operatingsystem:gnu

  • Install and Use GNU Command Line Tools on macOS/OS X - Top Bug Net
    https://www.topbug.net/blog/2013/04/14/install-and-use-gnu-command-line-tools-in-mac-os-x

    If you are moving onto macOS/OS X from GNU/Linux, you would probably find out that the command line tools shipped with OS X are not as powerful and easy to use as the tools in Linux. The reason is that macOS/Mac OS X uses the BSD version command line tools, which are different from the Linux version, while they are both compliant with POSIX standards. But we can easily install the GNU command line tools by using Homebrew in Mac OS X and set them as default.

    Je serais juste un peu prudent avec l’option --default-names qu’ils utilisent : avec ça les outils GNU remplacent ceux de BSD au lieu de les installer avec un ’g’ devant.
    Ça pourrait casser des scripts OSX existant.

    #Linux #GNU #BSD #homebrew #osx #macOS #darwin

  • Ring is a Privacy-Focused, Open-Source Skype Alternative
    http://www.omgubuntu.co.uk/2017/06/ring-linux-skype-alternative

    If you’re sick of Skype for Linux’s lack of progress, or rankled by the imminent retirement of the older (but superior) Qt Skype client, there’s a GNU alternative in town called Ring. GNU Ring is a cross-platform, privacy-minded communication app that is fast gaining a following in FOSS and security-conscious circles. Like an open-source alternative to Skype […] This post, Ring is a Privacy-Focused, Open-Source Skype Alternative, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • Cyberattacks in 12 Nations Said to Use Leaked N.S.A. Hacking Tool - The New York Times
    https://www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html

    An extensive cyberattack struck computers across a wide swath of Europe and Asia on Friday, and strained the public health system in Britain, where doctors were blocked from patient files and emergency rooms were forced to divert patients.

    The attack involved ransomware, a kind of malware that encrypts data and locks out the user. According to security experts, it exploited a vulnerability that was discovered and developed by the National Security Agency.

    The hacking tool was leaked by a group calling itself the Shadow Brokers, which has been dumping stolen N.S.A. hacking tools online beginning last year. Microsoft rolled out a patch for the vulnerability last March, but hackers took advantage of the fact that vulnerable targets — particularly hospitals — had yet to update their systems.

    The attack on the National Health Service seemed perhaps the most audacious of the attacks, because it had life-or-death implications for hospitals and ambulance services.

    On social media, several images circulated showing computer screens bearing a message that the user could not enter without first paying a $300 ransom in Bitcoin. Many doctors reported that they could not retrieve their patients’ files.

    #cybersécurité #ransomware #bitcoin #données_santé

  • Anbox - Android in a Box
    http://anbox.io

    Anbox puts the #Android operating system into a container, abstracts hardware access and integrates core system services into a GNU/#Linux system. Every Android application will behave integrated into your operating system like any other native application. To achieve our goal we use standard Linux technologies like containers (LXC) to separate the Android operating system from the host. The Android version doesn’t matter for this approach and we try to keep up with the latest available version from the Android Open Source project.

    https://www.youtube.com/watch?v=MbmiHnasGWg

  • Anbox Lets You Run Android Apps on the Linux Desktop
    http://www.omgubuntu.co.uk/2017/04/android-apps-linux-desktop-anbox

    Meet Anbox, a novel new way to run Android apps on the Linux desktop. “Anbox puts the Android operating system into a container, abstracts hardware access and integrates core system services into a GNU Linux system. Every Android application will behave integrated into your operating system like any other native application,” the projects says on its official […] This post, Anbox Lets You Run Android Apps on the Linux Desktop, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.

  • LibrePlanet 2017 on March 25-26
    https://www.april.org/node/21131

    Début: 25 Mars 2017 - 00:00Fin: 26 Mars 2017 - 00:00

    LibrePlanet is the annual conference of the Free Software Foundation. The 2017 edition will take place on the 25th and 26th of March at the MIT (Massachusetts Institute of Technology) in Cambridge, USA.

    Marianne Corvellec, member of April’s Board of directors, will attend and speak on the following topic: “The GNU philosophy: Ethics beyond ethics” (16:35—17:20, on Sunday, March 26th).

    The programme and practical details are available on the LibrePlanet 2017 Conference site.

