Skip to main content

Home/ Future of the Web/ Group items tagged days

Rss Feed Group items tagged

Gary Edwards

The Plot to Kill Google | Wired - 0 views

  •  
    Caught this at Clusterstock and found it to be quite the story! ClusterStock's John Carney focused on how Microsoft was using governemnt muscle to trip up competitors. Now it's Googles turn. From the Wired story: "Then, late in the day, Barnett brought up the two words Google lawyers least wanted to hear: Section Two-as in, Section Two of the Sherman Antitrust Act, which criminalizes monopolies. The Justice Department invoked Section Two to splinter Standard Oil in 1911, break up AT&T in 1982, and prosecute Microsoft in 1998. Now Barnett was signaling not just that the Google-Yahoo deal was dead but that the government saw Google as a potential monopolist. In fact, Barnett insisted, if the deal wasn't substantially changed or scuttled, he would sue within five days. It was a stunning blow. Google had expected a speedy approval. Now the company, whose brand is defined by its "Don't be evil" slogan, faced the prospect of being hauled into court on an antitrust charge. Google and Yahoo tried to salvage the negotiations, but on the morning of November 5, three hours before the DOJ was going to file its antitrust case, they abandoned the deal."
Paul Merrell

Memo to Potential Whistleblowers: If You See Something, Say Something | Global Research - 0 views

  • Blowing the whistle on wrongdoing creates a moral frequency that vast numbers of people are eager to hear. We don’t want our lives, communities, country and world continually damaged by the deadening silences of fear and conformity. I’ve met many whistleblowers over the years, and they’ve been extraordinarily ordinary. None were applying for halos or sainthood. All experienced anguish before deciding that continuous inaction had a price that was too high. All suffered negative consequences as well as relief after they spoke up and took action. All made the world better with their courage. Whistleblowers don’t sign up to be whistleblowers. Almost always, they begin their work as true believers in the system that conscience later compels them to challenge. “It took years of involvement with a mendacious war policy, evidence of which was apparent to me as early as 2003, before I found the courage to follow my conscience,” Matthew Hoh recalled this week.“It is not an easy or light decision for anyone to make, but we need members of our military, development, diplomatic and intelligence community to speak out if we are ever to have a just and sound foreign policy.”
  • Hoh describes his record this way: “After over 11 continuous years of service with the U.S. military and U.S. government, nearly six of those years overseas, including service in Iraq and Afghanistan, as well as positions within the Secretary of the Navy’s Office as a White House Liaison, and as a consultant for the State Department’s Iraq Desk, I resigned from my position with the State Department in Afghanistan in protest of the escalation of war in 2009.” Another former Department of State official, the ex-diplomat and retired Army colonel Ann Wright, who resigned in protest of the Iraq invasion in March 2003, is crossing paths with Hoh on Friday as they do the honors at a ribbon-cutting — half a block from the State Department headquarters in Washington — for a billboard with a picture of Pentagon Papers whistleblower Daniel Ellsberg. Big-lettered words begin by referring to the years he waited before releasing the Pentagon Papers in 1971. “Don’t do what I did,” Ellsberg says on the billboard.  “Don’t wait until a new war has started, don’t wait until thousands more have died, before you tell the truth with documents that reveal lies or crimes or internal projections of costs and dangers. You might save a war’s worth of lives.
  • The billboard – sponsored by the ExposeFacts organization, which launched this week — will spread to other prominent locations in Washington and beyond. As an organizer for ExposeFacts, I’m glad to report that outreach to potential whistleblowers is just getting started. (For details, visit ExposeFacts.org.) We’re propelled by the kind of hopeful determination that Hoh expressed the day before the billboard ribbon-cutting when he said: “I trust ExposeFacts and its efforts will encourage others to follow their conscience and do what is right.” The journalist Kevin Gosztola, who has astutely covered a range of whistleblower issues for years, pointed this week to the imperative of opening up news media. “There is an important role for ExposeFacts to play in not only forcing more transparency, but also inspiring more media organizations to engage in adversarial journalism,” he wrote. “Such journalism is called for in the face of wars, environmental destruction, escalating poverty, egregious abuses in the justice system, corporate control of government, and national security state secrecy. Perhaps a truly successful organization could inspire U.S. media organizations to play much more of a watchdog role than a lapdog role when covering powerful institutions in government.”
  • ...2 more annotations...
  • Overall, we desperately need to nurture and propagate a steadfast culture of outspoken whistleblowing. A central motto of the AIDS activist movement dating back to the 1980s – Silence = Death – remains urgently relevant in a vast array of realms. Whether the problems involve perpetual war, corporate malfeasance, climate change, institutionalized racism, patterns of sexual assault, toxic pollution or countless other ills, none can be alleviated without bringing grim realities into the light. “All governments lie,” Ellsberg says in a video statement released for the launch of ExposeFacts, “and they all like to work in the dark as far as the public is concerned, in terms of their own decision-making, their planning — and to be able to allege, falsely, unanimity in addressing their problems, as if no one who had knowledge of the full facts inside could disagree with the policy the president or the leader of the state is announcing.” Ellsberg adds: “A country that wants to be a democracy has to be able to penetrate that secrecy, with the help of conscientious individuals who understand in this country that their duty to the Constitution and to the civil liberties and to the welfare of this country definitely surmount their obligation to their bosses, to a given administration, or in some cases to their promise of secrecy.”
  • Right now, our potential for democracy owes a lot to people like NSA whistleblowers William Binney and Kirk Wiebe, and EPA whistleblower Marsha Coleman-Adebayo. When they spoke at the June 4 news conference in Washington that launched ExposeFacts, their brave clarity was inspiring. Antidotes to the poisons of cynicism and passive despair can emerge from organizing to help create a better world. The process requires applying a single standard to the real actions of institutions and individuals, no matter how big their budgets or grand their power. What cannot withstand the light of day should not be suffered in silence. If you see something, say something.
  •  
    While some governments -- my own included -- attempt to impose an Orwellian Dark State of ubiquitous secret surveillance, secret wars, the rule of oligarchs, and public ignorance, the Edward Snowden leaks fanned the flames of the countering War on Ignorance that had been kept alive by civil libertarians. Only days after the U.S. Supreme Court denied review in a case where a reporter had been ordered to reveal his source of information for a book on the Dark State under the penalties for contempt of court (a long stretch in jail), a new web site is launched for communications between sources and journalists where the source's names never need to be revealed. This article is part of the publicity for that new weapon fielded by the civil libertarian side in the War Against Ignorance.  Hurrah!
Paul Merrell

