Motherboard | Accueil | Motherboard

https://motherboard.vice.com

  • Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps
    https://motherboard.vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-apps

    “I can absolutely make a big traffic problem all over the world,” the hacker said. A hacker broke into thousands of accounts belonging to users of two GPS tracker apps, giving him the ability to monitor the locations of tens of thousands of vehicles and even turn off the engines for some of them while they were in motion, Motherboard has learned. The hacker, who goes by the name L&M, told Motherboard he hacked into more than 7,000 iTrack accounts and more than 20,000 ProTrack accounts, (...)

    #GPS #géolocalisation #hacking

  • Qu’est-ce que l’effet #nocebo ?
    https://motherboard.vice.com/fr/article/59xe9b/le-pouvoir-de-leffet-nocebo

    « Au secours ! J’ai avalé tous mes comprimés. » Un homme de 26 ans s’effondre sur le sol de la salle des urgences. Un flacon de médicaments vide glisse de ses mains.

    Monsieur A., cité dans cette étude de cas datant de 2007, était encore conscient malgré son visage pâle et son état comateux et léthargique. Il avait expliqué aux médecins qu’après une dispute avec sa petite amie, il avait avalé 29 comprimés sans réfléchir. Les comprimés, un médicament expérimental pour soigner la dépression, lui avaient été donnés pour une étude clinique.

    Les médicaments faisaient très clairement effet : la pression sanguine de monsieur A avait étonnamment chuté et sa fréquence cardiaque était passée à 110 battements par minute. Après quatre heures sous intraveineuse, les médecins n’ont guère constaté d’amélioration.

    Enfin, un spécialiste qui encadrait l’étude clinique est arrivé. Il a expliqué que monsieur A. faisait partie des patients du groupe placebo, qui avaient été sélectionnés aléatoirement, donc sans savoir qu’ils avaient reçu des comprimés sans aucun effet. Chaque symptôme dont il souffrait ne provenait donc pas des comprimés, mais de son imagination.

    Monsieur A exprima sa surprise puis se mit à pleurer de soulagement. En 15 minutes, sa pression sanguine et son rythme cardiaque étaient redevenus normaux. Il allait bien. L’étude explique que « l’hypotension de monsieur A. provenait donc d’une overdose de placebos ». Un phénomène également connu sous le nom d’effet nocebo.

  • Le Dolcett : les hommes qui rêvent de manger des femmes - Motherboard
    https://motherboard.vice.com/fr/article/bm7xbz/le-dolcett-le-fantasme-de-manger-des-femmes

    Il restait néanmoins un spécimen de fétichiste plus rare que les autres à documenter : le cannibale. Mon sang ne fit donc qu’un tour lorsque l’un de mes contacts m’annonça qu’il en avait rencontré un de qualité supérieure. « Il est super sympa » affirma-t-il. « Je lui ai parlé de toi, il fait partie d’une grande communauté d’hommes et de femmes qui se dévorent entre eux, et il a accepté de t’en parler. Ça s’appelle le Dolcett. »

    #Cannibalisme #Dolcett #sexualité

  • A Saudi Cybersecurity Company Tried to Buy Zero Day Exploits from Me
    https://motherboard.vice.com/en_us/article/xwbk5j/saudi-cybersecurity-company-tried-buy-zero-days-from-me-haboob-dar

    We recently got a rare look at how a company tried to source these exploits through private one-on-one deals—because the company came to us. Zero days—exploits that take advantage of vulnerabilities the vendor, such as Apple, doesn’t know about—are a hot commodity. With a zero day, a hacker, perhaps working for a government, can have a better chance of being able to break into a target’s computer or phone. If Apple or Google aren’t even aware of a security issue with their products, hackers (...)

    #DarkMatter #Haboob #hacking

  • (1) « Bon cul », « salope », « pétasse »… A « Vice », des mecs plus qu’ultras - Libération
    https://www.liberation.fr/france/2019/03/12/bon-cul-salope-petasse-a-vice-des-mecs-plus-qu-ultras_1714627

    Dans la filiale française du média nord-américain, des hommes, en grande partie des journalistes, ont longtemps dénigré, insulté et harcelé leurs collègues femmes. « Libération » a recueilli les témoignages de victimes de ce système sexiste généralisé dans l’entreprise.

    « Bon cul », « salope », « pétasse »… A « Vice », des mecs plus qu’ultras

    « Mitard Party. » C’est le nom d’un événement privé, organisé sur Facebook le 1er juillet 2017, par l’ancien directeur de la rédaction française de Vice. D’un ton badin, plein de forfanterie, Sébastien C. invite dans un bar parisien quelques collègues du média d’information et de divertissement, filiale hexagonale du géant nord-américain Vice Media, en ces termes : « Lundi 3 juillet à 9 heures […], je passe en jugement pour "violences volontaires avec arme" suite à une affaire ultranulle survenue l’été dernier et dont pas mal d’entre vous sont déjà au courant. Comme c’est pas tous les jours qu’on a une chance de se retrouver en taule - une chance mince, selon mon avocate, mais sait-on jamais -, j’aimerais fêter ça en buvant des trucs avec vous et en échangeant des regards virils qui en disent long comme dans les clips de rap. » En illustration de l’événement : une photo du rappeur américain Gucci Mane, plusieurs fois emprisonné pour violences et possession de drogue.

    #sexisme #culture_du_viol

    • A lire les titres des articles du violeur présumé on découvre des fantasmes et dadas bien maculins.
      https://motherboard.vice.com/fr/contributor/sebastien-chavigner

      Il m’a quand même eu avec un truc assez gros :

      Toutankhamon possédait un poignard forgé avec du fer extraterrestre
      https://motherboard.vice.com/fr/article/53ybzk/toutankhamon-possedait-un-poignard-forge-avec-du-fer-extraterrestr

      C’est qu’on a tous les deux vu Le Cinquième Élément , cette oeuvre de l’autre homme qui aimait les femmes qui depuis a été écarté du cercle des immortels pour cause d’avances inopportuns faites à ses contemporains féminins, enfin c’est ce qu’on m’a raconté sur Besson, je n’ai pas suivi l’affaire de près.