    #Raising_awareness

  • Edward Snowden’s New Job Is To Protect Reporters From Spies | WIRED
    https://www.wired.com/2017/02/reporters-need-edward-snowden

    Snowden has focused the next phase of his career on solving that very specific instance of the panopticon problem: how to protect reporters and the people who feed them informa­tion in an era of eroding privacy—without requiring them to have an NSA analyst’s expertise in encryption or to exile them­selves to Moscow.

    https://freedom.press

    #jousnalisme #surveillance #crypto

  • Ed Snowden taught me to smuggle secrets past incredible danger. Now I teach you.
    (Micah Lee, Oct 2014)

    – Explains how Poitras and Snowden set up a secure communication channel using anonymous e-mail, Tor Browser, GPG, and tweeting the figerprint.

    – Explains how he got Greenwald to encrypt his computer. (Greenwald didn’t know how to nor how to use GPG, and got neither of them working)

    – Talks about his involvement in the set-up of communications between Snowden, Greenwald and Poitras prior to the revelations.

    https://theintercept.com/2014/10/28/smuggling-snowden-secrets

    I think it’s helpful to show how privacy technologists can work with sources and journalists to make it possible for leaks to happen in a secure way. Securing those types of interactions is part of my job now that I work with Greenwald and Poitras at The Intercept, but there are common techniques and general principles from my interactions with Snowden that could serve as lessons to people outside this organization.

    [...]

    but in his first email to me, Snowden had forgotten to attach his key, which meant I could not encrypt my response. I had to send him an unencrypted email asking for his key first. His oversight was of no security consequence—it didn’t compromise his identity in any way—but it goes to show how an encryption system that requires users to take specific and frequent actions almost guarantees mistakes will be made, even by the best users.

    [...]

    after creating a customized version of Tails for Greenwald, I hopped on my bike and pedaled to the FedEx office on Shattuck Avenue in Berkeley, where I slipped the Tails thumb drive into a shipping package, filled out a customs form that asked about the contents (“Flash Drive Gift,” I wrote), and sent it to Greenwald in Brazil.

    The (comprehensive) 30-page tutorial Micah wrote about using open source tools to communicate securely:

    Encryption Works: How to Protect Your Privacy (And Your Sources) in the Age of NSA Surveillance
    https://freedom.press/news-advocacy/encryption-works-how-to-protect-your-privacy-and-your-sources-in-the-age-

    The whitepaper covers:

    – A brief primer on cryptography, and why it can be trustworthy
    – The security problems with software, and which software you can trust
    – How Tor can be used to anonymize your location, and the problems Tor has when facing global adversaries
    – How the Off-the-Record (OTR) instant message encryption protocol works and how to use it
    – How PGP email encryption works and best practices
    – How the Tails live GNU/Linux distribution can be used to ensure high endpoint security

    https://web.archive.org/web/20130822041429/https://pressfreedomfoundation.org/sites/default/files/encryption_works.pdf
    backup :https://www.docdroid.net/file/download/vk6cwnN/encryption-works.pdf
    HTML version: https://web.archive.org/web/20130727195447/https://pressfreedomfoundation.org/encryption-works

    #Edward_Snowden #Snowden
    #privacy
    #Tails #GPG #PGP

  • FOSDEM 2017 is now over.
    Videos of the sessions are available

    (#FOSDEM is a free yearly 2-day event in Brussels for software developers to meet, share ideas and collaborate.)

    https://fosdem.org/2017/schedule/events

    List of the thematics/devrooms:
    – BSD
    – Backup and Disaster Recovery
    – Community
    – Config Management
    – Decentralised Internet
    – Desktops
    – Distributions
    – Electronic Design Automation (EDA)
    – Embedded, mobile and automotive
    – Free Java
    – GNU Guile
    – Geospacial
    – Go
    – Graph
    – HPC, Big Data and Data Science
    – Internet of Things (IoT)
    – LLVM Toolchain
    – Legal and Policy Issues
    – Linux Containers and Microservices
    – Lua
    – Microkernels and Component-based OS
    – Monitoring and Cloud
    – Mozilla
    – MySQL and Friends
    – Open Document Editors
    – Open Game Development
    – Open Media
    – Open Source Design
    – PHP and Friends
    – Perl
    – PostgreSQL
    – Python
    – Real Time Communications
    – Ruby
    – SDN and NFV
    – Security
    – Software Defined Radio
    – Software Defined Storage
    – Testing and Automation
    – Valgrind
    – Virtualisation and IaaS

  • Unlike Us | About
    http://networkcultures.org/unlikeus/about

    Invitation to join the network (a series of events, reader, workshops, online debates, campaigns etc.)

