:: Re: [Bricolabs] Resistance, Liberat…
Página superior
Eliminar este mensaje
Responder a este mensaje
Autor: Paw
Fecha:  
A: Bricolabs
Asunto: Re: [Bricolabs] Resistance, Liberation Technology
That was really funny

On 02-04-2013 16:24, yto lab wrote:
> Is this exists in spanish?
> Thanks!!!
>
> Yto
>
>
> On Tue, Apr 2, 2013 at 5:20 AM, Atteqa Malik <atteqa@???
> <mailto:atteqa@gmail.com>> wrote:
>
>     cant access the link is it just  a problem on my side?

>
>
>
>     On Tue, Apr 2, 2013 at 12:48 PM, Jean-Noël Montagné
>     <jnm@??? <mailto:jnm@autistici.org>> wrote:

>
>
>          newly published, may interest some people on bricolist. PDF
>         download.

>
>
>         Resistance, Liberation Technology
>         and Human Rights in the Digital Age
>         byGiovanni Ziccardi
>          300 pages, pdf
>         http://cryptome.org/2013/03/hacking-digital-dissidence.pdf

>
>         summary below

>
>
>         JN

>
>
>
>         summary

>
>         *Opening Remarks: Hacking and Digital
>         Dissidence*.............................. 1
>           1.1 Using Computers for the Pursuit of Political and Social
>         Changes and for the Bene fi t of All Mankind
>         ..................................... 1
>           1.2 From Early Hackers to Digital Resistance Activities
>         ........................ 5
>           1.3 The So-Called /Twitter Revolutions/
>         .................................................... 7
>           1.4 The Worldwide Scenario, and Some Preliminary
>         Interpretative Questions
>         .....................................................................
>         9
>           References
>         ...................................................................................................
>         22
>         *2 Digital Resistance, Digital Liberties and Digital
>         Transparency* ........... 27
>           2.1 A Preliminary De fi nition of /Digital Resistance/
>         and /Digital Liberties/
>         ..........................................................................
>         27
>           2.1.1 Some Focal Aspects of Digital Dissidence
>         ............................ 27
>           2.1.2 Preliminary Legal and Political Remarks
>         .............................. 28
>           2.1.3 The Power of Technology in Critical Contexts
>         and the New Public Sphere
>         .................................................... 30
>           2.2 The Fundamental Role of a Secure (and Peer-Reviewed)
>         Liberation Technology: The /Haystack/ Case-History
>         ......................... 32
>           2.3 Two Key Aspects of Digital Resistance Activities,
>         and Several Case Studies
>         ...................................................................
>         36
>           2.3.1 The Key Aspects of Dissident Activities
>         ............................... 36
>           2.3.2 Digital Resistance Case-Studies
>         ............................................. 41
>           2.4 Open Government, Collaborative Transparency
>         and Civic Hacking as a Form of Digital Resistance
>         .......................... 47
>           2.4.1 The Idea of Government as a Platform
>         for
>         Transparency.....................................................................
>         47
>           2.4.2 The Metaphor of Government 2.0 and the Idea
>         of Collaborative Transparency
>         ............................................... 49
>         2.4.3 Citizen Engagement for the Oversight
>         of Political Activity
>         ................................................................
>         51
>           2.4.4 Collaborative Mapping and Digital Resistance
>         ...................... 59
>           References
>         ...................................................................................................
>         68
>         *3 Hacking and Digital Dissidence Activities*
>         .............................................. 73
>             3.1 The Role of Hackers in the Landscape of Digital
>         Resistance .......... 73
>             3.2 A First Analysis of Common Threats to Digital
>         Freedom and to Hacker Activities
>         ................................................... 74
>             3.3 Being a Hacker in This Framework
>         ................................................. 76
>            3.3.1 Thinking Like a Hacker
>         ....................................................... 76
>            3.3.2 State Antagonism, Fear and Violence
>         .................................. 79
>             3.4 A Brand New Playground
>         ................................................................
>         81
>            3.4.1 Liberation Technologies
>         ....................................................... 81
>            3.4.2 Anonymity and Bloggers' Rights
>         ........................................ 84
>            3.4.3 Innovation
>         ............................................................................
>         86
>            3.4.4 Intellectual Property and Privacy
