Command lines demand that users remember the correct phrase to make the system run, rather than giving them prompts which might help them guess what the system needs them to do next. The overwhelming majority of people alive today have never had the opportunity to learn those commands. Making them look them up and learn them themselves would make them very, very frustrated — they don’t have time for that. GUIs aren’t just “shiny“: they are tools which help us remember what is possible.By @gusandrews - via Nobody Reads Your Blog.
privacytools.io is a socially motivated website that provides information for protecting your data security and privacy. via privacy tools – encryption against surveillance.
So, while everyone is talking about #meerkat and #periscope, I am gonna look at Rhinobird. Watch the video here:
This list needs cleaning up, but just as a head start…. here you go! Das leben der Anderen https://www.youtube.com/watch?v=7-L_Y-IhVDk V for Vendetta http://www.youtube.com/watch?v=k_13fFIrhPk Enemy of the State http://www.youtube.com/watch?v=AoNT6u3mQew Gattaca http://www.youtube.com/watch?v=ZppWok6SX88 Minority report
“There will be people who resist adopting and using technology, people who want nothing to do with virtual profiles, online data systems or smart phones. Yet a government might suspect that people who opt out completely have something to hide and thus are more likely to break laws, and as a counterterrorism measure, that government will build the kind of ‘hidden people’ registry we described earlier. If you don’t have any registered social-networking profiles or mobile subscriptions, and on-line references to you are unusually hard to find, you might be considered a candidate for such a registry. You might also be subjected to a strict set of new regulations that includes rigorous airport screening or even travel restrictions.”The Invisible Committee Returns with "Fuck Off Google"
Through this post of Ernst-Jan Pfauth I learned about the Indieweb and webmention. Creating this post with this link should be enough to show how this works. But to be a bit more clear I’ll paste a quote from their… Continue Reading →
Let me state it plainly: Google is a spyware company. Facebook is a spyware company. Any company whose products spy on you is a spyware company.Aral Balkan
From here: https://aralbalkan.com/notes/spyware-2.0/ Spyware 2.0 is not cloak and dagger. It’s not hiding in the shadows; it’s hiding out in plain sight like some saccharine Ronald McDonald statue. Spyware 2.0 is all cute doodles and loveable dinosaurs. It’s all the… Continue Reading →
There are 6 easy rules to identify 99% of snakeoil:Stef
via Security and the Rise of Snakeoil not free software runs in a browser runs on a smartphone, the user doesn’t generate, or exclusively own the private encryption keys, there is no threat model, uses terminology like “cyber”, “military-grade”, or… Continue Reading →
I have his machine ssh into one of mine, and then port forward a port on my machine back along the SSH tunnel to port 22 on his machine, meaning that I can ssh into it and don’t have to care about IPs or anything. This was a dead clever idea. It relies on me having a machine which is sshable from the outside world, but I do, so that’s OKas days pass by
Reverse SSH tunnels.
The Tor anonymity network may soon expand to hundreds of millions of new users around the world as the software’s developers prepare to scale to a “global population.” Several major tech firms are in talks with Tor to include the… Continue Reading →
Er is internet buiten het internet. Het is een diffuse wereld, verborgen voor de meesten van ons. Het wordt ontwikkeld voor diverse doelen, op basis van uiteenlopende technologieën en voor verschillende gebruikers. Toch streven die allemaal naar hetzelfde internationale ideaal:… Continue Reading →
Your words are valuable, and so are those of your visitors. If they read your stuff, or they leave a message on your website, it is traffic between you and them. No one in between should be able to read along.http://shouldmysitehavessl.com/
Cameras become networked buttons that create a link between two people through the simple fact that they did the same thing simultaneously: pressing a button.Sarah Pohflepp
Photography has become a networked process. It no longer ends with pasting prints into an album. Instead, making them public through services like Flickr is rapidly becoming one of the main ways how we treat our visual memories. The photographic… Continue Reading →
Like privacy? Secure your calls for free with Signal. It's that simple.