    Concept: Geert Lovink (Institute of Network Cultures/HvA, Amsterdam) and Korinna Patelis (Cyprus University of Technology, Limassol)

    Thanks to Marc Stumpel, Sabine Niederer, Vito Campanelli, Ned Rossiter, Michael Dieter, Oliver Leistert, Taina Bucher, Gabriella Coleman, Ulises Mejias, Anne Helmond, Lonneke van der Velden, Morgan Currie and Eric Kluitenberg for their input.

    Summary
    The aim of Unlike Us is to establish a research network of artists, designers, scholars, activists and programmers who work on ‘alternatives in social media’. Through workshops, conferences, online dialogues and publications, Unlike Us intends to both analyze the economic and cultural aspects of dominant social media platforms and to propagate the further development and proliferation of alternative, decentralized social media software.

    Whether or not we are in the midst of internet bubble 2.0, we can all agree that social media dominate internet and mobile use. The emergence of web-based user to user services, driven by an explosion of informal dialogues, continuous uploads and user generated content have greatly empowered the rise of participatory culture. At the same time, monopoly power, commercialization and commodification are also on the rise with just a handful of social media platforms dominating the social web. These two contradictory processes – both the facilitation of free exchanges and the commercial exploitation of social relationships – seem to lie at the heart of contemporary capitalism.

    On the one hand new media create and expand the social spaces through which we interact, play and even politicize ourselves; on the other hand they are literally owned by three or four companies that have phenomenal power to shape such interaction. Whereas the hegemonic Internet ideology promises open, decentralized systems, why do we, time and again, find ourselves locked into closed corporate environments? Why are individual users so easily charmed by these ‘walled gardens’? Do we understand the long-term costs that society will pay for the ease of use and simple interfaces of their beloved ‘free’ services?

    The accelerated growth and scope of Facebook’s social space, for example, is unheard of. Facebook claims to have 700 million users, ranks in the top two or three first destination sites on the Web worldwide and is valued at 50 billion US dollars. Its users willingly deposit a myriad of snippets of their social life and relationships on a site that invests in an accelerated play of sharing and exchanging information. We all befriend, rank, recommend, create circles, upload photos, videos and update our status. A myriad of (mobile) applications orchestrate this offer of private moments in a virtual public, seamlessly embedding the online world in users’ everyday life.

    Yet despite its massive user base, the phenomena of online social networking remains fragile. Just think of the fate of the majority of social networking sites. Who has ever heard of Friendster? The death of Myspace has been looming on the horizon for quite some time. The disappearance of Twitter and Facebook – and Google, for that matter – is only a masterpiece of software away. This means that the protocological future is not stationary but allows space for us to carve out a variety of techno-political interventions. Unlike Us is developed in the spirit of RSS-inventor and uberblogger Dave Winer whose recent Blork project is presented as an alternative for ‘corporate blogging silos’. But instead of repeating the entrepreneurial-start-up-transforming-into-corporate-behemoth formula, isn’t it time to reinvent the internet as a truly independent public infrastructure that can effectively defend itself against corporate domination and state control?

    Agenda
    Going beyond the culture of complaint about our ignorance and loss of privacy, the proposed network of artists, scholars, activists and media folks will ask fundamental and overarching questions about how to tackle these fast-emerging monopoly powers. Situated within the existing oligopoly of ownership and use, this inquiry will include the support of software alternatives and related artistic practices and the development of a common alternative vision of how the techno-social world might be mediated.

    Without falling into the romantic trap of some harmonious offline life, Unlike Us asks what sort of network architectures could be designed that contribute to ‘the common’, understood as a shared resource and system of collective production that supports new forms of social organizations (such as organized networks) without mining for data to sell. What aesthetic tactics could effectively end the expropriation of subjective and private dimensions that we experience daily in social networks? Why do we ignore networks that refuse the (hyper)growth model and instead seek to strengthen forms of free cooperation? Turning the tables, let’s code and develop other ‘network cultures’ whose protocols are no longer related to the logic of ‘weak ties’. What type of social relations do we want to foster and discover in the 21st century? Imagine dense, diverse networked exchanges between billions of people, outside corporate and state control. Imagine discourses returning subjectivities to their ‘natural’ status as open nodes based on dialogue and an ethics of free exchange.

