Jeux de recherche d’objets : où sont les héritiers d’« Où est Charlie ? »
https://www.lemonde.fr/pixels/article/2021/07/02/jeux-de-recherche-d-objets-ou-sont-les-heritiers-d-ou-est-charlie_6086728_44
« Ces amateurs passent des heures sur ces jeux et dépensent parfois des centaines de livres sterling en achat intégrés aux applications et, pourtant, ils ne sont pas considérés comme faisant partie de l’industrie du jeu vidéo. C’est très étonnant », déplore Nia Wearn.
#jeux_vidéo #niche #où_est_charlie #culture #hog #hidden_object_games #casual #grand_public
]]>jesuisféministe.com | Hidden Figures : Où est le racisme d’État au cinéma ?
▻https://jesuisfeministe.com/2018/02/01/hidden-figures-ou-est-le-racisme-detat-au-cinema
Nombreux sont les films qui, malgré des allures de films historiques ou d’action, ont un sous-texte patriotique. Hidden Figures ne fait pas exception. Il est, en effet, difficile de raconter la conquête de l’espace sans évoquer la nation puisque le prestige national est au cœur du projet. La cause patriotique estompe ainsi les différences au sein de sa population, pour faire face à un ennemi commun – la Russie communiste. Mais derrière ce film débordant de bons sentiments qui débutait avec une proposition féministe intéressante se cache un sous-texte gênant qui cherche à justifier le American Dream méritocratique et contribue à disculper le gouvernement américain de toute action raciste.
Le personnage de Al Harrison (Kevin Costner) est une illustration frappante de cette dialectique. Directeur du groupe de travail où se trouve Katherine, Harrison représente l’américain moyen : homme blanc dans la cinquantaine, il utilise un langage familier et demeure terre à terre dans un milieu ouvertement intellectuel. Il est, contrairement aux autres personnages, non pas un personnage réel, mais une création des scénaristes, un composite inspiré d’anciens directeurs de la NASA, en grande partie fictif et donc instrumentalisable. En outre, Harrison est aussi la figure de pouvoir du film : haut placé à la NASA, mais aussi implicitement représentant de la nation et du gouvernement américain. Le portrait de Kennedy surplombe son bureau, comme un regard approbateur lors des scènes pivots. Harrison perpétue le cliché du « white saviour » : c’est lui qui reconnaît le talent de Katherine, la juge à son mérite et non à la couleur de sa peau. Il représente la méritocratie idéale, sans préjugés. Par exemple, lors de cette scène marquante où, après la déclaration passionnée de Katherine à propos de la ségrégation spatiale des toilettes, il démolit à coups de pied de biche l’enseigne qui distingue les toilettes. Il vient de balayer d’un seul geste le racisme d’État.
#racisme #cinéma #racisme_d'etat #féminisme #historicisation
]]>Fixing the Problems with Docker Images | The Changelog
▻http://changelog.complete.org/archives/9794-fixing-the-problems-with-docker-images
Besides security, there is a second problem: the common way of running things in #Docker pretends to provide a traditional POSIX API and environment, but really doesn’t. This is a big deal.
]]>Cache-cache #css – La vie en #ffoodd
▻http://www.ffoodd.fr/cache-cache-css
#webdev #masquer #hidden #focus #a11y
Forty years after the Khmer Rouge regime:
Kim Hak, a young and talented Cambodian photographer looks for a new imaginary of his country.
His career starts from some family pictures his mother hid underground before the war and retrieved just after the defeat of the Khmer Rouge.
Hak’s images will take us to a new Cambodia, far from stereotypes.
#Nhem_En, as photographer enrolled in the Khmer Rouge regime, took more than 14.000 mugshots of the Tuol Sleng prison victims.
He’s trying to establish himself as entrepreneur of the socalled dark tourism.
One of his ideas on how to profit from the thousands of genocide pictures will bitterly surprise us.
Every day, a cleaner and an audio guide clean up Cambodian history in the only wax sculptures museum of the country.
Which image to choose to represent our own country?
But, above all, what to do with it?
Le fotografie nascoste della Cambogia
#Hidden_Photos è il primo #film di #Davide_Grotta, un giovane regista siciliano che ha vissuto a lungo in Cambogia, dove ha deciso di seguire la storia di #Kim_Hak. Hak è un giovane fotografo che ama riflettere sulla storia del suo Paese e sull’immaginario che essa produce ancora oggi. Il suo desiderio di costruire un immaginario collettivo che superi il cliché iconografico legato all’Angkor Wat o alla violenza dei khmer rossi l’ha spinto a intraprendere il progetto “Alive”, con cui ha ha esplorato il suo universo familiare ricorrendo alle fotografie che la madre ha salvato dalla distruzione del regime. Hak ha vinto numerosi premi ed è oggi tra i fotografi cambogiani emergenti più noti a livello internazionale.
▻http://wots.eu/2017/01/17/hidden-photos-cambogia
#Cambodge #photographie #Khmers_Rouges #dark_tourism #tourisme_noir #tourisme_de_guerre #Nhem_En #identité #images
cc @albertocampiphoto
Volkswagen and the Quandary of Hidden Code
▻http://www.counterpunch.org/2015/10/01/volkswagen-and-the-quandary-of-hidden-code
Though the media may be inclined to shine a spotlight on #Volkswagen and its systemic rigging of emission control systems the public record shows that the practice of secretly modifying technology to enable questionable features is fairly widespread. For example, accessing computers using hidden code is a mainstay of #NSA #surveillance and they’ve gotten so adept at it that plans have been drawn up to industrialize attacks against millions of machines at a time. (...)