      Natalie Portman Audition for Léon (1994)
      https://www.youtube.com/watch?v=VQsas1ST33Y

      A son age Natalie Portman ne se rendait sans doute pas compte de tout ce qui se passait, aujourd’hui elle comprend et explique très bien les mécanismes qui mènent au viol :
      https://seenthis.net/messages/766958

      Luc Besson and the Disturbing True Story Behind ‘Léon : The Professional’
      https://www.thedailybeast.com/luc-besson-and-the-disturbing-true-story-behind-leon-the-professional

      ... the film was a critical and commercial hit, grossing $46 million worldwide against a $16 million budget and elevating Besson to the A-list.

      What many were—and still are—unaware of was that Léon was a creepy example of art imitating life.

      According to The Washington Post, Besson met the child actress Maïwenn when she was 12, the same age as Mathilda in the film. He was 29. They claim to have started seeing each other romantically when she turned 15. Maïwenn gave birth to their daughter when she was 16 (and Besson was 33), and subsequently relocated to Los Angeles. She appears briefly during the opening sequences of Léon as “blonde babe”—her listed character name—lying naked in bed, her body wrapped in sheets, having just serviced a middle-age crime boss.

      “When Luc Besson did Léon, the story of a 13-year-old girl in love with an older man, it was very inspired by us since it was written while our story started. But no media made the link,” Maïwenn said.

      In an interview with the French publication L’Express, Maïwenn claimed that Léon was “this love story between a 12-year-old girl and a 30-year-old man [that] was still very much inspired by ours,” and explained how she attempted to write a book about her relationship with Besson and years rubbing shoulders with movie stars in Los Angeles. But when the publisher gave it the title Beverly Hills or Lolita Love, she banned its publication. (Maïwenn did not respond to requests for comment for this story, while a representative for Besson issued the following statement to The Daily Beast: “Luc Besson has never commented [on] his private life, his approach remains unchanged.”)

      During the filming of Besson’s follow-up movie, The Fifth Element, wherein Maïwenn portrayed the memorable blue opera-singing alien Diva Plavalaguna, the director left her for the film’s lead actress, Milla Jovovich. “I had my daughter very young, so I had fulfilled my dream, and then… he left me. Everything then collapsed for me,” Maïwenn recalled. She moved back to France with their young daughter and gradually evolved into a gifted filmmaker.

      Her most acclaimed film to date is the 2011 drama Polisse, about a photographer (Maïwenn) assigned to shadow a Child Protection Unit that tracks down pedophiles and rescues sexually exploited children.

      Bon, fini les histoires anciennes, voici les parents moderndes de futures stars de cinéma :
      https://www.youtube.com/watch?v=hMgZ4kAt6PA

      #misogynie #pédophilie

  • Hacker Who Stole $5 Million By SIM Swapping Gets 10 Years in Prison
    https://motherboard.vice.com/en_us/article/gyaqnb/hacker-joel-ortiz-sim-swapping-10-years-in-prison

    A 20-year-old college student who was accused of stealing more than $5 million in cryptocurrency in a slew of SIM hijacking attacks is the first person to be sentenced for the crime. A college student who stole more than $5 million in cryptocurrency by hijacking the phone numbers of around 40 victims pleaded guilty and accepted a plea deal of 10 years in prison, Motherboard has learned. Joel Ortiz accepted the plea deal last week, Erin West, the Deputy District Attorney in Santa Clara (...)

    #Google #SIM #SIMswapping

  • I Gave a Bounty Hunter $300. Then He Located Our Phone
    https://motherboard.vice.com/en_us/article/nepxbz/i-gave-a-bounty-hunter-300-dollars-located-phone-microbilt-zumigo-

    T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country. Nervously, I gave a bounty hunter a phone number. He had offered to geolocate a phone for me, using a shady, overlooked service intended not for the cops, but for private individuals and businesses. Armed with just the number and a few hundred dollars, he said he (...)

    #T-Mobile #Sprint #AT&T #Apple_Maps #Maps #smartphone #géolocalisation #harcèlement

    ##AT&T

  • Why Signal and not Threema ? : signal
    https://www.reddit.com/r/signal/comments/852qor/why_signal_and_not_threema

    Signal is open source, Threema is not, so that disqualifies Threema as a secure app in my opinion. You could as well continue using WhatsApp since it’s also end to end encrypted but closed source. Wire is another great alternative, and it’s German.

    Hacker erklären, welche Messenger-App am sichersten ist - Motherboard
    https://motherboard.vice.com/de/article/7xea4z/hacker-erklaren-welche-messenger-app-am-sichersten-ist


    C’est en allemand, mais c’est valable sans égard de la langue que vous utilisez pour votre communication.
    – La communication sécurisée en ligne doit obligatoirement passer par une app et un prootocole open source.
    – Il vous faut un système qui exclue ou rend très difficile la collection de métatdonnées par des tiers.
    – Votre système de communication « voice » et « chat » doit fonctionner avec des clients smartphome et desktop si vous voulez entretenir un fil de commmunication indépendamment du type d’appareil à votre disposition.

    Passons sur les exigences plus poussées, je ne vois que Signal qui satisfait tous ces besoins. Après on peut toujours utiliser plusieurs « messenger apps » afin de rester au courant des « updates » de tout le monde - à l’exception des apps de Facebook (Whatsapp), Wechat et Google parce que leur utilistion constitue une menace de votre vie privée simplement par l’installation sur votre portable.