    To a large degree social media research is still dominated by quantitative and social scientific endeavors. So far the focus has been on moral panics, privacy and security, identity theft, self-representation from Goffman to Foucault and graph-based network theory that focuses on influencers and (news) hubs. What is curiously missing from the discourse is a rigorous discussion of the political economy of these social media monopolies. There is also a substantial research gap in understanding the power relations between the social and the technical in what are essentially software systems and platforms. With this initiative, we want to shift focus away from the obsession with youth and usage to the economic, political, artistic and technical aspects of these online platforms. What we first need to acknowledge is social media’s double nature.

    Dismissing social media as neutral platforms with no power is as implausible as considering social media the bad boys of capitalism. The beauty and depth of social media is that they call for a new understanding of classic dichotomies such as commercial/political, private/public, users/producers, artistic/standardised, original/copy, democratising/ disempowering. Instead of taking these dichotomies as a point of departure, we want to scrutinise the social networking logic. Even if Twitter and Facebook implode overnight, the social networking logic of befriending, liking and ranking will further spread across all aspects of life.

    The proposed research agenda is at once a philosophical, epistemological and theoretical investigation of knowledge artifacts, cultural production and social relations and an empirical investigation of the specific phenomenon of monopoly social media. Methodologically we will use the lessons learned from theoretical research activities to inform practice-oriented research, and vice-versa. Unlike Us is a common initiative of the Institute of Network Cultures (Amsterdam University of Applied Science HvA) and the Cyprus University of Technology in Limassol.

    An online network and a reader connected to a series of events initially in Amsterdam and Cyprus (early 2012) are already in planning. We would explicitly like to invite other partners to come on board who identify with the spirit of this proposal, to organize related conferences, festivals, workshops, temporary media labs and barcamps (where coders come together) with us. The reader (tentatively planned as number 8 in the Reader series published by the INC) will be produced mid-late 2012. The call for contributions to the network, the reader and the event series goes out in July 2011, followed by the publicity for the first events and other initiatives by possible new partners.

    Topics of Investigation
    The events, online platform, reader and other outlets may include the following topics inviting theoretical, empirical, practical and art-based contributions, though not every event or publication might deal with all issues. We anticipate the need for specialized workshops and barcamps.

    1. Political Economy: Social Media Monopolies
    Social media culture is belied in American corporate capitalism, dominated by the logic of start-ups and venture capital, management buyouts, IPOs etc. Three to four companies literally own the Western social media landscape and capitalize on the content produced by millions of people around the world. One thing is evident about the market structure of social media: one-to-many is not giving way to many-to-many without first going through many-to-one. What power do these companies actually have? Is there any evidence that such ownership influences user-generated content? How does this ownership express itself structurally and in technical terms?

    What conflicts arise when a platform like Facebook is appropriated for public or political purposes, while access to the medium can easily be denied by the company? Facebook is worth billions, does that really mean something for the average user? How does data-mining work and what is its economy? What is the role of discourse (PR) in creating and sustaining an image of credibility and trustworthiness, and in which forms does it manifest to oppose that image? The bigger social media platforms form central nodes, such as image upload services and short ulr services. This ecology was once fairly open, with a variety of new Twitter-related services coming into being, but now Twitter takes up these services itself, favoring their own product through default settings; on top of that it is increasingly shutting down access to developers, which shrinks the ecology and makes it less diverse.

    2. The Private in the Public
    The advent of social media has eroded privacy as we know it, giving rise to a culture of self-surveillance made up of myriad voluntary, everyday disclosures. New understandings of private and public are needed to address this phenomenon. What does owning all this user data actually mean? Why are people willing to give up their personal data, and that of others? How should software platforms be regulated?

    Is software like a movie to be given parental guidance? What does it mean that there are different levels of access to data, from partner info brokers and third-party developers to the users? Why is education in social media not in the curriculum of secondary schools? Can social media companies truly adopt a Social Network Users’ Bill of Rights?

    3. Visiting the Belly of the Beast
    The exuberance and joy that defined the dotcom era is cliché by now. IT use is occurring across the board, and new labour conditions can be found everywhere. But this should not keep our eyes away from the power relations inside internet companies. What are the geopolitical lines of distribution that define the organization and outsourcing taking place in global IT companies these days? How is the industry structured and how does its economy work?