Signal provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.- Signal uses your normal phone number to make and receive calls, so you don’t need yet another identifier.- Signal calls are encrypted end-to-end, but… Continue Reading →
On Sunday 20 July 2014 I gave a talk at the HopeX conference in New York. This is the integral text: To see it back, go here: http://new.livestream.com/internetsociety/hopex1/videos/57122450 So what can we conclude after more then a year of Snowden revelations?… Continue Reading →
From Relearn 2014 Introduce yourself —————— echo I am `whoami`. It is `date` and we are on $HOST, in the directory `pwd` | espeak or echo I am `whoami`. It is `date` and we are on $HOST, in the… Continue Reading →
The current distance between those who organise their activism to develop “technical infrastructures” and those who bring their struggles to these infrastructures is remarkable. The paradoxical consequences can be baffling: radical activists organize and sustain themselves using “free” technical services… Continue Reading →
Keybase will be a public directory of publicly auditable public keys. All paired, for convenience, with unique usernames. Follow me here
New service promising security, keys verification etc. etc. Find me at https://keybase.io/dosch Keybase will be a public directory of publicly auditable public keys. All paired, for convenience, with unique usernames. …and a pretty sweet reference client. Via https://keybase.io/
On a bright Saturday morning earlier this month, about thirty people gathered inside a large, dimly lit warehouse in Chelsea, hunched over smartphones, hand-drawn maps, and computer-networking equipment. Members of the group were briefed on the situation that would confront… Continue Reading →
Downloading Software Safely Is Nearly ImpossiblePosted on March 3, 2014 by snackypantsLet’s say you have a brand-new Windows laptop and you’re just oh, so happy. You’re pretty sure the NSA did not interdict it during shipment, and thus that it comes… Continue Reading →
Dit blog verscheen eerder bij de Correspondent. @AmsterdamNL: ‘Nog 1 vraag, want DBI heeft geen Twitter-account: mag ik uw naam en e-mailadres of telefoonnummer? Dan kunnen ze contact opnemen.’ Die tweet ontving ik vorige week van de gemeente. Het markeerde het voorlopige einde… Continue Reading →
De overheid heeft meer dan 5000 databases in beheer met daarin persoonsgegevens van Nederlandse burgers. De meeste Nederlanders zitten er in enkele tientallen hooguit. Maar wie een crimineel verleden heeft, gehandicapt is, langdurig ziek, problemen heeft in het onderwijs, uitkeringstrekker… Continue Reading →
Evgeny Morozov in an otherwise interesting piece in the Financial Times is surely incorrect in his bald statement that “Snowden now faces a growing wave of surveillance fatigue among the public”. The emotion isn’t “surveillance fatigue” but rather shell shock… Continue Reading →
Baïkal offers ubiquitous and synchronized access to your calendars and address books over CalDAV and CardDAV. Baïkal implements the current IETF recommendation drafts of these industry standards for centralized calendar and address book collections. via CalDAV + CardDAV lightweight server:… Continue Reading →
In de kersteditie van de Groene Amsterdammer stond een artikel over digitale veiligheid. Met onder andere yours truly Download hier! (PDF)
De NSA verzamelt elke dag 5 miljard locatiegegevens van mobiele telefoons. The Washington Post onthulde afgelopen week nieuwe documenten van klokkenluider Edward Snowden. Daarin werd een nieuw onderdeel van het surveillance-apparaat van de National Security Agency (NSA) beschreven. Het programma, CO-TRAVELER genaamd, legt… Continue Reading →
FLOSS Manuals has been working with Internews Europe as part of their Human Rights programme to create some user focused manuals to help communication. Recent security news has shown us that Free Software solutions are the best solutions for many situations. We… Continue Reading →
dnscrypt-proxy provides local service which can be used directly as your local resolver or as a DNS forwarder, encrypting and authenticating requests using the DNSCrypt protocol and passing them to an upstream server. The DNSCrypt protocol uses high-speed high-security elliptic-curve… Continue Reading →
Aether is a distributed network that creates forum–like, anonymous and encrypted public spaces for its constituents. No registration necessary. Get it here. via Aether.