    Roland Schilling (33) und Frieder Steinmetz (28) haben vor sechs Jahren begonnen, an der TU Hamburg unter anderem zu dieser Frage zu forschen. In einer Zeit, als noch niemand den Namen Edward Snowden auch nur gehört hatte, brüteten Schilling und Steinmetz bereits über die Vor- und Nachteile verschiedener Verschlüsselungsprotokolle und Messenger-Apps. So haben sie beispielsweise im vergangenen Jahr geschafft, die Verschlüsselung von Threema per Reverse Engineering nachzuvollziehen.

    Ihre Forschung ist mittlerweile zu einer Art Aktivismus und Hobby geworden, sagen die beiden: Sie wollen Menschen außerhalb von Fachkreisen vermitteln, wie elementar die Privatsphäre in einer Demokratie ist. Im Interview erklären sie, auf was man bei der Wahl des Messengers achten soll, welche App in punkto Sicherheit nicht unbedingt hält, was sie verspricht und warum Kreditinstitute sich über datenhungrige Messenger freuen.
    ...
    Roland Schilling: Bei mir ist es anders. Ich bringe die Leute einfach dazu, die Apps zu benutzen, die ich auch nutze. Das sind ausschließlich Threema, Signal und Wire. Wenn Leute mit mir reden wollen, dann klappt das eigentlich immer auf einer von den Dreien.
    ...
    Frieder: ... Signal und WhatsApp etwa setzen auf die gleiche technische Grundlage, das Signal-Protokoll, unterscheiden sich aber in Nuancen. Threema hat ein eigenes, nicht ganz schlechtes Protokoll, das aber beispielsweise keine ‘Perfect Forward Secrecy’ garantiert. Die Technik verhindert, dass jemand mir in der Zukunft meinen geheimen Schlüssel vom Handy klaut und damit meine gesamte verschlüsselte Kommunikation entschlüsseln kann, die ich über das Handy geführt habe. Signal und WhatsApp haben das.
    ...
    Roland: Ein gutes Messenger-Protokoll ist Open Source und ermöglicht damit Forschern und der Öffentlichkeit, eventuell bestehende Schwachstellen zu entdecken und das Protokoll zu verbessern. Leider gibt es auf dem Messenger-Markt auch viele Angebote, die ihre vorgebliche „Verschlüsselung“ diesem Prozess entziehen und geheim halten, oder das Protokoll zwar veröffentlichen, aber auf Kritik nicht eingehen.

    Secure WhatsApp Alternatives – Messenger Comparison
    https://www.boxcryptor.com/en/blog/post/encryption-comparison-secure-messaging-apps

    Threema and Telegram under Control of Russia’s Government ?
    https://medium.com/@vadiman/threema-and-telegram-under-control-of-russias-government-f81f8e28714b

    WhatsApp Exploited by NSA and US Secret Services?
    Go to the profile of Vadim An
    Vadim An
    Mar 7, 2018
    This is the end of era centralized communication!

    The 2017/2018 years are hot and saturated with cybersecurity challenges. Almost every week, a major media source reported hacking incidents or backdoor exploits in popular communication and messaging services. Some of which granted government agents unauthorized access to private and confidential information from within the communications industry.

    According to mass-media reports, one of the most popular Swiss secure messaging apps Threema moved under the control of the Russian government and has been listed in the official registry with a view to controlling user communications.

    This can be seen on regulatory public website https://97-fz.rkn.gov.ru/organizer-dissemination/viewregistry/#searchform

    This knockout news was commented by Crypviser — innovative German developer of the most secure instant communication platform based on Blockchain technologies, of the point of view, what does it mean for millions of Threema users?

    To answer this question, let’s understand the requirements for getting listed in this registry as an “information-dissemination organizers” according to a new Russian federal law, beginning from 01 June 2018.

    The law requires that all companies listed in internet regulator’s registry must store all users’ metadata (“information about the arrival, transmission, delivery, and processing of voice data, written text, images, sounds, or other kinds of action”), along with content of correspondence, voice call records and make it accessible to the Russian authorities. Websites can avoid the hassle of setting aside this information by granting Russian officials unfettered, constant access to their entire data stream.

    This is very bad news for Threema users. Threema officials have reported that they are not aware of any requirements to store, collect, or provide information. Maybe not yet though since there is still some time until 01 June 2018 when the new law kicks in and Threema will be obligated to provide direct access to sensitive user’s data.

    It’s possible that Threema is fully aware of this despite claiming otherwise. They may realize that the most popular messenger in Russia, Telegram, has been under pressure since refusing to officially cooperate with Russian secret services. If Russia takes steps to block Telegram as a result, then Threema would become the next best alternative service. That is assuming they’re willing to violating the security and privacy rights of its users by giving in to the new law’s requirements.

    Based on the reports of Financial Time magazine, the Telegram founder agreed to register their app with Russian censors by the end of June 2017. This, however; is not a big loss for Telegram community because of the lack of security in Telegram to date. During the last 2 years, its security protocol has been criticized many times and many security issues were found by researchers. Although there is no direct evidence showing that Telegram has already cooperated with the Russian government or other governments, these exploitable bugs and poor security models make Telegram users vulnerable victims to hackers and secret services of different countries.

    The same security benchmark issues have been explored in the biggest communication app WhatsApp. The security model of WhatsApp has been recognized as vulnerable by the most reputed cryptographic experts and researchers worldwide. According to the Guardian, a serious “backdoor” was found in encryption. More specifically, the key exchange algorithm.

    A common security practice in encrypted messaging services involves the generation and store of a private encryption key offline on the user’s device. And only the public key gets broadcasted to other users through the company’s server. In the case of WhatsApp, we have to trust the company that it will not alter public key exchange mechanism between the sender and receiver to perform man-in-the-middle attack for snooping of users encrypted private communication.

    Tobias Boelter, security researcher from the University of California, has reported that WhatsApp’s end-to-end encryption, based on Signal protocol, has been implemented in a way that if WhatsApp or any hacker intercepts your chats, by exploiting trust-based key exchange mechanism, you will never come to know if any change in encryption key has occurred in the background.