Leaked docs show spyware used to snoop on US computers | Ars Technica - 0 views

  • Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica. It's not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.
  • The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists, and activist groups. The documents, leaked last Saturday, could not be readily verified, but experts told ProPublica they believed them to be genuine. "I think it's highly unlikely that it's a fake," said Morgan Marquis-Bore, a security researcher who while at The Citizen Lab at the University of Toronto had analyzed Gamma Group's software and who authored an article about the leak on Thursday. The documents confirm many details that have already been reported about Gamma, such as that its tools were used to spy on Bahraini activists. Some documents in the trove contain metadata tied to e-mail addresses of several Gamma employees. Bill Marczak, another Gamma Group expert at the Citizen Lab, said that several dates in the documents correspond to publicly known events—such as the day that a particular Bahraini activist was hacked.
  • The leaked files contain more than 40 gigabytes of confidential technical material, including software code, internal memos, strategy reports, and user guides on how to use Gamma Group software suite called FinFisher. FinFisher enables customers to monitor secure Web traffic, Skype calls, webcams, and personal files. It is installed as malware on targets' computers and cell phones. A price list included in the trove lists a license of the software at almost $4 million. The documents reveal that Gamma uses technology from a French company called Vupen Security that sells so-called computer "exploits." Exploits include techniques called "zero days" for "popular software like Microsoft Office, Internet Explorer, Adobe Acrobat Reader, and many more." Zero days are exploits that have not yet been detected by the software maker and therefore are not blocked.
  • ...2 more annotations...
  • Many of Gamma's product brochures have previously been published by the Wall Street Journal and Wikileaks, but the latest trove shows how the products are getting more sophisticated. In one document, engineers at Gamma tested a product called FinSpy, which inserts malware onto a user's machine, and found that it could not be blocked by most antivirus software. Documents also reveal that Gamma had been working to bypass encryption tools including a mobile phone encryption app, Silent Circle, and were able to bypass the protection given by hard-drive encryption products TrueCrypt and Microsoft's Bitlocker.
  • The documents also describe a "country-wide" surveillance product called FinFly ISP which promises customers the ability to intercept Internet traffic and masquerade as ordinary websites in order to install malware on a target's computer. The most recent date-stamp found in the documents is August 2, coincidung with the first tweet by a parody Twitter account, @GammaGroupPR, which first announced the hack and may be run by the hacker or hackers responsible for the leak. On Reddit, a user called PhineasFisher claimed responsibility for the leak. "Two years ago their software was found being widely used by governments in the middle east, especially Bahrain, to hack and spy on the computers and phones of journalists and dissidents," the user wrote. The name on the @GammaGroupPR Twitter account is also "Phineas Fisher." GammaGroup, the surveillance company whose documents were released, is no stranger to the spotlight. The security firm F-Secure first reported the purchase of FinFisher software by the Egyptian State Security agency in 2011. In 2012, Bloomberg News and The Citizen Lab showed how the company's malware was used to target activists in Bahrain. In 2013, the software company Mozilla sent a cease-and-desist letter to the company after a report by The Citizen Lab showed that a spyware-infected version of the Firefox browser manufactured by Gamma was being used to spy on Malaysian activists.
Gary Edwards