>         ......................................... 86
>            3.4.5 EPIC Activities in the Field of Privacy
>         ................................ 88
>            3.4.6 Transparency
>         ........................................................................
>         89
>             3.5 A New Perspective on Hacking
>         ....................................................... 90
>            3.5.1 The Essence of hacking
>         ....................................................... 90
>            3.5.2 The Hacker Spirit and Some Lessons
>         from the  Ushahidi  Project
>         .................................................... 91
>            3.5.3 A New Breed of Hackers
>         ..................................................... 94
>             3.6 The/Do-It-Yourself/ Approach
>         ........................................................... 97
>             3.7 The Hacker Ethic
>         .............................................................................
>         99
>             3.8 Hacking and Crime
>         ..........................................................................
>         101
>             3.9 Threats to Hackers
>         ...........................................................................
>         105
>            3.9.1 The EFF Report Unintended Consequences
>         ........................ 105
>            3.9.2 Some Signi fi cant Recent Legal Cases:
>         Cease-and-Desist Actions
>         .................................................... 106
>            3.10 Hacking Electronic Voting Machines
>         for the Purpose of Transparency
>         ...................................................... 117
>           References
>         ...................................................................................................
>         122
>         *4 Digital Resistance, Digital Liberties and Human Rights*
>         ....................... 125
>             4.1 Internet and Human Rights
>         ..............................................................
>         125
>             4.2 Internet and the/Universal Declaration of Human
>         Rights/ ............... 130
>             4.3 The Council of Europe and the Human Rights Guidelines
>         for Internet Service Providers: The Role of ISPs
>         in Human Rights Environments and Protection
>         ............................... 133
>             4.4 The WSIS Declaration of Principles
>         ................................................ 134
>             4.5 The 2011 United Nations Report on the Promotion
>         and Protection of the Right to Freedom of Opinion
>         and Expression
>         .................................................................................
>         137
>             4.6 A Charter of Human Rights and Principles for the
>         Internet ............ 144
>          4.7 The "Bill of Rights" Projects
>         ........................................................... 152
>            4.7.1 The Internet Bill of Rights Drafted
>         within the IGF Works
>         ........................................................... 152
>            4.7.2 The Internet Rights and Principles Dynamic
>         Coalition Bill of Rights
>         ........................................................ 154
>             4.7.3 A Bill of Rights in Cyberspace
>         ............................................ 155
>             4.7.4 The EFF  Bill of Privacy Rights
>         for/Social Network Users/
>         ..................................................... 156
>            4.8 A Human Rights Approach to the Mobile Internet
>         ............................ 157
>            4.9 The Relationship Between Human Rights and Technology
>         Sales to Oppressive Regimes
>         ............................................................. 159
>           References
>         ...................................................................................................
>         159
>         *5 The Use of Liberation Technology*
>         ........................................................... 161
>            5.1 Technical Resistance Tactics
>         ..............................................................
>         161
>            5.2 Surveillance Self-Defense or Self-Defense Against
>         Surveillance and Monitoring
>         ..............................................................
>         167
>            5.3 A Recent Circumvention Tool Usage Report
>         .................................... 169
>            5.4 Tools and Guides
>         ................................................................................
>         171
>             5.4.1 Leaping Over the Firewall: A Review of Censorship
>         Circumvention Tools by/Freedom
>         House/............................. 171
>             5.4.2 Ten Fundamental Aspects of a Typical Liberation
>         Technology Tool
>         ..................................................................
>         176
>             5.4.3 An Interesting (Comparative) Article
>         on Real Anonimity of VPN Systems Users
>         ......................... 180