For our shared files, we use SparkleShare. It provides an experience very similar to Dropbox: you have a SparkleShare folder that is synced up with the service, and in turn any other users who are also linked up to it…. Continue Reading →
NRC beschikt over geheime documenten van de NSA, afkomstig van Edward Snowden Voor het eerst is meer duidelijk over de schaal van spionage in Nederland De NSA-dossiers Nieuwe onthullingen NSA De eerste onthullingen over Nederland Floor Boon, Steven Derix en… Continue Reading →
This summer somebody broke the Internet. We think there are several amazing projects working to fix it. We painted a map of these projects and placed them according to the architectural space they are filling: #youbroketheinternet.
Each Occupy.here router is a LAN island in an archipelago of affiliated websites. Anyone within range of an Occupy.here wifi router, with a web-capable smartphone or laptop, can join the network “OCCUPY.HERE,” load the locally-hosted website http://occupy.here, and use the… Continue Reading →
Click image to play Diogenesthecynic/FullScreenMario · GitHub.
Het Amerikaanse Bureau voor Nationale Veiligheid (NSA) trekt zich niets aan van de privacy van burgers en politici. Maar wat is gevaarlijker: een al dan niet bebaarde terrorist met een bom in de koffer of een legioen onzichtbare ambtenaren dat… Continue Reading →
Just installed Piwik and wanted to let you know that.
There’s too much information out there for most people to pay attention to, let alone figure out whether they believe it or not. Hence, most people rely on other institutions such as media organizations to tell them which information is… Continue Reading →
T-Mobile houdt voet bij stuk. Vaste lezers van mijn datadagboek weten dat ik sinds begin dit jaar in een soort van extreme slow-motion dataworsteling verzeild geraakt. Vandaag m’n nieuwste belevenissen in dit meerdelige avontuur.
via xkcd: Enlightenment.
This is a little timeline I made based on the information from Al Jazeera. June 5, 2013 Guardian announces leak of classified NSA documents June 6, 2013 PRISM exposed to American public June 7, 2013 American cyber-attack list uncovered
Flossmanuals released (already sometime ago) a manual to get started with Etherpad. It is handy for both people who want to run their own installation, or the users of an etherpad installation. Etherpad is a real time collaborative editor. Etherpad… Continue Reading →
The last-mile problem, it turns out, isn’t just technical or economic: It’s political and even cultural. To repurpose the famous A.J. Liebling statement, internet freedom is guaranteed only to those who own a connection. "And right now, you and me… Continue Reading →
Er is een bom van verontwaardiging ontploft op internet over de afluisterpraktijken van de NSA. Niet alleen klanten van telecomprovider Verizon blijken consequent bespioneerd te worden, maar eigenlijk iedereen die Google, Facebook, Microsoft, Apple, Yahoo en Skype gebruikt. En dat… Continue Reading →
A recent article by Bruce Sterling explains why, thanks to Apple, Google, Amazon, Facebook and Microsoft talking about the Internet stopped making sense in 2012. The article caused the following comment an Italian mailing list: unfortunately, this isn’t news at… Continue Reading →
Find all kinds of Open Source alternatives and cool project on this website! Libre Projects.
