Entries tagged as network
Related tags3g gsm lte mobile technology ai algorythm android apple arduino automation crowd-sourcing data mining data visualisation hardware innovation&society neural network programming robot sensors siri software web artificial intelligence big data cloud computing coding fft program amazon cloud ebook google kindle microsoft history ios iphone physical computing satellite drone light wifi botnet security browser chrome firefox ie privacy laptop chrome os os computing farm open source piracy sustainability 3d printing data center energy facebook art car flickr gui internet internet of things maps photos army camera virus social network
Saturday, November 29. 2014
Wednesday, November 05. 2014
Via ars technica
A two-stage attack could allow spies to sneak secrets out of the most sensitive buildings, even when the targeted computer system is not connected to any network, researchers from Ben-Gurion University of the Negev in Israel stated in an academic paper describing the refinement of an existing attack.
The technique, called AirHopper, assumes that an attacker has already compromised the targeted system and desires to occasionally sneak out sensitive or classified data. Known as exfiltration, such occasional communication is difficult to maintain, because government technologists frequently separate the most sensitive systems from the public Internet for security. Known as an air gap, such a defensive measure makes it much more difficult for attackers to compromise systems or communicate with infected systems.
Yet, by using a program to create a radio signal using a computer’s video card—a technique known for more than a decade—and a smartphone capable of receiving FM signals, an attacker could collect data from air-gapped devices, a group of four researchers wrote in a paper presented last week at the IEEE 9th International Conference on Malicious and Unwanted Software (MALCON).
“Such technique can be used potentially by people and organizations with malicious intentions and we want to start a discussion on how to mitigate this newly presented risk,” Dudu Mimran, chief technology officer for the cyber security labs at Ben-Gurion University, said in a statement.
For the most part, the attack is a refinement of existing techniques. Intelligence agencies have long known—since at least 1985—that electromagnetic signals could be intercepted from computer monitors to reconstitute the information being displayed. Open-source projects have turned monitors into radio-frequency transmitters. And, from the information leaked by former contractor Edward Snowden, the National Security Agency appears to use radio-frequency devices implanted in various computer-system components to transmit information and exfiltrate data.
AirHopper uses off-the-shelf components, however, to achieve the same result. By using a smartphone with an FM receiver, the exfiltration technique can grab data from nearby systems and send it to a waiting attacker once the smartphone is again connected to a public network.
“This is the first time that a mobile phone is considered in an attack model as the intended receiver of maliciously crafted radio signals emitted from the screen of the isolated computer,” the group said in its statement on the research.
The technique works at a distance of 1 to 7 meters, but can only send data at very slow rates—less than 60 bytes per second, according to the researchers.
Thursday, October 02. 2014
A startup called Algorithmia has a new twist on online matchmaking. Its website is a place for businesses with piles of data to find researchers with a dreamboat algorithm that could extract insights–and profits–from it all.
The aim is to make better use of the many algorithms that are developed in academia but then languish after being published in research papers, says cofounder Diego Oppenheimer. Many have the potential to help companies sort through and make sense of the data they collect from customers or on the Web at large. If Algorithmia makes a fruitful match, a researcher is paid a fee for the algorithm’s use, and the matchmaker takes a small cut. The site is currently in a private beta test with users including academics, students, and some businesses, but Oppenheimer says it already has some paying customers and should open to more users in a public test by the end of the year.
“Algorithms solve a problem. So when you have a collection of algorithms, you essentially have a collection of problem-solving things,” says Oppenheimer, who previously worked on data-analysis features for the Excel team at Microsoft.
Oppenheimer and cofounder Kenny Daniel, a former graduate student at USC who studied artificial intelligence, began working on the site full time late last year. The company raised $2.4 million in seed funding earlier this month from Madrona Venture Group and others, including angel investor Oren Etzioni, the CEO of the Allen Institute for Artificial Intelligence and a computer science professor at the University of Washington.
Etzioni says that many good ideas are essentially wasted in papers presented at computer science conferences and in journals. “Most of them have an algorithm and software associated with them, and the problem is very few people will find them and almost nobody will use them,” he says.
One reason is that academic papers are written for other academics, so people from industry can’t easily discover their ideas, says Etzioni. Even if a company does find an idea it likes, it takes time and money to interpret the academic write-up and turn it into something testable.