    Is there a broader connection to be made with the politics of land expropriation and peasant labour in countries like India, for instance, and how does this analytically converge with the experiences of social media users? How do monopolies deal with their employees’ use of the platforms? What can we learn from other market sectors and perspectives that (critically) reflect on, for example, techniques of sustainability or fair trade?

    4. Artistic Responses to Social Media
    Artists are playing a crucial role in visualizing power relationships and disrupting subliminal daily routines of social media usage. Artistic practice provides an important analytical site in the context of the proposed research agenda, as artists are often first to deconstruct the familiar and to facilitate an alternative lens to understand and critique these media. Is there such a thing as a social ‘web aesthetics’? It is one thing to criticize Twitter and Facebook for their primitive and bland interface designs. How can we imagine the social in different ways? And how can we design and implement new interfaces to provide more creative freedom to cater to our multiple identities? Also, what is the scope of interventions with social media, such as, for example, the ‘dislike button’ add-on for Facebook? And what practices are really needed? Isn’t it time, for example, for a Facebook ‘identity correction’?

    5. Designing culture: representation and software
    Social media offer us the virtual worlds we use every day. From Facebook’s ‘like’ button to blogs’ user interface, these tools empower and delimit our interactions. How do we theorize the plethora of social media features? Are they to be understood as mere technical functions, cultural texts, signifiers, affordances, or all these at once? In what ways do design and functionalities influence the content and expressions produced? And how can we map and critique this influence? What are the cultural assumptions embedded in the design of social media sites and what type of users or communities do they produce?

    To answer the question of structure and design, one route is to trace the genealogy of functionalities, to historicize them and look for discursive silences. How can we make sense of the constant changes occurring both on and beyond the interface? How can we theorize the production and configuration of an ever-increasing algorithmic and protocological culture more generally?

    6. Software Matters: Sociotechnical and Algorithmic Cultures
    One of the important components of social media is software. For all the discourse on sociopolitical power relations governed by corporations such as Facebook and related platforms, one must not forget that social media platforms are thoroughly defined and powered by software. We need critical engagement with Facebook as software. That is, what is the role of software in reconfiguring contemporary social spaces? In what ways does code make a difference in how identities are formed and social relationships performed? How does the software function to interpellate users to its logic? What are the discourses surrounding software?

    One of the core features of Facebook for instance is its news feed, which is algorithmically driven and sorted in its default mode. The EdgeRank algorithm of the news feed governs the logic by which content becomes visible, acting as a modern gatekeeper and editorial voice. Given its 700 million users, it has become imperative to understand the power of EdgeRank and its cultural implications. Another important analytical site for investigation are the ‘application programming interfaces’ (APIs) that to a large extent made the phenomenal growth of social media platforms possible in the first place. How have APIs contributed to the business logic of social media? How can we theorize social media use from the perspective of the programmer?

    7. Genealogies of Social Networking Sites
    Feedback in a closed system is a core characteristic of Facebook; even the most basic and important features, such as ‘friending’, traces back to early cybernetics’ ideas of control. While the word itself became lost in various transitions, the ideas of cybernetics have remained stable in fields such as artificial intelligence, robotics and the biopolitical arena. Both communication and information theories shaped this discourse. How does Facebook relate to such an algorithmic shape of social life? What can Facebook teach us about the powers of systems theory? Would Norbert Wiener and Niklas Luhmann be friends on Facebook?

    8. Is Research Doomed?
    The design of Facebook excludes the third person perspective, as the only way in is through ones own profile. What does this inbuilt ‘me-centricity’ imply for social media research? Does it require us to rethink the so-called objectivity of researchers and the detached view of current social research? Why is it that there are more than 200 papers about the way people use Facebook, but the site is ‘closed’ to true quantitative inquiry? Is the state of art in social media research exemplary of the ‘quantitative turn’ in new media research? Or is there a need to expand and rethink methods of inquiry in social media research? Going beyond the usual methodological approaches of the quantitative and qualitative, we seek to broaden the scope of investigating these media. How can we make sense of the political economy and the socio-technical elements, and with what means? Indeed, what are our toolkits for collective, transdisciplinary modes of knowledge and the politics of refusal?