For the vast majority of people, digital changes happen outside of their conscious perception. They are merely confronted with constantly changing demands and requirements for their social life: They need ‘DigiD’s’ for their communication with government institutions; they feel the… Continue Reading →
Amsterdam, 5 april 2013 Er tuimelt een musje door de Siberische storm in mijn verder stille straat. De lente en de postbode laten zich niet zien. De afgelopen weken hebben zich aaneengeregen zonder bijzonderheid. Binnen op tafel ligt een multomap… Continue Reading →
Whether a data record refers to me by name, or by email address, or by a strong pseudonym that cryptographically prevents the pseudonym to be linked to me does not really matter. The data refers to me, and the data… Continue Reading →
A lot has changed since the days when the people around Hacktic set up and defined the Dutch hacker scene. The Hang Out made way for a variety of hackerspaces; Hacktic itself is long dead (who needs dead trees to… Continue Reading →
Highlighting the diversity of perception and perspective when it comes to mobile media, Freitas first spoke of the phone as a sword, with users now gaining great potential to change, damage and restrict existing structures every time they take hold… Continue Reading →
On this week’s show James Butler is joined by Eleanor Saita (@Dymaxion) as they discuss networks, technology, undead institutions, the state-form and the ‘coming crisis’. Listen on Soundcloud
Today we are deciding how the world will look like in the future. We, the IT community, set the course of the train that is called “open society” now and we can decide into which station the train will roll… Continue Reading →
Amsterdam, 15 maart 2013 Verdrietig wellicht, ontgoocheld ook. Maar niet boos. Nooit boos. Je moet overtuigd zijn van kwade bedoelingen voordat je echt boos kan zijn. Zoals een wijs man ooit eens zei: wijt niet aan slechte intenties wat je… Continue Reading →
I don’t want to be a designer, a marketer, an illustrator, a brander, a social media consultant, a multi-platform guru, an interface wizard, a writer of copy, a technological assistant, an applicator, an aesthetic king, a notable user, a profit-maximizer,… Continue Reading →
Amsterdam, 1 maart 2013 “Als iemand z’n data opvraagt of verwijderd wil hebben, dan doe ik dat gelijk, maar het gebeurt eigenlijk nooit. Jij was de tweede in drie jaar tijd.” Wouter Durville is Dir./Eig. en heeft in z’n eentje… Continue Reading →
Gisteren met Valentijnsdag kwam ik slechts met de grootste moeite bij de voordeur vanwege de stapels liefdesverklaringen en huwelijksaanzoeken die in Himalaya-eske bergen mij de toegang naar buiten versperden. De rest van het jaar moet ik het doen met blauwe… Continue Reading →
Privacy is a fundamental human right, but today this right is widely ignored. We are outraged. We are outraged, because we, the citizens, are now kept in hundreds of databases, mostly without our knowledge or consent, over 1,200 companies specialise… Continue Reading →
Unlike Us #3 is een tweedaagse conferentie georganiseerd door het Instituut voor Netwerkcultuur van de Hogeschool van Amsterdam met workshops, een hackathon en een real life feest. Op 22 en 23 maart 2013 spreken internationale onderzoekers, programmeurs, ontwerpers en kunstenaars… Continue Reading →
“Janke has also committed to making the source code of the new technology available publicly “as fast as we can,” which means its security can be independently audited by researchers.” From the article on Slate Magazine. —- UPDATE: See this… Continue Reading →
Is Fever a hosted service? No, Fever is a PHP and MySQL application that you run on your own server. Fever has been designed with ease of maintenance in mind and can automatically update itself. From here: Feedafever
c0nt3nt/oagcookbook · GitHub. =============================== Dedicated to Aaron Swartz (1986-2013) Introduction —————- In 2008, a short and passionate appeal appeared online which called for all of us to, “take information, wherever it is stored, make our copies and share them with… Continue Reading →
Amsterdam 18 januari 2013 Welkom bij het eerste artikel van mijn datablog. Het gaat over privacy, databases en heel veel postzegels. Op dit moment deel ik het kantoor van Bits of Freedom met meerdJere personen die actief door veiligheidsdiensten worden… Continue Reading →
“Sedert de invoering van de Wet op de Bescherming van de Persoonsgegevens (WBP) in 2000 heeft iedere burger het recht te weten welke gegevens bedrijven en instellingen van hem bewaren. Dat is mooi, denk je dan, maar daarmee hebben we… Continue Reading →
1. Find data 2. Control data 3. World domination
For the blind and the analphabatic, my public gpg-key in audio: spoken_public_key don’t ask why…
WordPress 3.5 is so yesterday ;-)
Gemaakt met de hulp van de Protect my Privacy App
Wordpress uses a backdoor to control and track self-hosted websites with their Jetpack plugin
So you know what’s going on when we crash ;-) Nah, in reality beta releases of WordPress are pretty stable already. WordPress › WordPress 3.5 Beta 3.