    The Guardian reports, “WhatsApp has implemented a backdoor into the Signal protocol, giving itself the ability to force the generation of new encryption keys for offline users and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered. The recipient is not made aware of this change in encryption.”

    But on the other hand, the developer of Signal messaging app Open Whisper Systems says, ”There is no WhatsApp backdoor”, “it is how cryptography works,” and the MITM attack “is endemic to public key cryptography, not just WhatsApp.”

    It’s worth noting that none of the security experts or the company itself have denied the fact that, if required by the government, WhatsApp can intercept your chats. They do say; however, WhatsApp is designed to be simple, and users should not lose access to messages sent to them when their encryption key is changed. With this statement, agrees on a cybersecurity expert and CTO of Crypviser, Vadim Andryan.

    “The Man-in-the-Middle attack threat is the biggest and historical challenge of asymmetric cryptography, which is the base of end-to-end encryption model. It’s hard to say, is this “backdoor” admitted intentionally or its became on front due lack of reliable public — key authentication model. But it definitely one of the huge disadvantages of current cryptographic models used for secure instant communication networks, and one of the main advantage of Crypviser platform.”

    Crypviser has introduced a new era of cryptography based on Blockchain technologies. It utilizes Blockchain to eliminate all threats of Man-in-the-Middle attack and solves the historical public key encryption issue by using decentralized encryption keys, exchanges, and authorization algorithms. The authentication model of Crypviser provides public key distribution and authorization in peer-to-peer or automated mode through Blockchain.

    After commercial launch of Crypviser unified app, ”messenger” for secure social communication will be available on the market in free and premium plans. The free plan in peer-to-peer authentication mode requires user interaction to check security codes for every new chat and call. The full-featured premium plan offers Blockchain based automated encryption model and powerful professional security features on all levels.

    You can see the comperisation table of Crypviser with centralized alternatives in the below table

    #internet #communication #sécurité #vie_privée

  • The Rise and Demise of RSS
    https://motherboard.vice.com/en_us/article/a3mm4z/the-rise-and-demise-of-rss

    Before the internet was consolidated into centralized information silos, RSS imagined a better way to let users control their online personas.

    The story of how this happened is really two stories. The first is a story about a broad vision for the web’s future that never quite came to fruition. The second is a story about how a collaborative effort to improve a popular standard devolved into one of the most contentious forks in the history of open-source software development.

    RSS was one of the standards that promised to deliver this syndicated future. To Werbach, RSS was “the leading example of a lightweight syndication protocol.” Another contemporaneous article called RSS the first protocol to realize the potential of Extensible Markup Language (XML), a general-purpose markup language similar to HTML that had recently been developed. It was going to be a way for both users and content aggregators to create their own customized channels out of everything the web had to offer. And yet, two decades later, after the rise of social media and Google’s decision to shut down Google Reader, RSS appears to be a slowly dying technology, now used chiefly by podcasters, programmers with tech blogs, and the occasional journalist. Though of course some people really do still rely on RSS readers, stubbornly adding an RSS feed to your blog, even in 2019, is a political statement. That little tangerine bubble has become a wistful symbol of defiance against a centralized web increasingly controlled by a handful of corporations, a web that hardly resembles the syndicated web of Werbach’s imagining.

    RSS would fork again in 2003, when several developers frustrated with the bickering in the RSS community sought to create an entirely new format. These developers created Atom, a format that did away with RDF but embraced XML namespaces. Atom would eventually be specified by a standard submitted to the Internet Engineering Task Force, the organization responsible for establishing and promoting the internet’s rules of the road. After the introduction of Atom, there were three competing versions of RSS: Winer’s RSS 0.92 (updated to RSS 2.0 in 2002 and renamed “Really Simple Syndication”), the RSS-DEV Working Group’s RSS 1.0, and Atom. Today we mostly use RSS 2.0 and Atom.

    For a while, before a third of the planet had signed up for Facebook, RSS was simply how many people stayed abreast of news on the internet.

    Today, RSS is not dead. But neither is it anywhere near as popular as it once was. Lots of people have offered explanations for why RSS lost its broad appeal. Perhaps the most persuasive explanation is exactly the one offered by Gillmor in 2009. Social networks, just like RSS, provide a feed featuring all the latest news on the internet. Social networks took over from RSS because they were simply better feeds. They also provide more benefits to the companies that own them. Some people have accused Google, for example, of shutting down Google Reader in order to encourage people to use Google+.

    RSS might have been able to overcome some of these limitations if it had been further developed. Maybe RSS could have been extended somehow so that friends subscribed to the same channel could syndicate their thoughts about an article to each other. Maybe browser support could have been improved. But whereas a company like Facebook was able to “move fast and break things,” the RSS developer community was stuck trying to achieve consensus. When they failed to agree on a single standard, effort that could have gone into improving RSS was instead squandered on duplicating work that had already been done. Davis told me, for example, that Atom would not have been necessary if the members of the Syndication mailing list had been able to compromise and collaborate, and “all that cleanup work could have been put into RSS to strengthen it.” So if we are asking ourselves why RSS is no longer popular, a good first-order explanation is that social networks supplanted it. If we ask ourselves why social networks were able to supplant it, then the answer may be that the people trying to make RSS succeed faced a problem much harder than, say, building Facebook. As Dornfest wrote to the Syndication mailing list at one point, “currently it’s the politics far more than the serialization that’s far from simple.”

    #RSS #Histoire_informatique #Politique_algorithme #Normalisation

    • J’apprécie, comme toi, qu’il fasse remarquer que les décisions
      techniques ont des conséquences politiques. Il est clair que l’abandon de facto de la #syndication SS a accéléré le passage d’un web décentralisé vers un web polarisé par les GAFA. Je suis moins convaincu par ses explications sur les raisons pour lesquelles la syndication n’a pas tenu sur le long terme :

      – dire que RSS n’est pas user-friendly est franchement débile. RSS est un format. L’utilisateur ne le voit pas. Quasiment aucun utilisateur
      de RSS, que ce soit côté producteur ou consommateur, n’a regardé à quoi ça ressemblait en utilisant vi ! Un logiciel peut être
      « user-friendly » ou pas. Pour un format, ça n’a pas de sens.

