Immaterial Cultural Heritage [Please tick the applicable sections and elaborate in keywords (multi-selection possible, but not mandatory)] Section A) verbally passed on traditions and expressions [keywords]: own technical vocabulary, own idiom with specialized terminology, English is lingua franca Section B) performing arts (music, theatre, dance) [keywords]: composition, performant, live, public presentation, animation Section C) social tradition, (seasonal) celebration and ritual [keywords]: demoparties, competitions, visitor voting, price ceremonies Section D) Knowledge and customs, related to nature or the universe [keywords]: digitalized living environment, cyberspace, virtual reality Section E) traditional craftsmanship [keywords]: coding, composition, animation, adoption, do-it-yourself Section F) other 2. -
Get Ready for the Future
GET READY FOR THE FUTURE Tel: +39 02 27 201 352 www.teledata-i.com [email protected] 40 YEARS OF HISTORY Teledata has been designing and manufacturing safety electronic devices for 40 years. In the early years, the company started its business manufacturing ad hoc electronic solutions for aerospace applications for national and foreign leader companies. This allowed the know-how of the company to achieve the highest levels in cutting-edge electronics sector. During this period the company widened its horizons developing specific solutions for the safety field, which in the early eighties occupied a market in which no standard solution existed. Over the years, Teledata continued investing in the safety field combining system design with large-scale manufacturing of high technological content. The company continued with the design and manufacturing of electronic devices, while constantly generating and increasing the value chain benefiting the final customers. Teledata today offers a self production range of safety system, fire prevention and video surveillance products; it has an important presence on the international market, and gives an important contribution to export the Made in Italy excellence. The company participates in several national and international work committees sharing experience, necessiteses, goals, actions and values to have previews and perspectives for tomorrow’s market. 1 www.teledata-i.com Arab National Bank Riyadh Banks and Financial Buildings Sites realized in Italy 13000 Sites realized abroad 1800 Poste Italiane -
Book of Abstracts
BOOK OF ABSTRACTS 2ND AIPH ANNUAL CONFERENCE PISA – 11-15 JUNE 2018 Table of contents AIPH1 - LIBRARIES AND PUBLIC HISTORY: RESOURCES AND METHODS 12 Learning from the Scientific Literature: Information Literacy Education in Libraries and Beyond 12 Public Libraries as a Hub for Sources on Local History and Culture 13 Special Libraries, Personal Collections: Which Role for Public History? 13 School Libraries and Archives for Public History 14 AIPH2 - THE VALORIZATION OF THE CULTURAL HERITAGE THROUGH THE CULTURAL ITINERARIES AS AN ELEMENT OF TOURISTIC PROMOTION OF THE TERRITORIES 14 Building an itinerary with historical foundations: the case of “Cammino di S. Giulia” 15 The definition of landscape, how it is perceived, its historical features and peculiarities within the “cammini” 15 The construction of a Cultural Itinerary between historical and landscape valorization and practicability 16 An Itinerary of the Ex-Voto Between Sicily and Malta: The Sixteenth-Century Frescoes of the Convent of the Cross in Scicli 16 An itinerary of the Ex-Voto in Sicily: the polychrome majolica of the Sanctuary of “Maria SS. del Ponte” in Caltagirone 17 AIPH3 - PROFESSIONAL FIELDS FOR PUBLIC HISTORY IN ITALY 18 Public History practises for engaged theatre 18 Oral and digital archives: a public approach 19 Urban renovation, literature and Public History 19 Cultural Heritage: valorization networks between universities, private foundations and cultural institutes 20 AIPH4 - BUSINESS ARCHIVES: EXPERIENCES AND PERSPECTIVES REGARDING PARTICIPATORY ARCHIVES 20 Fondazione Dalmine. Promoting industrial culture 21 Communicating the archive: oral sources and theater as a vehicle for emotions 22 The business archive as a tool of dialogue and participation 23 AggiungiPROmemoria “participatory archive” Lab 23 AIPH5 - LEADERSHIP AND DEMOCRACY IN A MASS SOCIETY EXHIBITIONS ON GRAMSCI, NENNI, MORO, TRENTIN BIOGRAPHIES BY IMAGES AND DOCUMENTS 24 Antonio Gramsci and the Great War 25 Nenni, Father of the Republic 25 Images of a Life.