Private Conversations for Everyone. Cryptocat is an instant messaging platform that lets you easily have private conversations with friends. Messages are encrypted before leaving your screen and are protected from being viewed by any third party, even from us. Cryptocat… Continue Reading →
There were 2.3 billion Internet users worldwide at the end of 2011, the UN Under-Secretary-General for Economic and Social Affairs, Wu Hongbo, said in his address to the Internet Governance Forum (IGF), which opened in Baku, Azerbaijan. In addition, mobile… Continue Reading →
Our objective is to create a versatile, decentralized network built on secure protocols for routing traffic over private mesh or public internetworks independent of a central supporting infrastructure.
dudle – doodle of dudle? – Poll.
Panopticon – de docu over jouw privacy from PV producties on Vimeo.
So what’s the state of social network alternatives … right now the situation is outright depressing. Identi.ca has failed to become the new Twitter for years, despite a superior feature set and full Twitter integration. The next Facebook is not… Continue Reading →
Users from China and Hong Kong have reported that the popular mobile phone message service WeChat, a product of the Chinese web service company Tencent, has censored [zh] sensitive keywords such as the name of recently ousted political leader “Bo… Continue Reading →
Parallella: A Supercomputer For Everyone by Adapteva — Kickstarter. Making parallel computing easy to use has been described as “a problem as hard as any that computer science has faced”. With such a big challenge ahead, we need to make… Continue Reading →
PREAMBLE I recognize technology as a product of human effort, a product serving no other purpose than to benefit man in general, not merely some men; man in the totality of his humanity, encompassing all his manifold interests and needs,… Continue Reading →
Ten.is is a new distributed social network. A diaspora-ish idea, but more focused on simplicity and on the protocol then trying to be al full-featured app. Find me at https://dosch.tent.is
Christopher Steiner, author of Automate This: How Algorithms Came to Rule the World, discusses his new book. Steiner originally set about studying the prevalence of algorithms in Wall Street stock trading but soon found they were everywhere. Stock traders were… Continue Reading →
The study also revealed that so-called blocklists, used by some illegal file-sharers to prevent monitors from connecting to their computers, might not be much use. Read the article at its source
Sounds like a hopelessly naive idea to me… “With a nod toward Bayes theorem, Ludlow basically wants to confuse the advertisers trying to profile him and the algorithmic machines that are trying to make predictions about him by throwing lots… Continue Reading →
Al sinds de pianola is er geen enkele innovatie in contentdistributie geweest die uit vrije wil enthousiast omarmd is door de industrie. Ja, DRM. Lees het hele artikel bij ICTRecht
Een groepje Nederlandse hackers helpt activisten en journalisten online aanvallen te weerstaan. Hacken voor het vrije woord | Sargasso.
an invitation to join the open and cool network Diaspora: DIASPORA*.
It looks like the Occupy thingie is on its way to be coopted, romanticized, historicized, adopted into folk and commercial art/culture, before it actually achieved anything. Can’t wait for the ‘addopt the occupier for $1/day’ NGO. It’s the perfect circle… Continue Reading →
Apple’s recent products, especially their mobile iOS devices, are like beautiful crystal prisons, with a wide range of restrictions imposed by the OS, the hardware, and Apple’s contracts with carriers as well as contracts with developers. Only users who can… Continue Reading →
Both in substance and in process, ACTA embodies an outdated top-down, arbitrary approach to government that is out of step with modern notions of participatory democracy. If Europe rejects ACTA, will it actually go away?