      – je trouve qu’il exagère le rôle des disputes au sein du monde de la
      syndication. Certes, ces disputes ont pu contribuer à semer le trouble mais n’exagérons pas : ça se passait dans un tout petit microcosme et la grande majorité des webmestres et des lecteurs n’en ont jamais entendu parler. (Au passage, le camp vainqueur est nettement celui qui voulait un format simple : les sites Web n’utilisent qu’une petite partie du format.) Et, d’une point de vue pratique, ces disputes n’ont eu aucune conséquence : tous les logiciels de lecture comprennent les trois formats. Le webmestre peut donc publier ce qu’il veut, sans inquiétude.

      – par contre, il parle trop peu des raisons politico-marketing de
      l’abandon de la syndication : propagande effrénée des médias et
      autres autorités en faveur des solutions centralisées, notamment.

  • The roundabout revolutions

    The history of these banal, utilitarian instruments of traffic management has become entangled with that of political uprising, #Eyal_Weizman argues in his latest book

    This project started with a photograph. It was one of the most arresting images depicting the May 1980 #Gwangju uprising, recognised now as the first step in the eventual overthrow of the military dictatorship in South Korea. The photograph (above) depicts a large crowd of people occupying a roundabout in the city center. Atop a disused fountain in the middle of the roundabout a few protestors have unfurled a South Korean flag. The roundabout organised the protest in concentric circles, a geometric order that exposed the crowd to itself, helping a political collective in becoming.

    It had an uncanny resonance with events that had just unfolded: in the previous year a series of popular uprisings spread through Tunisia, Egypt, Bahrain, #Oman, Yemen, Libya, and Syria. These events shared with Gwangju not only the historical circumstances – they too were popular protests against military dictatorships – but, remarkably, an urban-architectural setting: many of them similarly erupted on roundabouts in downtown areas. The history of these roundabouts is entangled with the revolutions that rose from them.

    The photograph of the roundabout—now the symbol of the “liberated republic” – was taken by #Na_Kyung-taek from the roof of the occupied Provincial Hall, looking toward Geumnam-ro, only a few hours before the fall of the “#Gwangju_Republic”. In the early morning hours of the following day, the Gwangju uprising was overwhelmed by military force employing tanks and other armed vehicles. The last stand took place at the roundabout.

    The scene immediately resonates with the well-known photographs of people gathering in #Tahrir_Square in early 2011. Taken from different high-rise buildings around the square, a distinct feature in these images is the traffic circle visible by the way it organises bodies and objects in space. These images became the symbol of the revolution that led to the overthrow of President Hosni Mubarak in February 2011 – an event described by urban historian Nezar AlSayyad as “Cairo’s roundabout revolution”. But the Gwangju photograph also connects to images of other roundabouts that erupted in dissent in fast succession throughout the Middle East. Before Tahrir, as Jonathan Liu noted in his essay Roundabouts and Revolutions, it was the main roundabout in the capital of Tunisia – subsequently renamed Place du 14 Janvier 2011 after the date on which President Zine el-Abidine Ben Ali was forced to flee the country. Thousands of protesters gathered at the roundabout in Tunis and filled the city’s main boulevard.

    A main roundabout in Bahrain’s capital Manama erupted in protests shortly after the overthrow of Mubarak in Egypt. Its central traffic island became the site of popular protests against the government and the first decisive act of military repression: the protests were violently broken up and the roundabout itself destroyed and replaced with a traffic intersection. In solidarity with the Tahrir protests, the roundabouts in the small al-Manara Square in Ramallah and the immense Azadi Square in Tehran also filled with protesters. These events, too, were violently suppressed.

    The roundabouts in Tehran and Ramallah had also been the scenes of previous revolts. In 2009 the Azadi roundabout in Iran’s capital was the site of the main protests of the Green Movement contesting President Mahmoud Ahmadinejad’s reelection. Hamid Dabashi, a literature professor at Columbia University and one of the most outspoken public intellectuals on these revolutions, claims that the Green Movement was inspirational for the subsequent revolutionary wave in the Arab world. In Palestine, revolt was a permanent consequence of life under occupation, and the al-Manara roundabout was a frequent site of clashes between Palestinian youth and the Israeli military. The sequence of roundabout revolutions evolved as acts of imitation, each building on its predecessor, each helping propel the next.

    Roundabouts were of course not only exhilarating sites of protest and experiments in popular democracy, but moreover they were places where people gathered and risked their life. The Gwangju uprising is, thus, the first of the roundabout revolutions. Liu wrote: “In all these cases, the symbolism is almost jokingly obvious: what better place to stage a revolution, after all, then one built for turning around?” What better way to show solidarity across national borders than to stage protests in analogous places?

    Why roundabouts? After all, they are banal, utilitarian instruments of traffic management, certainly not prone to induce revolutionary feeling. Other kinds of sites – squares, boulevards, favelas, refugee camps – have served throughout history as the setting for political protest and revolt. Each alignment of a roundabout and a revolution has a specific context and diverse causes, but the curious repetition of this phenomenon might give rise to several speculations. Urban roundabouts are the intersection points of large axes, which also puts them at the start or end of processions.

    Occupying a roundabout demonstrates the power of tactical acupuncture: it blocks off all routes going in and out. Congestion moves outward like a wave, flowing down avenues and streets through large parts of the city. By pressuring a single pivotal point within a networked infrastructure, an entire city can be put under siege (a contemporary contradistinction to the medieval technique of surrounding the entire perimeter of a city wall). Unlike public squares, which are designed as sites for people to gather (therefore not interrupting the flow of vehicular traffic) and are usually monitored and policed, roundabout islands are designed to keep people away. The continuous flow of traffic around them creates a wall of speeding vehicles that prohibits access. While providing open spaces (in some cities the only available open spaces) these islands are meant to be seen but not used.