    9. Researching Unstable Ontologies
    Software destabilizes Facebook as a solid ontology. Software is always in becoming and so by nature ontogenetic. It grows and grows, living off of constant input. Logging on one never encounters the same content, as it changes on an algorithmic level and in terms of the platform itself. What does Facebook’s fluid nature imply for how we make sense of and study it? Facebook for instance willingly complicates research: 1. It is always personalized (see Eli Pariser). Even when creating ‘empty’ research accounts it never gives the same results compared to other people’s empty research accounts. 2. One must often be ‘inside’ social media to study it. Access from the outside is limited, which reinforces the first problem. 3. Outside access is ideally (for Facebook and Twitter) arranged through carefully regulated protocols of APIs and can easily be restricted. Next to social media as a problem for research, there is also the question of social research methods as intervention.

    10. Making Sense of Data: Visualization and Critique
    Data representation is one of the most important battlefields nowadays. Indeed, global corporations build their visions of the world increasingly based on and structured around complex data flows. What is the role of data today and what are the appropriate ways in which to make sense of the burgeoning datasets? As data visualization is becoming a powerful buzzword and social research increasingly uses digital tools to make ‘beautiful’ graphs and visualizations, there is a need to take a step back and question the usefulness of current data visualization tools and to develop novel analytical frameworks through which to critically grasp these often simplified and nontransparent ways of representing data.

    Not only is it important to develop new interpretative and visual methods to engage with data flows, data itself needs to be questioned. We need to ask about data’s ontological and epistemological nature. What is it, who is the producer, for whom, where is it stored? In what ways do social media companies’ terms of service regulate data? Whether alternative social media or monopolistic platforms, how are our data-bodies exactly affected by changes in the software?

    11. Pitfalls of Building Social Media Alternatives
    It is not only important to critique and question existing design and socio-political realities but also to engage with possible futures. The central aim of this project is therefore to contribute and support ‘alternatives in social media’. What would the collective design of alternative protocols and interfaces look like? We should find some comfort in the small explosion of alternative options currently available, but also ask how usable these options are and how real is the danger of fragmentation. How have developers from different initiatives so far collaborated and what might we learn from their successes and failures? Understanding any early failures and successes of these attempts seems crucial.

    A related issue concerns funding difficulties faced by projects. Finally, in what ways does regionalism (United States, Europe, Asia) feed into the way people search for alternatives and use social media.

    12. Showcasing Alternatives in Social Media
    The best way to criticize platform monopolies is to support alternative free and open source software that can be locally installed. There are currently a multitude of decentralized social networks in the making that aspire to facilitate users with greater power to define for themselves with whom share their data. Let us look into the wildly different initiatives from Crabgrass, Appleseed, Diaspora, NoseRub, BuddyCloud, Protonet, StatusNet, GNU Social, Lorea and OneSocialWeb to the distributed Twitter alternative Thimbl.

    In which settings are these initiative developed and what choices are made for their design? Let’s hear from the Spanish activists who have recently made experiences with the n-1.cc platform developed by Lorea. What community does this platform enable? While traditional software focuses on the individual profile and its relation to the network and a public (share with friends, share with friends of friends, share with public), the Lorea software for instance asks you with whom to share an update, picture or video. It finegrains the idea of privacy and sharing settings at the content level, not the user’s profile. At the same time, it requires constant decision making, or else a high level of trust in the community you share your data with. And how do we experience the transition from, or interoperability with, other platforms? Is it useful to make a distinction between corporate competitors and grassroots initiatives? How can these beta alternatives best be supported, both economically and socially? Aren’t we overstating the importance of software and isn’t the availability of capital much bigger in determining the adoption of a platform?

    13. Social Media Activism and the Critique of Liberation Technology
    While the tendency to label any emergent social movement as the latest ‘Twitter revolution’ has passed, a liberal discourse of ‘liberation technology’ (information and communication technologies that empower grassroots movements) continues to influence our ideas about networked participation. This discourse tends to obscure power relations and obstruct critical questioning about the capitalist institutions and superstructures in which these technologies operate. What are the assumptions behind this neo-liberal discourse? What role do ‘developed’ nations play when they promote and subsidize the development of technologies of circumvention and hacktivism for use in ‘underdeveloped’ states, while at the same time allowing social media companies at home to operate in increasingly deregulated environments and collaborating with them in the surveillance of citizens at home and abroad? What role do companies play in determining how their products are used by dissidents or governments abroad? How have their policies and Terms of Use changed as a result?

