Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged Wiki

Rss Feed Group items tagged

Duncan Gillespie

Julian Assange - Wikipedia, the free encyclopedia - 0 views

  • The judge said "there is just no evidence that there was anything other than sort of intelligent inquisitiveness and the pleasure of being able to—what's the expression—surf through these various computers"[2] and stated that Assange would have gone to jail for up to 10 years if he had not had such a disrupted childhood.[27]
    • Duncan Gillespie
       
      It is interesting to see the effect Assange's troubled childhood had on his world views.
  • The fact that his fellow students were doing research for Pentagon's DARPA was reportedly a factor in motivating him to drop out and start WikiLeaks
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • ...19 more annotations...
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Readers' Choice for Time magazine's 2010 Person of the Year.[
  • awards and nominations
  • Readers' Choice for Time magazine's 2010 Person of the Year.
  • ] Assange has received a number of awards and nominations, including the 2009 Amnesty
  • tions, including the 2009
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Assange has received a number of awards and nominations, including the 2009 Amnesty International Media Award for publishing material about extrajudicial killings in Kenya and Readers' Choice for Time magazine's 2010 Person of the Year.[14] Assange has appealed a February 2011 decision by English courts to extradite him to Sweden for questioning in relation to a sexual assault investigation.[15][16][17][18] He has said the allegations of wrongdoing are "without basis".[19] Contents [hide]
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • Readers' Choice for Time magazine's 2010 Person of the Year
  • awards and nominations
  • 2009 Amnesty International Media Award for publishing material about extrajudicial killings in Kenya and Readers' Choice for Time magazine's 2010 Person of the Year.
Jaclyn Udell

Mirror (computing) - Wikipedia, the free encyclopedia - 0 views

  • In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization. A live mirror is automatically updated as soon as the original is changed.
  • To provide access to otherwise unavailable information. For example, when the popular Google search engine was banned in 2002 by the People's Republic of China, the mirror elgooG was used as a way of effectively circumventing the ban.
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • 1 billion people are online in some way
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • technology exists to circumvent internet censorship
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
Tyler Sax

Big Pharma caught spying on the WHO - Wikileaks - 2 views

  • Public health advocates reacted strongly to the leaked documents.
    • Tyler Sax
       
      This might be an interesting topic for more research. How have different groups reacted to the leaked documents?
Hadley Stein

WikiLeaks to release over half a million 9/11 intercepts - 1 views

    • Hadley Stein
       
      Are there circumstances where the Wikileaks are specific enough that the source ultimately comes out? If so, does this dissuade people from potentially revealing information?
  • While we are obligated by to protect our sources, it is clear that the information comes from an organization which has been intercepting and archiving US national telecommunications since prior to 9/11.
1 - 6 of 6
Showing 20 items per page