    Another possible explanation is their symbolic power: they often contain monuments that represent the existing regime. The roundabouts of recent revolutions had emblematic names – Place du 7 Novembre 1987, the date the previous regime took power in Tunisia; “Liberty” (Azadi), referring to the 1979 Iranian Revolution; or “Liberation” (Tahrir), referring to the 1952 revolutions in Egypt. Roundabout islands often had statues, both figurative and abstract, representing the symbolic order of regimes. Leaders might have wished to believe that circular movement around their monuments was akin to a form of worship or consent. While roundabouts exercise a centripetal force, pulling protestors into the city center, the police seek to generate movement in the opposite direction, out and away from the center, and to break a collective into controllable individuals that can be handled and dispersed.

    The most common of all centrifugal forces of urban disorganisation during protests is tear gas, a formless cloud that drifts through space to disperse crowds. From Gwangju to Cairo, Manama to Ramallah, hundreds of tear-gas canisters were used largely exceeding permitted levels in an attempt to evict protesters from public spaces. The bodily sensation of the gas forms part of the affective dimension of the roundabout revolution. When tear gas is inhaled, the pain is abrupt, sharp, and isolating. The eyes shut involuntary, generating a sense of disorientation and disempowerment.

    Protestors have found ways to mitigate the toxic effects of this weapon. Online advice is shared between activists from Palestine through Cairo to Ferguson. The best protection is offered by proper gas masks. Improvised masks made of mineral water bottles cut in half and equipped with a filter of wet towels also work, according to online manuals. Some activists wear swim goggles and place wet bandanas or kaffiyehs over their mouths. To mitigate some of the adverse effects, these improvised filters can be soaked in water, lemon juice, vinegar, toothpaste, or wrapped around an onion. When nothing else is at hand, breathe the air from inside your shirt and run upwind onto higher ground. When you have a chance, blow your nose, rinse your mouth, cough, and spit.


    https://www.iconeye.com/opinion/comment/item/12093-the-roundabout-revolutions
    #révolution #résistance #giratoire #carrefour #rond-point #routes #infrastructure_routière #soulèvement_politique #Corée_du_Sud #printemps_arabe #Egypte #Tunisie #Bahreïni #Yémen #Libye #Syrie #Tahrir

    Du coup : #gilets_jaunes ?

    @albertocampiphoto & @philippe_de_jonckheere

    This project started with a photograph. It was one of the most arresting images depicting the May 1980 #Gwangju uprising, recognised now as the first step in the eventual overthrow of the military dictatorship in South Korea. The photograph (above) depicts a large crowd of people occupying a roundabout in the city center. Atop a disused fountain in the middle of the roundabout a few protestors have unfurled a South Korean flag. The roundabout organised the protest in concentric circles, a geometric order that exposed the crowd to itself, helping a political collective in becoming.

    –-> le pouvoir d’une #photographie...

    signalé par @isskein

    ping @reka

  • Taxi 2.0: The Bumpy Road to the Future of Cabs - Motherboard
    https://motherboard.vice.com/en_us/article/gvy5dy/taxi-20-the-bumpy-road-to-the-future-of-cabs-video

    https://vimeo.com/94803083

    After a typical honeymoon period of unquestioning and often oblivious tech culture praise, Uber and its taxi app brethren are getting some real, overdue scrutiny. Thank cabbies in part, for highlighting the fact that much of Uber’s business model success has to do with bypassing basic taxi regulations, safety checks, and continuous commercial insurance coverage, in a monoplistic bid for all sides of the taxi market. Protests and lawsuits and injunctions now follow close behind these companies into nearly every new city they zoom into, with the requisite lawyers and lobbyists in the backseat.

    At the same time, anyone who’s experienced a city knows that licensed taxi companies are due for an upgrade, and maybe some of these apps’ success has to do with the old industry’s disinterest in adaptation. Shutting out the Uber model—and its rather edgier “rideshare” kin, like Lyft and SideCar and UberX—from the ride-for-hire ecosystem is as poor an answer as allowing it to persist without the institution of new checks and rules.

    In the short documentary “Taxi 2.0,” filmmaker Max Maddox attacks the issue from street-level in San Francisco by talking to taxi and Uber and Lyft drivers and the people that use each. No one comes away looking great. Everyone’s trying to figure out what it all means. (Where, exactly, is the sharing in this sharing economy? And how are these taxis called “rideshares” when there’s no real ride-sharing going on?) Apart from concerns about unfair competition, says Maddox, “taxi proponents say these rideshares are unsafe for the public. In the midst of this drama, drivers on both sides of the playing field struggle just to put bread on the table.”

    Here we see the specter not only of a new labor war in the taxi industry, between established hacks and amateur upstarts armed with GPS maps, but a of a stratified ride-for-hire future, in which taxis are left carrying the unconnected lower classes, while Uber and the like carry the relative big money. Technology has a way of dividing us like that.

    I usually feel half-guilty when I get in a TNC, but the cab system is far from perfect at the same time.

    Maddox, a broadcasting student at San Francisco State University whose interest was piqued after seeing “so many mustached cars drive by,” came away from the months-long project with mixed feelings about the future of cabs.

    “After interviewing all these guys, I’m still on the fence about transportation network companies, or rideshares, whatever you want to call them,” Maddox says. “I usually feel half-guilty when I get in a TNC, but the cab system is far from perfect at the same time. I can’t endorse one platform over the other. I just hope something changes so they can coexist.”