    14. Social Media in the Middle East and Beyond
    The justified response to downplay the role of Facebook in early 2011 events in Tunisia and Egypt by putting social media in a larger perspective has not taken off the table the question of how to organize social mobilizations. Which specific software do the ‘movements of squares’ need? What happens to social movements when the internet and ICT networks are shut down? How does the interruption of internet services shift the nature of activism? How have repressive and democratic governments responded to the use of ‘liberation technologies’? How do these technologies change the relationship between the state and its citizens? How are governments using the same social media tools for surveillance and propaganda or highjacking Facebook identities, such as happened in Syria? What is Facebook’s own policy when deleting or censoring accounts of its users?

    How can technical infrastructures be supported which are not shutdown upon request? How much does our agency depend on communication technology nowadays? And whom do we exclude with every click? How can we envision ‘organized networks’ that are based on ’strong ties’ yet open enough to grow quickly if the time is right? Which software platforms are best suited for the ‘tactical camping’ movements that occupy squares all over the world?

    15. Data storage: social media and legal cultures
    Data that is voluntarily shared by social media users is not only used for commercial purposes, but is also of interest to governments. This data is stored on servers of companies that are bound to the specific legal culture and country. This material-legal complex is often overlooked. Fore instance, the servers of Facebook and Twitter are located in the US and therefore fall under the US jurisdiction. One famous example is the request for the Twitter accounts of several activists (Gonggrijp, Jónsdóttir, Applebaum) affiliated with Wikileaks projects by the US government. How do activists respond and how do alternative social media platforms deal with this issue?

    • There are however, multiple issues with Signal, namely:

      Lack of federation
      Dependency on Google Cloud Messaging
      Your contact list is not private
      The RedPhone server is not open-source
      ...
      There is a modified version of Signal called LibreSignal, that removed the Google dependency from the Signal app, allowing Signal to be run on other (Android) devices, like CopperheadOS, or Jolla phones (with Android compatibility layer).
      ...
      What is a problem, however, is the fact that he does not want LibreSignal to use the Signal servers. Which would be fine if he allowed LibreSignal to federate across using their own servers. This was tried once (Cyanogenmod, and also offered to Telegram, of all people) but subsequently abandoned, because Moxie believes it slows down changes to the app and/or protocol.
      ...
      Currently, the official Signal client depends on Google Cloud Messaging to work correctly. The alternative that has been developed by the people of LibreSignal has removed that dependency, so people running other software, like Jolla or CopperheadOS can run Signal. Unfortunately, the policy decisions of OpenWhisperSystems and Moxie Marlinspike make it so that it became impossible to reliably run unofficial Signal clients that use the same server infrastructure, so people can communicate. Also, federation, like explained in the previous section, is expressly hindered and prohibited by OpenWhisperSystems, so it is not an option for LibreSignal to simply run their own servers and then federate within the wider Signal network, allowing people to contact each other across clients.
      ...
      We as a community need to come up with a viable solution and alternative to Signal that is easy to use and that does in fact respect people’s choices, both in the hardware and software that they choose to run.

      In my view, there should be a tool that is fully free software (as defined by the GNU GPL), that respects users’ freedoms to freely inspect, use, modify the software and distribute modified copies of the software. Also, this tool should not have dependencies on corporate infrastructure like Google’s (basically any partner in PRISM), that allows these parties to control the correct working of the software.

      #self_hosting #open_source

  • Dans le cadre du Colloquium d’informatique spécial Doctor Honoris Causa de l’UPMC Sorbonne Universités [http://www.lip6.fr/colloquium/] intitulé :

    “What Makes Digital Inclusion Good Or Bad?”
    Richard Stallman de la Gnu fondation.

    L’exposé aura lieu :
    Mardi 11 octobre à 17h30
    Amphi 44

    Un cocktail est prévu à 16h45 en prélude à la conférence.

    Abstract:
    —————————

    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs,
    nonfree software that controls users, and the War on Sharing. Computers for voting make election results untrustworthy.
    Other threats come from use of web services. Finally, we have no assured right to make any particular use of the Internet;
    every activity is precarious, permitted only as long as companies are willing to cooperate with our doing it.

  • LuaRadio
    http://luaradio.io

    LuaRadio is a lightweight, embeddable flow graph signal processing framework for software-defined radio. It provides a suite of source, sink, and processing blocks, with a simple API for defining flow graphs, running flow graphs, creating blocks, and creating data types. LuaRadio is built on LuaJIT, has a small binary footprint of under 750 KB (including LuaJIT), has no external hard dependencies, and is MIT licensed.