To change this, Algorithmia requires algorithms submitted to its site to use a standardized application programming interface that makes them easier to use and compare. Oppenheimer says some of the algorithms currently looking for love could be used for machine learning, extracting meaning from text, and planning routes within things like maps and video games.
Early users of the site have found algorithms to do jobs such as extracting data from receipts so they can be automatically categorized. Over time the company expects around 10 percent of users to contribute their own algorithms. Developers can decide whether they want to offer their algorithms free or set a price.
All algorithms on Algorithmia’s platform are live, Oppenheimer says, so users can immediately use them, see results, and try out other algorithms at the same time.
The site lets users vote and comment on the utility of different algorithms and shows how many times each has been used. Algorithmia encourages developers to let others see the code behind their algorithms so they can spot errors or ways to improve on their efficiency.
One potential challenge is that it’s not always clear who owns the intellectual property for an algorithm developed by a professor or graduate student at a university. Oppenheimer says it varies from school to school, though he notes that several make theirs open source. Algorithmia itself takes no ownership stake in the algorithms posted on the site.
Eventually, Etzioni believes, Algorithmia can go further than just matching up buyers and sellers as its collection of algorithms grows. He envisions it leading to a new, faster way to compose software, in which developers join together many different algorithms from the selection on offer.
Friday, September 05. 2014
The Internet of Things is still too hard. Even some of its biggest backers say so.
For all the long-term optimism at the M2M Evolution conference this week in Las Vegas, many vendors and analysts are starkly realistic about how far the vaunted set of technologies for connected objects still has to go. IoT is already saving money for some enterprises and boosting revenue for others, but it hasn’t hit the mainstream yet. That’s partly because it’s too complicated to deploy, some say.
For now, implementations, market growth and standards are mostly concentrated in specific sectors, according to several participants at the conference who would love to see IoT span the world.
Cisco Systems has estimated IoT will generate $14.4 trillion in economic value between last year and 2022. But Kevin Shatzkamer, a distinguished systems architect at Cisco, called IoT a misnomer, for now.
“I think we’re pretty far from envisioning this as an Internet,” Shatzkamer said. “Today, what we have is lots of sets of intranets.” Within enterprises, it’s mostly individual business units deploying IoT, in a pattern that echoes the adoption of cloud computing, he said.
In the past, most of the networked machines in factories, energy grids and other settings have been linked using custom-built, often local networks based on proprietary technologies. IoT links those connected machines to the Internet and lets organizations combine those data streams with others. It’s also expected to foster an industry that’s more like the Internet, with horizontal layers of technology and multivendor ecosystems of products.
What’s holding back the Internet of Things
The good news is that cities, utilities, and companies are getting more familiar with IoT and looking to use it. The less good news is that they’re talking about limited IoT rollouts for specific purposes.
“You can’t sell a platform, because a platform doesn’t solve a problem. A vertical solution solves a problem,” Shatzkamer said. “We’re stuck at this impasse of working toward the horizontal while building the vertical.”
“We’re no longer able to just go in and sort of bluff our way through a technology discussion of what’s possible,” said Rick Lisa, Intel’s group sales director for Global M2M. “They want to know what you can do for me today that solves a problem.”
One of the most cited examples of IoT’s potential is the so-called connected city, where myriad sensors and cameras will track the movement of people and resources and generate data to make everything run more efficiently and openly. But now, the key is to get one municipal project up and running to prove it can be done, Lisa said.
The conference drew stories of many successful projects: A system for tracking construction gear has caught numerous workers on camera walking off with equipment and led to prosecutions. Sensors in taxis detect unsafe driving maneuvers and alert the driver with a tone and a seat vibration, then report it to the taxi company. Major League Baseball is collecting gigabytes of data about every moment in a game, providing more information for fans and teams.
But for the mass market of small and medium-size enterprises that don’t have the resources to do a lot of custom development, even targeted IoT rollouts are too daunting, said analyst James Brehm, founder of James Brehm & Associates.
There are software platforms that pave over some of the complexity of making various devices and applications talk to each other, such as the Omega DevCloud, which RacoWireless introduced on Tuesday. The DevCloud lets developers write applications in the language they know and make those apps work on almost any type of device in the field, RacoWireless said. Thingworx, Xively and Gemalto also offer software platforms that do some of the work for users. But the various platforms on offer from IoT specialist companies are still too fragmented for most customers, Brehm said. There are too many types of platforms—for device activation, device management, application development, and more. “The solutions are too complex.”
