eDemocratie – 4e bijeenkomst Masterclass Netpolitiek

Josien Pieterse van Netwerk Democratie en Mieke van Heeswijk.

Enkele voorbeelden van eDemocratie:

Stellingen:

De participatiesamenleving vergroot de kloof tussen burger en politiek.

Transparantie is risico voor de democratie en zo daarom aan banden moeten worden gelegd.

Masterclass Netpolitiek.

The coming weeks I am attending a masterclass netpolitics. As the courses are in Dutch, all posts on the topic will be in Dutch as well. Just to make sure I can focus on content, and not on translation… 🙂

Op dit blog wil ik m’n aantekeningen bijhouden van de te lezen en besproken literatuur en de workshops.

Hier is een overzicht wat het doel en de achtergrond is van deze masterclass.

Inleiding

Internet of Things, het aftappen door geheime diensten van onze communicatie, e- democratie, de beveiliging van persoonsgegevens en medische dossiers. Wat betekenen deze ontwikkelingen voor onze samenleving, de privacy, de wet- en regelgeving?

Dit zijn nog maar een paar voorbeelden van de vele belangrijke vraagstukken die op het grensvlak van internet en politiek spelen. Een stevige kennis op dit gebied is cruciaal om onze informatiemaatschappij de komende jaren succesvol te (be)sturen.

Doel

Het doel van de masterclass is om de deelnemers handvatten mee te geven over de invloed van internetpolitiek en de informatiesamenleving op alle facetten van de maatschappij, zodat ze weloverwogen standpunten kunnen innemen.

Achtergrond

Het idee om een serie masterclasses op te zetten voor toekomstige beslissers over politiek en internet, is ingegeven door het Netzpolitischer Kongress1 en de Workshop Behind the Scenes of the Internet2. Beide evenementen waren erop gericht beslissers over internet en politiek beter te informeren over belangrijke vraagstukken die op het grensvlak van internet en politiek spelen. Waag Society en Netwerk Democratie besloten iets soortgelijks op te zetten in Nederland. Het resultaat was de eerste Masterclass Netpolitiek in Amsterdam (2014), een serie masterclasses georganiseerd door Bits of Freedom, Kennisland, Netwerk Democratie, Open State Foundation en Waag Society. De deelnemers kregen nieuwe kennis van experts uit het vakgebied en werkten in groepen aan een interventie. De resultaten daarvan werden gedeeld en besproken.

De eerste bijeenkomst wordt gegeven door Marleen en Frank van de Waag. De leeslijst is:

 

 

Gl.inet Tor Wifi – An anonymous open hotspot in your network

With this manual you are able to create an open wifi access point connected to the Tor Network. Users will be able to browse the web and check their mail and not be traceable back to your IP address.

Reasons why you want to do this:

  • Allow everyone to access the internet who is near to your access point
  • Allow people to access the internet in an anonymous, private way.
  • Don’t be bothered with what people do from your IP adress (your internet connection)
  • As Tor is slow, people will not be able to use all your bandwith
  • Users of the access point can’t access your private network

What you need:

  • A Gl.inet router for $23,-
  • The self made version of the software from Radical Open Security.
  • An ubuntu or debian based computer or server to make the custom image.
  • About an hour of your life.

Step 1 – Building the firmware

You need to build the firmware yourself. Otherwise you do not have SSH access to the router and you can’t remove the wifi password. The following is loosely copid from the [Radical Open Security Git Page.](https://github.com/radicallyopensecurity/netaidkit#building-the-firmware-image “firmware”)

  • Login to your Ubuntu or Debian based computer:
  • Install dependencies

sudo apt-get update
sudo apt-get install git-core build-essential libssl-dev libncurses5-dev unzip subversion gawk python python-passlib jq

  • Create a working directory in your home folder and execute the following commands:

git clone https://github.com/radicallyopensecurity/netaidkit
cd netaidkit && make image

  • Go grab a coffee or tea. After some time you’ll find the image in netaidkit/openwrt/bin directory.

Look for this file: openwrt-ar71xx-generic-gl-inet-6416A-v1-squashfs-factory.bin

Step 2 – Flashing the firmware and setting up the router

Flashing is the action of uploading the firmware you just made to your router. You erase the existing firmware. For this we assume your router no longer has the original firmware. This is easier also if you still have the original firmware.

Flashing the GL-iNet:

  • Connect your computer to the router using an ethernet cable. Connect to the WAN port.
  • While pressing the reset button on the side of the GL-iNet, power on the device. You will see the green LED flashing.
  • Hold the reset button until the green LED flashes 5 times.
  • When the red light flashes once, release your finger.
  • If you can’t get your device into failsafe mode, you need to check if the ethernet cable is really connected.
  • The device is now booting into failsafe mode.
  • Manually set your IP address to 192.168.1.2.
  • Visit 192.168.1.1 in your browser and upload the image called openwrt-ar71xx-generic-gl-inet-6416A-v1-squashfs-factory.bin to the page and click ‘Update firmware‘.
  • Wait for the device to reboot into the new firmware and do not turn it off. Do not disconnect the power cable.

Set-up for normal use.

  • Connect to the NETAIDKIT access point using password ‘netaidkit’.
  • Browse to 192.168.101.1 and follow the steps to set-up your own AP and change the passwords.
  • Disconnect from wifi

Step 3 – Standard setup of the kit

  • Connect to the newly created wifi point.
  • Open a webbrower and connect to 192.168.101.1
  • Follow the setup from the Net Aid Kit.

Done! You have now a wokring acces point you can use to get people on the tor network. Last thing to do: remove the wifi password so anyone can use it!

 

Step 4 – Remove the wifi password an open it up.

Note: These steps still need improving as the latest build of the Net Aid Kit no longer allows for SSH access on port 2222. So the devs need to update that.

  • Connect to the wifi of your new acces point (if you haven’t already)
  • Open a terminal and login to the router with SSH.

$ ssh root@192.168.101.1 -p 2222

  • The default password is:`K@qt1)pLMto
  • Change the password:

$ passwd

Open the wifi config file in /etc/wireless with vi and remove the line about the security

Close vi with ‘esc’ and :wq

type reboot to restart the router and your are done!

Lovely quote… > The process – care > Decision trees suggest linear ways of working where one thing follows from and after the other. However, in

Lovely quote…

> The process – care

> Decision trees suggest linear ways of working where one thing follows from and after the other. However, in many practices, care practices included, time is not an arrow and entities are not brought into being just once, but keep on changing. Rather than fitting fantasies of control, such processes depend on endless tinkering. Such tinkering, if done well, is care.

Now looking into #OPDS to create my own private library of ebooks. Some links for later reference: https://github.com/seblucas/cops/wiki https://www.raspberrypi.org/forums/viewtopic.php?p=908154#p908154

Now looking into to create my own private library of ebooks.
Some links for later reference:
https://github.com/seblucas/cops/wiki
https://www.raspberrypi.org/forums/viewtopic.php?p=908154#p908154