Meteor: The NeXT Web - 0 views

  •  
    "Writing software is too hard and it takes too long. It's time for a new way to write software - especially application software, the user-facing software we use every day to talk to people and keep track of things. This new way should be radically simple. It should make it possible to build a prototype in a day or two, and a real production app in a few weeks. It should make everyday things easy, even when those everyday things involve hundreds of servers, millions of users, and integration with dozens of other systems. It should be built on collaboration, specialization, and division of labor, and it should be accessible to the maximum number of people. Today, there's a chance to create this new way - to build a new platform for cloud applications that will become as ubiquitous as previous platforms such as Unix, HTTP, and the relational database. It is not a small project. There are many big problems to tackle, such as: How do we transition the web from a "dumb terminal" model that is based on serving HTML, to a client/server model that is based on exchanging data? How do we design software to run in a radically distributed environment, where even everyday database apps are spread over multiple data centers and hundreds of intelligent client devices, and must integrate with other software at dozens of other organizations? How do we prepare for a world where most web APIs will be push-based (realtime), rather than polling-driven? In the face of escalating complexity, how can we simplify software engineering so that more people can do it? How will software developers collaborate and share components in this new world? Meteor is our audacious attempt to solve all of these big problems, at least for a certain large class of everyday applications. We think that success will come from hard work, respect for history and "classically beautiful" engineering patterns, and a philosophy of generally open and collaborative development. " .............. "It is not a
  •  
    "How do we transition the web from a "dumb terminal" model that is based on serving HTML, to a client/server model that is based on exchanging data?" From a litigation aspect, the best bet I know of is antitrust litigation against the W3C and the WHATWG Working Group for implementing a non-interoperable specification. See e.g., Commission v. Microsoft, No. T-167/08, European Community Court of First Instance (Grand Chamber Judgment of 17 September, 2007), para. 230, 374, 421, http://preview.tinyurl.com/chsdb4w (rejecting Microsoft's argument that "interoperability" has a 1-way rather than 2-way meaning; information technology specifications must be disclosed with sufficient specificity to place competitors on an "equal footing" in regard to interoperability; "the 12th recital to Directive 91/250 defines interoperability as 'the ability to exchange information and mutually to use the information which has been exchanged'"). Note that the Microsoft case was prosecuted on the E.U.'s "abuse of market power" law that corresponds to the U.S. Sherman Act § 2 (monopolies). But undoubtedly the E.U. courts would apply the same standard to "agreements among undertakings" in restraint of trade, counterpart to the Sherman Act's § 1 (conspiracies in restraint of trade), the branch that applies to development of voluntary standards by competitors. But better to innovate and obsolete HTML, I think. DG Competition and the DoJ won't prosecute such cases soon. For example, Obama ran for office promising to "reinvigorate antitrust enforcement" but his DoJ has yet to file its first antitrust case against a big company. Nb., virtually the same definition of interoperability announced by the Court of First Instance is provided by ISO/IEC JTC-1 Directives, annex I ("eye"), which is applicable to all international standards in the IT sector: "... interoperability is understood to be the ability of two or more IT systems to exchange information at one or more standardised interfaces
Gonzalo San Gil, PhD.

Google drops three OS X 0days on Apple | Ars Technica (opensource war against propietary?) - 1 views

  •  
    "Don't look now, but Google's Project Zero vulnerability research program may have dropped more zero-day vulnerabilities-this time on Apple's OS X platform."
  •  
    "Don't look now, but Google's Project Zero vulnerability research program may have dropped more zero-day vulnerabilities-this time on Apple's OS X platform."
Gonzalo San Gil, PhD.