He thinks that’s holding back the industry’s growth. Though the past few years have seen rapid adoption in certain industries in certain countries, sometimes promoted by governments—energy in the U.K., transportation in Brazil, security cameras in China—the IoT industry as a whole is only growing by about 35 percent per year, Brehm estimates. That’s a healthy pace, but not the steep “hockey stick” growth that has made other Internet-driven technologies ubiquitous, he said.
What lies ahead
Brehm thinks IoT is in a period where customers are waiting for more complete toolkits to implement it—essentially off-the-shelf products—and the industry hasn’t consolidated enough to deliver them. More companies have to merge, and it’s not clear when that will happen, he said.
“I thought we’d be out of it by now,” Brehm said. What’s hard about consolidation is partly what’s hard about adoption, in that IoT is a complex set of technologies, he said.
And don’t count on industry standards to simplify everything. IoT’s scope is so broad that there’s no way one standard could define any part of it, analysts said. The industry is evolving too quickly for traditional standards processes, which are often mired in industry politics, to keep up, according to Andy Castonguay, an analyst at IoT research firm Machina.
Instead, individual industries will set their own standards while software platforms such as Omega DevCloud help to solve the broader fragmentation, Castonguay believes. Even the Industrial Internet Consortium, formed earlier this year to bring some coherence to IoT for conservative industries such as energy and aviation, plans to work with existing standards from specific industries rather than write its own.
Ryan Martin, an analyst at 451 Research, compared IoT standards to human languages.
“I’d be hard pressed to say we are going to have one universal language that everyone in the world can speak,” and even if there were one, most people would also speak a more local language, Martin said.
Via The Register
Google is attempting to shunt users away from old browsers by intentionally serving up a stale version of the ad giant's search homepage to those holdouts.
The tactic appears to be falling in line with Mountain View's policy on its other Google properties, such as Gmail, which the company declines to fully support on aged browsers.
However, it was claimed on Friday in a Google discussion thread that the multinational had unceremoniously dumped a past its sell-by-date version of the Larry Page-run firm's search homepage on those users who have declined to upgrade their Opera and Safari browsers.
A user with the moniker DJSigma wrote on the forum:
In a later post, DJSigma added that there seemed to be a glitch on Google search.
The Opera user then said that the problem appeared to be "intermittent". Others flagged up similar issues on the Google forum and said they hoped it was just a bug.
While someone going by the name MadFranko008 added:
Some Safari 5.1.x and Opera 12.x netizens were able to fudge the system by customising their browser's user agent. But others continued to complain about Google's "clunky", old search homepage.
A Google employee, meanwhile, said that the tactic was deliberate in a move to flush out stick-in-the-mud types who insisted on using older versions of browsers.
"Thanks for the reports. I want to assure you this isn't a bug, it's working as intended," said a Google worker going by the name nealem. She added:
In a separate thread, as spotted by a Reg reader who brought this sorry affair to our attention, user MadFranko008 was able to show that even modern browsers - including the current version of Chrome - were apparently spitting out glitches on Apple Mac computers.
Google then appeared to have resolved the search "bug" spotted in Chrome.
Wednesday, July 16. 2014
Tuesday, July 08. 2014
Ever since covering Fliike, a beautifully-designed physical ‘Like’ counter for local businesses, I’ve been thinking about how the idea could be extended, with a fully-programmable, but simple, ticker-style Internet-connected display.
A few products along those lines do already exist, but I’ve yet to find anything that quite matches what I had in mind. That is, until recently, when I was introduced to LaMetric, a smart ticker being developed by UK/Ukraine Internet of Things (IoT) startup Smart Atoms.
Launching its Kickstarter crowdfunding campaign today, the LaMetric is aimed at both consumers and businesses. The idea is you may want to display alerts, notifications and other information from your online “life” via an elegant desktop or wall-mountable and glance-able display. Likewise, businesses that want an Internet-connected ticker, displaying various business information, either publicly for customers or in an office, are also a target market.
The device itself has a retro, 8-bit style desktop clock feel to it, thanks to its ‘blocky’ LED light powered display, which is part of its charm. The display can output one icon and seven numbers, and is scrollable.