    ’Taxi 2.0’ Credits: Producer: Max Maddox; Editor: Jarod Taber; Photographer: Asger Ladefoged; Writer: Ben Mitchell; Sound: Gabe Romero Associate Producer: Jason Garcia

    #Taxi #Uber #USA #San_Francisco

  • ’The Pirate Bay of Science’ Continues to Get Attacked Around the World
    After publishers sued #Sci-Hub, Russian ISPs are now preventing users from accessing the valuable scientific data repository and paywall killer.

    https://motherboard.vice.com/amp/en_us/article/gy7d7j/sci-hub-and-lib-gen-continue-to-get-attacked-around-the-world

    Sci-Hub has shown time and again that it’s better at cat-and-mouse than the giant science publishing monopolies it undermines,” activist and author Cory Doctorow said in an email exchange with Motherboard.

    “That said, unless your science is public, it’s not science, it’s just alchemy,” Doctorow added. “With the major science funders around the world declaring war on the likes of Springer, it’s bizarre that they’re focused on Sci-Hub, rather than addressing the fact that the entire world of science practitioners and funders thinks that they’re useless and greedy parasites.”

    https://telegram.me/scihubot

  • Shocking Maps Show How Humans Have Reshaped Earth Since 1992 - Motherboard
    https://motherboard.vice.com/en_us/article/vbazm4/shocking-maps-show-how-humans-have-reshaped-earth-since-1992

    “There is so much talk about the change in environment,” Stepinski told me over the phone. “But surprisingly enough, there was not a map. There are maps of individual land cover issues, like forest or agriculture. But there was not a map of everything.”

    To fill this gap, Stepinski and his colleagues used satellite data collected by the European Space Agency’s Climate Change Initiative, which included geospatial maps of land cover designed to monitor climate change.

    The team broke these maps into 81-kilometer-squared tracts and created a legend of color-coded tiles based on nine broad types of transitions that occurred between 1992 and 2015 (agriculture gains in yellow, forest losses in maroon, etc). The tiles are shaded to reflect the degree of change, with the lightest shade corresponding to regions altered by less than 10 percent, and dark patches representing regions that shifted by 30 percent or more.

    #cartographie #terres #urbanisation #agriculture #déforestation

  • YouTube Lets California Fire Conspiracy Theories Run Wild
    https://motherboard.vice.com/en_us/article/43937d/youtube-lets-california-fire-conspiracy-theories-run-wild

    Conspiracy theory vloggers have been able to easily manipulate YouTube and amass millions of views that provide a flagrantly false narrative about the disaster in California. The Camp Fire in California has killed at least 79 people, left 699 people unaccounted for, and created more than a thousand migrants in Butte County, California. In these circumstances, reliable information can literally be a matter of life death. But on YouTube, conspiracy theories are thriving. Currently, when a (...)

    #Google #YouTube #algorithme #manipulation

  • Facebook and Google’s Targeted Advertising Is Ruining the Internet and Breaking the World

    https://motherboard.vice.com/en_us/article/xwjden/targeted-advertising-is-ruining-the-internet-and-breaking-the-worl

    In copying the traditional media’s advertising-based business model, internet companies neglected to adopt a crucial rule: the separation between business operations and editorial decisions. Though the rule was far from universally respected, 20th century journalism’s code of ethics prohibited financial considerations from influencing news coverage. This ethical screen allowed American capitalism to subsidize the press, which in turn helped keep the government and companies honest: checks and balances at work.

    This all fell apart with targeted advertising, which stole journalism’s lunch money and used it to sustain platforms whose driving logic isn’t to educate, to inform, or to hold the powerful to account, but to keep people “engaged.” This logic of “engagement” is motivated by the twin needs to collect more data and show more ads, and manifests itself in algorithms that value popularity over quality. In less than 20 years, Silicon Valley has replaced editorial judgment with mathematical measures of popularity, destabilized the democratic systems of checks and balances by hobbling the Fourth Estate, and hammered nail after nail into the coffin of privacy.

    (...) Targeted advertising provides tools for political advertisers and propagandists to micro-segment audiences in ways that inhibit a common understanding of reality. This creates a perfect storm for authoritarian populists like Rodrigo Duterte, Donald Trump, and Jairo Bolsanaro to seize power, with dire consequences for human rights. Dipayan Ghosh and Ben Scott, authors of the “Digital Deceit” report series, note that “ we have permitted technologies that deliver information based on relevance and the desire to maximize attention capture to replace the normative function of editors and newsrooms .”

    For decades, thinkers like Hannah Arendt, Karl Polanyi, and many others have repeatedly warned us that fascism is the direct consequence of subordinating human needs to the needs of the market. Having willfully ignored the lessons of history, we have allowed corporate greed to transform our media ecosystem into one that structurally favors authoritarian populism. Saving democracy requires more than reforming internet companies, of course, and the exact recipe for success varies by country. In the United States, we need to reverse 30 years of media deregulation, exponentially increase public support for public interest media, and address the structural inequalities in our electoral system that give power to a party that less than half the electorate supports.

    #surveillance_capitalism #media_deregulation #authoritarian_populism

  • Why Sleep Apnea Patients Rely on a CPAP Machine Hacker
    https://motherboard.vice.com/en_us/article/xwjd4w/im-possibly-alive-because-it-exists-why-sleep-apnea-patients-rely-

    An Australian hacker has spent thousands of hours hacking the DRM that medical device manufacturers put on CPAP machines to create a free tool that lets patients modify their treatment.

    pour nos ami·es qui utilisent une machine à respirer, sachez qu’il existe désormais un #logiciel_libre de contrôle du bidule (appelé SleepyHead), et qu’il permet de lire ses #données soi-même, et potentiellement d’améliorer son traitement

    “I cannot tell you enough how different my CPAP experience is with this software. It’s the difference between night and day,” Lynn said. “I’m possibly alive because it exists.”