The FCC's Historic Day: Voting Yes For Net Neutrality, Voting No On Protectionist S... - 0 views

  •  
    Today was, no hyperbole intended, probably one of the more historic -- albeit at times one of the dullest -- days in FCC history. The agency, led by a former lobbyist for the cable and wireless industries few expected anything from, bucked a myriad of...
Gonzalo San Gil, PhD.

U.S. Net Neutrality Has a Massive Copyright Loophole | TorrentFreak - 0 views

  •  
    # ! [... Fingers crossed…. ] " Ernesto on March 15, 2015 C: 0 Opinion After years of debating U.S. Internet subscribers now have Government regulated Net Neutrality. A huge step forward according to some, but the full order released a few days ago reveals some worrying caveats. While the rules prevent paid prioritization, they do very little to prevent BitTorrent blocking, the very issue that got the net neutrality debate started."
  •  
    # ! [... Fingers crossed…. ] " Ernesto on March 15, 2015 C: 0 Opinion After years of debating U.S. Internet subscribers now have Government regulated Net Neutrality. A huge step forward according to some, but the full order released a few days ago reveals some worrying caveats. While the rules prevent paid prioritization, they do very little to prevent BitTorrent blocking, the very issue that got the net neutrality debate started."
  •  
    # ! [... Fingers crossed…. ] " Ernesto on March 15, 2015 C: 0 Opinion After years of debating U.S. Internet subscribers now have Government regulated Net Neutrality. A huge step forward according to some, but the full order released a few days ago reveals some worrying caveats. While the rules prevent paid prioritization, they do very little to prevent BitTorrent blocking, the very issue that got the net neutrality debate started."
Gonzalo San Gil, PhD.

Linux Newbie Administrator Guide - Linux Newbie Administrator Guide [# ! Lead 'Note'...] - 1 views

  •  
    [# ! every day is a new beginning...] "Table of Contents 1. For the Undecided (Linux Benefits) 1.1 Fundamentally, why Linux? 1.2 Is Linux for me? 1.3 Linux is difficult for newbies. 1.4 What are the benefits of Linux?"
  •  
    [# ! every day is a new beginning...] "Table of Contents 1. For the Undecided (Linux Benefits) 1.1 Fundamentally, why Linux? 1.2 Is Linux for me? 1.3 Linux is difficult for newbies. 1.4 What are the benefits of Linux?"
  •  
    [# ! every day is a new beginning...] "Table of Contents 1. For the Undecided (Linux Benefits) 1.1 Fundamentally, why Linux? 1.2 Is Linux for me? 1.3 Linux is difficult for newbies. 1.4 What are the benefits of Linux?"
Alexandra IcecreamApps

Best Weather App: Free Choices - Icecream Tech Digest - 1 views

  •  
    What can be worse than getting caught in the rain without an umbrella? It’s definitely important to constantly stay tuned into all the weather updates in order not to stay comfortable throughout the day. Luckily, you can always stay informed … Continue reading →
  •  
    What can be worse than getting caught in the rain without an umbrella? It’s definitely important to constantly stay tuned into all the weather updates in order not to stay comfortable throughout the day. Luckily, you can always stay informed … Continue reading →
Gonzalo San Gil, PhD.

Learn Git and GitHub Through Videos | FOSS Force - 1 views

  •  
    The Video Screening Room These days, GitHub is pretty much the warehouse district where nearly all open source projects are stored and maintained. There are some tricks to navigating the site, which can easily be mastered by watching tutorial videos. If you’re an open source enthusiast, you need to be advocating for interested [...] Continue reading Learn Git and GitHub Through Videos
  •  
    The Video Screening Room These days, GitHub is pretty much the warehouse district where nearly all open source projects are stored and maintained. There are some tricks to navigating the site, which can easily be mastered by watching tutorial videos. If you’re an open source enthusiast, you need to be advocating for interested [...] Continue reading Learn Git and GitHub Through Videos
Gonzalo San Gil, PhD.