But, best of all, the LaMetric is fully programmable via the accompanying app (or “hackable”) and comes with a bunch of off-the-shelf widgets, along with support for RSS and services like IFTTT, Smart Things, Wig Wag, Ninja Blocks, so you can get it talking to other smart devices or web services. Seriously, this thing goes way beyond what I had in mind — try the simulator for yourself — and, for an IoT junkie like me, is just damn cool.
Examples of the kind of things you can track with the device include time, weather, subject and time left till your next meeting, number of new emails and their subject lines, CrossFit timings and fitness goals, number of to-dos for today, stock quotes, and social network notifications.
Or for businesses, this might include Facebook Likes, website visitors, conversions and other metrics, app store rankings, downloads, and revenue.
In addition to the display, the device has back and forward buttons so you can rotate widgets (though these can be set to automatically rotate), as well as an enter key for programmed responses, such as accepting a calendar invitation.
There’s also a loudspeaker for audio alerts. The LaMetric is powered by micro-USB and also comes as an optional and more expensive battery-powered version.Early-bird backers on Kickstarter can pick up the LaMetric for as little as $89 (plus shipping) for the battery-less version, with countless other options and perks, increasing in price.
Tuesday, June 24. 2014
ComputedBy - The idea to share a WiFi access point is far to be a new one (it is obviously as old as the technology of the WiFi access point itself), but previous solutions were not addressing many issues (including the legal ones) that this proposal seems finally to consider seriously. This may really succeed in transforming a ridiculously endless utopia in something tangible!
Now, Internet providers (including mobile networks) may have a word to say about that. Just by changing their terms of service they can just make this practice illegal... as business does not rhyme with effectiveness (yes, I know, that is strange!!...) neither with objectivity. It took some time but geographical boundaries were raised up over the Internet (which is somehow a as impressive as ridiculous achievement when you think about it), so I'm pretty sure 'they' can find a work around to make this idea not possible or put their hands over it.
Via ars technica
We’ve often heard security folks explain their belief that one of the best ways to protect Web privacy and security on one's home turf is to lock down one's private Wi-Fi network with a strong password. But a coalition of advocacy organizations is calling such conventional wisdom into question.
Members of the “Open Wireless Movement,” including the Electronic Frontier Foundation (EFF), Free Press, Mozilla, and Fight for the Future are advocating that we open up our Wi-Fi private networks (or at least a small slice of our available bandwidth) to strangers. They claim that such a random act of kindness can actually make us safer online while simultaneously facilitating a better allocation of finite broadband resources.
The OpenWireless.org website explains the group’s initiative. “We are aiming to build technologies that would make it easy for Internet subscribers to portion off their wireless networks for guests and the public while maintaining security, protecting privacy, and preserving quality of access," its mission statement reads. "And we are working to debunk myths (and confront truths) about open wireless while creating technologies and legal precedent to ensure it is safe, private, and legal to open your network.”
One such technology, which EFF plans to unveil at the Hackers on Planet Earth (HOPE X) conference next month, is open-sourced router firmware called Open Wireless Router. This firmware would enable individuals to share a portion of their Wi-Fi networks with anyone nearby, password-free, as Adi Kamdar, an EFF activist, told Ars on Friday.
Home network sharing tools are not new, and the EFF has been touting the benefits of open-sourcing Web connections for years, but Kamdar believes this new tool marks the second phase in the open wireless initiative. Unlike previous tools, he claims, EFF’s software will be free for all, will not require any sort of registration, and will actually make surfing the Web safer and more efficient.
Open Wi-Fi initiative members have argued that the act of providing wireless networks to others is a form of “basic politeness… like providing heat and electricity, or a hot cup of tea” to a neighbor, as security expert Bruce Schneier described it.
Kamdar said that the new firmware utilizes smart technologies that prioritize the network owner's traffic over others', so good samaritans won't have to wait for Netflix to load because of strangers using their home networks. What's more, he said, "every connection is walled off from all other connections," so as to decrease the risk of unwanted snooping.
Additionally, EFF hopes that opening one’s Wi-Fi network will, in the long run, make it more difficult to tie an IP address to an individual.
“From a legal perspective, we have been trying to tackle this idea that law enforcement and certain bad plaintiffs have been pushing, that your IP address is tied to your identity. Your identity is not your IP address. You shouldn't be targeted by a copyright troll just because they know your IP address," said Kamdar.