#Hidden_code represents control, it represents power.
]]>#Cloudburst : Wisps
▻http://randalmatheny.com/2015/03/01/cloudburst-wisps
A Cloudburst offering we’ve put online, to provoke thought over the nature of life.
]]>#Hidden_Away: Policies and Politics of Immigration Detention in #Canada
Serious questions have been raised about immigration detention practices in Canada and the violations of human rights occurring within the system. Highly secretive, with little in the way of public accountability, the immigration detention system has recently been prised open a little with the release of a report by the advocacy group End Immigration Detention Network (EIDN). This post examines some of the serious problems associated with, and concerns raised over, detention practices in Canada in light of (and beyond) the EIDN report.
►http://bordercriminologies.law.ox.ac.uk/hidden-away-canada
#détention #détention_administrative #rétention #migration #asile #réfugiés
]]>Epic Browser, un Chromium modifié pour un surf sans pistage
▻http://neosting.net/logiciels/epic-browser-chromium.html
La startup Hidden Reflex, fondée par Alok Bhardwaj, situé à la fois aux USA (Washington DC) et en Inde (Bengalore) vient de sortir un nouveau navigateur délibérément orienté sur la protection de la vie privée. Oui, encore un. Mais cette fois-ci, il semble que tout soit mis en œuvre pour faire de ce navigateur l’ultime […] #chromum #epic-browser #hidden-reflex #mac-osx #navigateur #vie-privee #windows
]]>Stefanie Posavec
▻https://www.prote.in/profiles/stefanie-posavec
When envisaging a typical data visualiser at work, you’d probably conjure up images of a person slaving over rows of numbers and wrangling spreadsheets. But Denver-born and London-based data designer Stefanie Posavec is of a different breed. Rather than simply turning a set of numbers into an information graphic, she finds data in things we wouldn’t normally associate with this type of information.
She calls this ‘ #hidden_data ’
▻http://www.itsbeenreal.co.uk
▻http://www.itsbeenreal.co.uk/files/sentence-drawings-poster-thumb-600x848.jpg
De-Anonymizing Alt.Anonymous.Messages - ritter.vg
▻http://ritter.vg/blog-deanonymizing_amm.html
For the past four years I’ve been working on a project to analyze Alt.Anonymous.Messages, and it was finally getting to a point where I thought I should show my work. I just finished presenting it at Defcon, and because a lot of the people I know are interested in this were not able to make it, I’m making the slides, and more importantly the speaker notes, available for download. This kind of kills the chance anyone will actually watch the video, but that’s all right.
The slides cover the information-theoretic differences between SSL, Onion Routing, Mix Networks, and Shared Mailboxes. It talks about the size of the dataset I analyzed, and some broad percentages of the types of messages in it (PGP vs Non-PGP, Remailed vs Non-Remailed). Then I go into a large analysis of the types of PGP-encrypted messages there are. Messages encrypted to public keys, to passwords and passphrases, and PGP messages not encrypted at all!
▻http://defcon.org/html/defcon-21/dc-21-speakers.html#Ritter
In recent years, new encryption programs like Tor, RedPhone, TextSecure, Cryptocat, and others have taken the spotlight - but the old guard of remailers and shared inboxes are still around. Alt.Anonymous.Messages is a stream of thousands of anonymous, encrypted messages, seemingly opaque to investigators. For the truly paranoid, there is no communication system that has better anonymity - providing features and resisting traffic analysis in ways that Tor does not. Or so is believed. After collecting as many back messages as possible and archiving new postings daily for four years, several types of analysis on the contents of alt.anonymous.messages will be presented and several ways to break sender and receiver anonymity explained. Messages will be directly and statistically correlated, communication graphs drawn, and we’ll talk about what challenges the next generation of remailers and nymservs face, and how they should be designed.
▻http://ritter.vg/p/AAM-defcon13.pdf
But what I keep coming back to is the fact that we have no anonymity network that is high bandwidth, high latency. We have no anonymity network that would have let someone securely share the Collateral Murder video, without Wikileaks being their proxy. You can’t take a video of corruption or police brutality, and post it anonymously.
Now I hear you arguing with me in your heads: Use Tor and upload it to Youtube. No, youtube will take it down. Use Tor and upload it to MEGA, or some site that will fight fradulent takedown notices. Okay, but now you’re relying on the good graces of some third party. A third party that is known to host the video, and can be sued. Wikileaks was the last organization that was willing to take on that legal fight, and now they are no longer in the business of hosting content for normal people.
And you can say Hidden Service and I’ll point to size-based traffic analysis and confirmation attacks that come with a low-latency network, never mind Ralf-Phillip Weinmen’s amazing work the other month that really killed Hidden Services. We can go on and on like this, but I hope you’ll at least concede the point that what you are coming up with are work-arounds for a problem that we lack a good solution to.
#remailer #anonymity #encryption #defcon #tor #wikileaks #hiddenservice
]]>#Hidden-Orchestra - Dust - YouTube
►http://www.youtube.com/watch?v=Ull3e5rCt-g&feature=g-vrec
#musique
#Hidden-Orchestra - Antiphon - YouTube
►http://www.youtube.com/watch?v=0pTHdibIQoE
#musique