How to Create and Run New Service Units in Systemd Using Shell Script - 0 views

  •  
    " Few days ago, I came across a Centos 7 32-bit distro and I felt the desire to test it on an old 32-bit machine. After booting I realized that it had a bug and it was loosing the network connection, which I had to turn it "up" manually every time after boot. So, the question was how could I set a script doing this job, running every time I boot my machine?"
  •  
    " Few days ago, I came across a Centos 7 32-bit distro and I felt the desire to test it on an old 32-bit machine. After booting I realized that it had a bug and it was loosing the network connection, which I had to turn it "up" manually every time after boot. So, the question was how could I set a script doing this job, running every time I boot my machine?"
Gonzalo San Gil, PhD.

Blender: An Introduction for Final Cut Pro Users | FOSS Force - 0 views

  •  
    "Phil Shapiro Have you often considered quitting your day job to begin an exciting career as a filmmaker? You don't need the resources of a Hollywood studio anymore. In fact, you can do it all with free and open source software."
  •  
    "Phil Shapiro Have you often considered quitting your day job to begin an exciting career as a filmmaker? You don't need the resources of a Hollywood studio anymore. In fact, you can do it all with free and open source software."
Gonzalo San Gil, PhD.

How The Internet Is Destroying Our Lives Too | LinkedIn - 0 views

  •  
    "Govindraj Ethiraj Founder, Ping Digital Broadcast, IndiaSpend Imagine visiting your doctor one day complaining of a headache. And your doctor says, just as you sit down, "Well, you could have anything from a hangover to a brain tumour.""
  •  
    "Govindraj Ethiraj Founder, Ping Digital Broadcast, IndiaSpend Imagine visiting your doctor one day complaining of a headache. And your doctor says, just as you sit down, "Well, you could have anything from a hangover to a brain tumour.""
Alexandra IcecreamApps

The Best Travel Apps You Should Have When On Vacation - Icecream Tech Digest - 0 views

  •  
    It’s finally summer, and it’s time to start thinking about your upcoming vacation. During the days off everybody wants to stay totally relaxed and peaceful. To get the most out of your trip, install some very helpful and handy travel … Continue reading →
  •  
    It’s finally summer, and it’s time to start thinking about your upcoming vacation. During the days off everybody wants to stay totally relaxed and peaceful. To get the most out of your trip, install some very helpful and handy travel … Continue reading →
Gonzalo San Gil, PhD.

Why Innovation Must Go Beyond Disruption | WIRED - 0 views

  •  
    "Henry Ford famously quipped that if he'd asked what people wanted, they'd have said, "faster horses." There are countless numbers of ideas being funded every day that are aimed at essentially building faster horses. The result is that we have available an enormous embarrassment of riches in technology, information and economy - but how many of them are truly groundbreaking or innovative?"
  •  
    "Henry Ford famously quipped that if he'd asked what people wanted, they'd have said, "faster horses." There are countless numbers of ideas being funded every day that are aimed at essentially building faster horses. The result is that we have available an enormous embarrassment of riches in technology, information and economy - but how many of them are truly groundbreaking or innovative?"
Paul Merrell

What to Do About Lawless Government Hacking and the Weakening of Digital Security | Ele... - 0 views

  • In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. To give a simple example, even when chasing a fleeing murder suspect, the police have a duty not to endanger bystanders. The government should pay the same care to our safety in pursuing threats online, but right now we don’t have clear, enforceable rules for government activities like hacking and "digital sabotage." And this is no abstract question—these actions increasingly endanger everyone’s security
  • The problem became especially clear this year during the San Bernardino case, involving the FBI’s demand that Apple rewrite its iOS operating system to defeat security features on a locked iPhone. Ultimately the FBI exploited an existing vulnerability in iOS and accessed the contents of the phone with the help of an "outside party." Then, with no public process or discussion of the tradeoffs involved, the government refused to tell Apple about the flaw. Despite the obvious fact that the security of the computers and networks we all use is both collective and interwoven—other iPhones used by millions of innocent people presumably have the same vulnerability—the government chose to withhold information Apple could have used to improve the security of its phones. Other examples include intelligence activities like Stuxnet and Bullrun, and law enforcement investigations like the FBI’s mass use of malware against Tor users engaged in criminal behavior. These activities are often disproportionate to stopping legitimate threats, resulting in unpatched software for millions of innocent users, overbroad surveillance, and other collateral effects.  That’s why we’re working on a positive agenda to confront governmental threats to digital security. Put more directly, we’re calling on lawyers, advocates, technologists, and the public to demand a public discussion of whether, when, and how governments can be empowered to break into our computers, phones, and other devices; sabotage and subvert basic security protocols; and stockpile and exploit software flaws and vulnerabilities.  
  • Smart people in academia and elsewhere have been thinking and writing about these issues for years. But it’s time to take the next step and make clear, public rules that carry the force of law to ensure that the government weighs the tradeoffs and reaches the right decisions. This long post outlines some of the things that can be done. It frames the issue, then describes some of the key areas where EFF is already pursuing this agenda—in particular formalizing the rules for disclosing vulnerabilities and setting out narrow limits for the use of government malware. Finally it lays out where we think the debate should go from here.   
  •  
    "In our society, the rule of law sets limits on what government can and cannot do, no matter how important its goals. "
  •  
    It's not often that I disagree with EFF's positions, but on this one I do. The government should be prohibited from exploiting computer vulnerabilities and should be required to immediately report all vulnerabilities discovered to the relevant developers of hardware or software. It's been one long slippery slope since the Supreme Court first approved wiretapping in Olmstead v. United States, 277 US 438 (1928), https://goo.gl/NJevsr (.) Left undecided to this day is whether we have a right to whisper privately, a right that is undeniable. All communications intercept cases since Olmstead fly directly in the face of that right.
Alexandra IcecreamApps

