-
ESSAY: Dark nets en mesh networks – Donkere netwerken voor duistere tijden
Er is internet buiten het internet. Het is een diffuse wereld, verborgen voor de meesten van ons. Het wordt ontwikkeld voor diverse doelen, op basis van uiteenlopende technologieën en voor verschillende gebruikers. Toch streven die allemaal naar hetzelfde internationale ideaal: onafhankelijkheid van de grote bedrijven en een spionerende overheid middels een darknet of mesh network; […]
-
Should my website have ssl?
YES! Damnit… #lookingforsolutions #quote
-
Sandstorm
When you use a web app today, you usually connect to its developers’ servers. This is backwards, and leaves them in control. Sandstorm makes it easy to run web apps on your own server. Bring their apps to your data, and make sure they don’t do anything you don’t like. No command lines, no configuration […]
-
Photography has become a networked process. It no longer ends with pasting prints into an album. Instead, making them public through services like Flickr is rapidly becoming one of the main ways how we treat our visual memories. The photographic process extends from preserving a moment to an act of telecommunication, with numerous implications on […]
-
Signal – Private Messenger for iOS
Signal provides end-to-end encryption for your calls, securing your conversations so that nobody can listen in.- Signal uses your normal phone number to make and receive calls, so you don’t need yet another identifier.- Signal calls are encrypted end-to-end, but function just like you’re used to.- Free and Open Source, enabling anyone to verify its […]
-
jlund/streisand · GitHub
An interesting new project to try on a Raspberry Pi: Streisand sets up a new server running L2TP/IPsec, OpenSSH, OpenVPN, Shadowsocks, Stunnel, and a Tor bridge. It also generates custom configuration instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared […]
-
Diversity Talk at HopeX
On Sunday 20 July 2014 I gave a talk at the HopeX conference in New York. This is the integral text:To see it back, go here: http://new.livestream.com/internetsociety/hopex1/videos/57122450 So what can we conclude after more then a year of Snowden revelations? Snowden coudn’t have more clear in his speech yesterday: everything we do is recorded. We are […]
-
10 ultimate tips to no longer be ashamed to open the terminal in public
From Relearn 2014 Introduce yourself—————— echo I am `whoami`. It is `date` and we are on $HOST, in the directory `pwd` | espeakorecho I am `whoami`. It is `date` and we are on $HOST, in the directory `pwd`or, on OS X:echo I am `whoami`. It is `date` and we are on $HOST, in the […]
-
Seda Gürses lashes out to Activist tech
The current distance between those who organise their activism to develop “technical infrastructures” and those who bring their struggles to these infrastructures is remarkable. The paradoxical consequences can be baffling: radical activists organize and sustain themselves using “free” technical services provided by Fortune 500 companies. At the same time, “alternative tech practices”, like the Free […]
-
Apple protecting its customers
Word has it todaythat anyone going to the Tor website is tracked by the NSA after that. So if you clicked that link, you’re now a high value target for the NSA. Just by coincidence I past the Apple store in Amsterdam today to ask for a new battery for my laptop. Out of curiosity […]
The collapse is already here. It is just not evenly distributed.