    #santé #hack #respirer

  • On a rencontré les anarchistes qui fabriquent leurs propres #médicaments - Motherboard
    https://motherboard.vice.com/fr/article/43pngb/on-a-rencontre-les-anarchistes-qui-fabriquent-leurs-propres-medica

    Voilà dix ans que les Four Thieves affrontent la Food and Drug Administration, l’agence fédérale chargée d’autoriser la commercialisation des médicaments aux États-Unis, les richissimes firmes pharmaceutiques, les médecins, les pharmaciens et quelques unes des plus prestigieuses universités du pays. Laufer et ses collaborateurs n’en finissent plus d’irriter les puissants, car ils sont la preuve vivante que des médicaments efficaces peuvent être mis au point avec peu d’argent en dehors des canaux institutionnels.

    En pharmacie, deux epipens à usage unique des laboratoires Mylan, des stylets d’adrénaline auto-injectable, peuvent vous coûter dans les 600 dollars, 300 en version générique. C’est cher. Et de toute façon, les pharmacies sont en rupture de stock : même si vous en avez les moyens, vous ne pourrez pas vous les offrir. Pour parer au problème, les Four Thieves ont diffusé les instructions pour fabriquer un epipen soi-même sur Internet. Coût total de la préparation : 30 dollars d’objets accessibles au tout-venant pour la création du stylet, trois dollars pour le rechargement. Et quand Shkreli a fait monter le prix du Daraprim, les Four Thieves ont mis au point un laboratoire open source afin que chacun puisse fabriquer son propre Daraprim pour 25 centimes pièce.

    Aux États-Unis, l’industrie pharmaceutique pèse 446 milliards de dollars. Ces profits sont protégés par un mur de réglementations défendu des agences comme la FDA et la Drug Enforcement Administration, le service fédéral chargé de la lutte contre le trafic de stupéfiants. En distribuant gratuitement des plans d’appareils et des produits médicaux, le groupe Four Thieves menace de couper l’herbe sous le pied de l’une des industries les plus réglementées et les plus profitables au monde. Et ce n’est qu’un début.

    #santé #big_pharma #anarchisme

  • En 2018, l’intelligence artificielle est toujours une affaire d’humains
    https://motherboard.vice.com/fr/article/wjyz59/en-2018-lintelligence-artificielle-est-toujours-une-affaire-dhumai

    Pseudo-IA, IA Potmekine, IA Magicien d’Oz… Les techniques de fraude à l’algorithme qui consistent à faire bosser des humains pour pallier aux limites des machines sont partout. Vous avez entendu ? L’intelligence artificielle va changer le monde. Depuis plusieurs années, la clameur monte du cortège techno-entrepreneurial : les algorithmes vont progressivement surpasser et remplacer tous les salariés de la planète, ou presque. Les investisseurs aiment cet air : en 2017, ils ont distribué douze (...)

    #Google #Amazon #AmazonMechanicalTurk #Facebook #algorithme #Alexa

  • The Rise of Netflix Competitors Has Pushed Consumers Back Toward Piracy
    https://motherboard.vice.com/amp/en_us/article/d3q45v/bittorrent-usage-increases-netflix-streaming-sites

    BitTorrent usage has bounced back because there’s too many streaming services, and too much exclusive content

    A new study shows that after years of declines, BitTorrent usage and piracy is on the rise again. The culprit: an increase in exclusivity deals that force subscribers to hunt and peck among a myriad of streaming services to actually find the content they’re looking for.

    Sandvine’s new Global Internet Phenomena report offers some interesting insight into user video habits and the internet, such as the fact that more than 50 percent of internet traffic is now encrypted, video now accounts for 58 percent of all global traffic, and Netflix alone now comprises 15 percent of all internet downstream data consumed.

    But there’s another interesting tidbit buried in the firm’s report: after years of steady decline, BitTorrent usage is once again growing.

    According to Sandvine, file-sharing accounts for 3 percent of global downstream and 22 percent of upstream traffic, with 97% of that traffic in turn being BitTorrent. While BitTorrent is often used to distribute ordinary files, it remains the choice du jour for those looking to distribute and trade copyrighted content online, made easier via media PCs running Kodi and select plugins.

  • The Culture War Comes to Linux - Motherboard
    https://motherboard.vice.com/en_us/article/yw43kj/what-happens-if-linux-developers-remove-their-code

    After #Linux adopted a new Code of Conduct, a small group of programmers threatened to rescind their code from the project. Lead Linux developers say the threat is “hollow.”

    A small group of programmers are calling for the rescission of code contributed to Linux, the most popular open source operating system in the world, following changes made to the group’s code of conduct. These programmers, many of whom don’t contribute to the Linux kernel, see the new Code of Conduct as an attack on meritocracy—the belief that people should mainly be judged by their abilities rather than their beliefs—which is one of the core pillars of open source software development. Other developers describe these attacks on the Code of Conduct as thinly veiled misogyny.

    It’s a familiar aspect of the culture war that many online and IRL communities are already dealing with, but it has been simmering in the Linux community for years. The controversy came to the surface less than two weeks after Linus Torvalds, the creator of Linux, announced he would temporarily be stepping away from the project to work on “understanding emotions.” Torvalds was heavily involved with day to day decisions about Linux development, so his departure effectively left the community as a body without a head. In Torvalds’ absence, certain developers seem committed to tearing the limbs from this body for what they perceive as an attack on the core values of Linux development.

    So far, these threats haven’t actually resulted in developers pulling code from the Linux kernel, but some Linux contributors fear that this controversy could snowball to the point where significant chunks of the Linux kernel are revoked from use. This would have huge ramifications for anyone online, given that most internet services used on a day to day basis run on Linux. I spoke with a number of Linux developers about the source of the controversy, what could be done to improve the Code of Conduct, and why they think these threats to implement a Linux “killswitch” are totally overblown.

    Voir aussi : https://seenthis.net/messages/723091 et https://seenthis.net/messages/724176

    #sexisme #code #développement #domination #Torvalds #méritocratie