>           References
>         ...................................................................................................
>         184
>         *6 Digital Activism, Internet Control, Transparency,*
>         *Censorship, Surveillance and Human Rights:
>         An International Perspective*
>         ...................................................................
>         187
>            6.1 An Introductory Overview
>         .................................................................
>         187
>             6.1.1 The Global  OpenNet Initiative Analysis
>         .............................. 187
>             6.1.2 Techniques and Tools Commonly Used to Censor
>         .............. 201
>            6.2 An Analysis of Several Countries with Critical
>         Human Rights Issues
>         ..........................................................................
>         203
>             6.2.1 Burma: Internet and Human Rights in a Particular
>         Technological, Political and Legal Framework
>         ................... 203
>             6.2.2 Cuba: Internet Control, User Restrictions, Legal
>         and Regulatory Frameworks, Blogosphere,
>         Digital Dissidents and Civil Society
>         .................................... 214
>             6.2.3 South Korea: Digital Resistance Issues
>         ............................... 227
>             6.2.4 Saudi Arabia: The Digital Liberties Landscape
>         ................... 230
>             6.2.5 Syria: Digital Liberties Issues
>         .............................................. 233
>             6.2.6 Iran: Internet and Digital Liberties Issues
>         ............................ 239
>             6.2.7 China: The Internet and Types and Levels
>         of Chinese Internet Censorship
>         ............................................ 247
>          6.2.8 Turkmenistan: Censorship and Control
>         ............................... 259
>             6.2.9 Uzbekistan: Internet, Censorship and Surveillance
>         ............. 262
>            6.2.10 Vietnam: Digital Resistance and Censorship
>         ....................... 269
>            6.2.11 Australia: Internet Filtering Policies, Digital
>         Liberties
>         and Circumvention Tools
>         ..................................................... 273
>            6.2.12 Iceland: Digital Resistance Issues
>         and Freedom of Information
>         ................................................ 279
>            6.2.13 India: Freedom of Speech, Freedom of Information
>         and Electronic Censorship
>         ................................................... 283
>            6.2.14 Russia. Internet and Human Rights: Political
>         and Technological Frameworks
>         ........................................... 290
>            6.2.15 North Korea: The Main Digital Liberties Issues
>         .................. 295
>            6.3 Revolts and Digital Dissidence in Egypt and Tunisia:
>         Where It All Began
>         ............................................................................
>         301
>             6.3.1 A Brief Summary of Digital Dissidence in Egypt
>         ............... 301
>             6.3.2 A Brief Summary of Digital Dissidence in Tunisia
>         ............. 303
>           References
>         ...................................................................................................
>         304
>         *7 Conclusions: The Landscape of Digital Liberties and the
>         Future* ........ 309
>            7.1 Human Rights in the Digital Era and the Role of Law
>         ...................... 309
>            7.2 Technology as an/Antibody/
>         ................................................................
>         311
>            7.3 The Technological Scenario
>         ............................................................... 313

>
>            7.4 The Relationships Between Hacking and Digital
>         Resistance ............ 314
>           References
>         ...................................................................................................
>         315
>         * Author
>         Index*....................................................................................................
>         317
>         *Subject Index*
>         ...................................................................................................
>         321

>
>
>
>         _______________________________________________
>         Brico mailing list
>         Website on http://www.bricolabs.net
>         Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico

>
>
>
>     _______________________________________________
>     Brico mailing list
>     Website on http://www.bricolabs.net
>     Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico

>
>
>
>
> --
> Yto Aranda
>
> www.yto.cl <http://www.yto.cl>
> www.escaner.cl <http://www.escaner.cl>
> www.abierta.cl <http://www.abierta.cl>
>
>
> _______________________________________________
> Brico mailing list
> Website on http://www.bricolabs.net
> Unsubscribe: http://lists.dyne.org/mailman/listinfo/brico