Evgeny Morozov curbs Web enthusiasm His next book will include an attack on the “open data” movement. In one cautionary example, the Indian state of Karnataka put millions of property records online in the name of convenience and transparency. “The… Continue Reading →
Ook Google Analytics valt onder de cookiewet. De cookies die deze websiteanalysetool zet, zijn immers niet puur en alleen bedoeld om de eindgebruiker een gepaste webpagina voor te schotelen. De webmaster kan extra informatie krijgen over bezoekers met deze cookies,… Continue Reading →
An evening on identity, technology and crossing borders. Heath Bunting is presenting his Status Project: an experiment in creating real and new identity for yourself or anyone else. We will explore the technological challenges and social consequences of this endeavor…. Continue Reading →
The digital world is changing at a tremendous speed. New communication technologies open up new possibilities, but by using them you can also expose yourself, and others, to risks. Many people have trouble assessing these risks especially with regard to… Continue Reading →
Before the Internet, you knew where your virtual body was – it was at the tax office or the police station, or at school. And if a revolution did take place you could go and burn those records, but now… Continue Reading →
You’re serious?! You are using Open Source and free software only to hand over all of your data in the blink of an eye to Facebook?! Somehow people need to understand that the monolith of Facebook needs to be stopped;… Continue Reading →
Click this link
Test de sterkte van je wachtwoorden via dosch.it/pass Password Meter – A visual assessment of password strengths and weaknesses.
Call for contributions: Unlike Us Reader :: Institute of Network Cultures Blog.
Hier gibts es ne schönen Sendung von Chaosradio über ACTA. Mit ne Beitrag aus Holland ;-) http://chaosradio.ccc.de/cr179.html
‘Acta is dead in the water but there will be another attempt at regulation. What worries me is the way these people are thinking. They insist on imposing old methods on a new era and they’re destroying the Open Web… Continue Reading →
Dit blog gaat over “zelluf doen“: een veelgehoorde kreet onder peuters. En met goede reden, als je ut zelluf een paar keer gedaan hebt dan ben je op weg naar zelfstandigheid en zelfredzaamheid. Jammer dat de meeste internetgebruikers een soort… Continue Reading →
Zal er een Diaspora* Connect mogelijk zijn? Facebook perforeert het wereldwijde web De kracht van Facebook ligt in het handige gebruik van diverse diensten en het bieden van toegang tot meer dan negen miljoen apps, schrijft Bits. Honderden miljoenen like-buttons… Continue Reading →
Created by: Paralegal.net
Thimbl – Free Open Source Distributed Micro-blogging. Thimbl is a Manifesto for the Open Web written in code The most significant challenge the open web will need to overcome is not technical, it is political. Welcome to Thimbl, the free,… Continue Reading →
Gary Kovacs: Tracking the trackers As you surf the Web, information is being collected about you. Web tracking is not 100% evil — personal data can make your browsing more efficient; cookies can help your favorite websites stay in business…. Continue Reading →
http://www.oneswarm.org/ Although widely used, currently popular peer-to-peer (P2P) applications offer no user privacy. By design, services like BitTorrent and Gnutella share data with anyone that asks for it, allowing a third-party to systematically monitor user behavior. As a result, using… Continue Reading →
“Gesprekken van passagiers van de Rotterdamse vervoersmaatschappij RET worden elektronisch afgeluisterd en gebruikt voor beveiligingsdoeleinden, meldde Elsevier. In eerste instantie wilde men niet toelichten hoe of wat, maar na enige herrie kwam men met “Op onze stations hangen camera’s met… Continue Reading →
Trying to get SSL through StartSSL. Don;t know if this is a good idea…