    LuaRadio can be used to rapidly prototype software radios, modulation/demodulation utilities, and signal processing experiments. It can also be embedded into existing radio applications to serve as a user scriptable engine for processing samples.

    • Both #GNU_Radio and #LuaRadio are frameworks for flow graph signal processing. Many of the concepts regarding flow graphs and blocks in LuaRadio imitate or are inspired by GNU Radio. LuaRadio is inclined more towards scripting and prototyping than GNU Radio, and emphasizes fast, compilation-free block development.

  • OpenMandriva LX3 – what is there? Why to choose exactly it?…
    https://blog.openmandriva.org/en/2016/02/openmandriva-lx3-what-is-there-why-to-choose-exactly-it

    Why should you use the OpenMandriva Lx 3 GNU/Linux distribution? Here’s a short list: OpenMandriva Lx 3…. a cut above the rest 1.User friendly Easy to use installer (https://calamares.io) 2. Software Built with LLVM/clang for a smaller memory footprint, increased speed and better maintainability * Kernel nrjQL gives you a combination of flexibility … Continue reading »

    #General

  • A Skeleton Key of Unknown Strength | Dan Kaminsky’s Blog
    http://dankaminsky.com/2016/02/20/skeleton

    this galaxy is (…) Ubuntu Linux, in a map by Thomi Richards, showing how each piece of software inside of it depends on each other piece.

    There is a black hole at the center of this particular galaxy – the GNU C Standard Library, or #glibc. And at this center, in this black hole, there is a flaw. More than your average or even extraordinary flaw, it’s affecting a shocking amount of code. How shocking?

    I’ve seen a lot of vulnerabilities, but not too many that create remote code execution in #sudo. When DNS ain’t happy, ain’t nobody happy. Just how much trouble are we in?

    We’re not quite sure.

    #cartographie #internet #linux (et le gros #trou de sécurité #DNS au cœur du trou noir qu’est #glibc)

  • Unicode Font Guide For Free/Libre Open Source Operating Systems
    http://www.unifont.org/fontguide

    This is a selective guide to Unicode-based fonts and script projects that are ideal for free/libre/open source (FLOSS) operating systems like GNU/Linux and FreeBSD. As a general policy, I include here only fonts that:

    Contain Unicode CMAPs for mapping Unicode values to glyphs.
    Can be downloaded and used legally for free.

    Preference is given to high-quality vector fonts that have been released under SIL International’s Open Font License (OFL), the Free Software Foundation’s GNU General Public License (GPL), and similarly open licenses. I also include other important Unicode fonts, including a few notable shareware fonts where the authors request payment of a fee after an initial free evaluation. Although this document focuses on vector fonts that work well on free operating systems, these fonts will also work well on Unicode-capable Windows operating systems (Windows 2000 and XP) and on Apple OSX.

    #UTF-8

  • “Encrypted virtual servers and web hosting based in #Iceland \ Locating in Reykjavík, Iceland, is an easy way to reduce your carbon footprint — the Icelandic grid is powered by 99% green electricity. Ecological and Dissident Hosting, a service provided by Webarchitects, in partnership with 1984.is, offers green encrypted GNU/Linux Virtual Servers and Website Hosting.”

    http://ecodissident.net

    #cloud #encryption #VPS #server_hosting #green_something

  • Want a decentralized, encrypted, Free (as in freedom) “social” app on Android and desktop ?
    http://www.goffi.org/post/2015/10/26/Want-a-decentralized%2C-encrypted%2C-Free-%28as-in-freedom%29-%E2%80%9Csocial

     We have just launched a crowdfunding campaign to develop a new frontend to Libervia, and port it to Android (in a native application!).http://www.arizuka.com/en/projects/libervia (subtitles available in many languages). If the campaign is successful, we’ll have a unique tool. Here are only a few features managed by Libervia: blogging/microblogging: we have a decentralized blogging engine based on XMPP, no need to create an account/validate an email to post a commentinstant messaging, single or multi-user, with a lot of featuresend to end encryption: we already manage OTR for single chat, there is a good probability that we also implement OMEMO/Axolotlfile sharing: being file uploading or P2P transfergroup permissions: similarly to what others call “circle” or “aspect”, you can share with (...)

    #GNU-Linux #jabber-xmpp-en #projet #SàT