Best Free Typing Lessons - Icecream Tech Digest - 0 views

  •  
    Thanks to the stable integration of technology into every part of our everyday life, we are facing less and less handwritten paperwork. These days it’s much more important to have excellent typing skills than have exquisite handwriting. There is no … Continue reading →
  •  
    Thanks to the stable integration of technology into every part of our everyday life, we are facing less and less handwritten paperwork. These days it’s much more important to have excellent typing skills than have exquisite handwriting. There is no … Continue reading →
Gonzalo San Gil, PhD.

The Next Five Years Could Determine Our Liberties | TorrentFreak - 0 views

  •  
    " Rick Falkvinge on April 6, 2014 C: 3 Opinion There's a European Election coming up. Voting starts in about one month, with the main election days on May 22-25. We've had many victories as activists and concerned citizens in the past five years to defend the net and its liberty, but the main showdown looks like it'll come down in the next five years. Your vote is going to matter."
  •  
    " Rick Falkvinge on April 6, 2014 C: 3 Opinion There's a European Election coming up. Voting starts in about one month, with the main election days on May 22-25. We've had many victories as activists and concerned citizens in the past five years to defend the net and its liberty, but the main showdown looks like it'll come down in the next five years. Your vote is going to matter."
Gonzalo San Gil, PhD.

The "Internet Governance" Farce and its "Multi-stakeholder" Illusion | La Quadrature du... - 0 views

  •  
    by Jérémie Zimmermann For almost 15 years, "Internet Governance" meetings1 have been drawing attention and driving our imaginaries towards believing that consensual rules for the Internet could emerge from global "multi-stakeholder" discussions. A few days ahead of the "NETmundial" Forum in Sao Paulo it has become obvious that "Internet Governance" is a farcical way of keeping us busy and hiding a sad reality: Nothing concrete in these 15 years, not a single action, ever emerged from "multi-stakeholder" meetings, while at the same time, technology as a whole has been turned against its users, as a tool for surveillance, control and oppression.
  •  
    by Jérémie Zimmermann For almost 15 years, "Internet Governance" meetings1 have been drawing attention and driving our imaginaries towards believing that consensual rules for the Internet could emerge from global "multi-stakeholder" discussions. A few days ahead of the "NETmundial" Forum in Sao Paulo it has become obvious that "Internet Governance" is a farcical way of keeping us busy and hiding a sad reality: Nothing concrete in these 15 years, not a single action, ever emerged from "multi-stakeholder" meetings, while at the same time, technology as a whole has been turned against its users, as a tool for surveillance, control and oppression.
Gonzalo San Gil, PhD.

Get what you paid for with open source | Opensource.com - 0 views

  •  
    "The other day I heard the phrase every open source educator hates to hear: "Well, you get what you pay for..." So, this time in my talk to the group, instead of explaining that 'free' means 'free as in freedom' not 'free of cost', I changed it up. I replied, "You're right you do.""
  •  
    "The other day I heard the phrase every open source educator hates to hear: "Well, you get what you pay for..." So, this time in my talk to the group, instead of explaining that 'free' means 'free as in freedom' not 'free of cost', I changed it up. I replied, "You're right you do.""
‹ Previous 21 - 40 of 257 Next › Last »
Showing 20 items per page