This isn’t an abstract problem, either. Consider the case of the Californian who, after allowing a friend access to his home Wi-Fi network, found his home turned inside-out by police officers asking tough questions about child pornography. The man later learned that his houseguest had downloaded illicit materials, thus subjecting the homeowner to police interrogation. Should a critical mass begin to open private networks to strangers, the practice of correlating individuals with IP addresses would prove increasingly difficult and therefore might be reduced.
While the EFF firmware will initially be compatible with only one specific router, the organization would like to eventually make it compatible with other routers and even, perhaps, develop its own router. “We noticed that router software, in general, is pretty insecure and inefficient," Kamdar said. “There are a few major players in the router space. Even though various flaws have been exposed, there have not been many fixes.”
Friday, June 20. 2014
Not very often do you read something online that gives you the chills. Today, I read two such things.
This broke my heart. In 2008, two Internets ago, Metafilter was my favorite site. It was where I went to find out what the next Star Wars Kid would be, or to find precious baby animal videos to show my cool boyfriend or even more intellectual fare. And now it’s as endangered as the sneezing pandas I first discovered there.
National Internet treasures like Metafilter (or TechCrunch for that matter) should never die. There should be some Internet Preservation Society filled with individuals like Herrman or Marc Andreessen or Mark Zuckerberg or Andy Baio whose sole purpose is to keep them alive.
But there isn’t. Herrman makes a very good point; Useful places to find information, that aren’t some strange Pavlovian manipulation of the human desire to click or identify, just aren’t good business these days.
And Herrman should know, he’s worked in every new media outlet under the web, including the one that AP staffers are now so desperate to join that they make mistakes like this.
The fourth Internet is scary like Darwinism, brutal enough to remind me of high school. It’s a game of identity where you either make people feel like members of some exclusive club, like The Information does with a pricy subscription model or all niche tech sites do with their relatively high CPM, or you straight up play up to reader narcissism like Buzzfeed does, slicing and dicing user identity until you end up with “21 Problems Only People With Baby Faces Will Understand.”
Which brings me to the thing I read today which truly scared the shit out of me. Buzzfeed founder Jonah Peretti, though his LinkedIn is completely bereft of it in favor of MIT, was apparently an undergrad at UC Santa Cruz in the late 90s.
Right after graduation in 1996, he wrote a paper about identity and capitalism in post-modern times, which tl:dr postulated that neo-capitalism needs to get someone to identify with its ideals before it could sell its wares.
(Aside: If you think you are immune to capitalistic entreaties, because you read Adbusters and are a Culture Jammer, you’re not. Think of it this way: What is actually wrong with being chubby? But how hard do modern ads try to tell you that this — which is arguably the Western norm — is somehow not okay.)
The thesis Peretti put forth in his paper is basically the blueprint for Buzzfeed, which increasingly has made itself All About You. Whether you’re an Armenian immigrant, or an Iggy Azaelia fan or a person born in the 2000s, 1990s or 80s, you will identify with Buzzfeed, because its business model (and the entire fourth Internet’s ) depends on it.
As Dylan Matthews writes:
More than anything else in the pantheon of modern writing or as the kids call it, content creation, Buzzfeed aims to be hyper-relatable, through visuals! It hopes it can define your exact identity, because only then will you share its URL on Facebook and Twitter and Tumblr as some sort of badge of your own uniqueness, immortality.
If the first Internet was “Getting information online,” the second was “Getting the information organized” and the third was “Getting everyone connected” the fourth is definitely “Get mine.” Which is a trap.
Which Cog In The Digital Capitalist Machine Are You?
Friday, June 13. 2014
There is no point in kidding ourselves, now, about Who Has the Power.
The Internet wasn’t supposed to be so…Machiavellian.
In 1963, Stewart Brand and his wife set out on a landmark road trip, the goal of which was to educate and enliven the people they encountered with tools for modern living. The word “tools” was taken liberally. Brand wrote that “a realm of intimate, personal power is developing.” Any tool that created or channeled such power was useful. Tools meant books, maps, professional journals, courses, classes, and more.
In 1968, Brand founded the Whole Earth Catalog (WEC), an underground magazine of sorts that would scale in a way no road-weary Dodge ever could. The first issue was 64 pages and cost $5. It opened with the phrase: “We are as gods and might as well get good at it.”
A year after WEC’s start, on October 29, 1969, the first packet of data was sent from UCLA to SRI International. It was called ARPAnet at the time, but with it the Internet was born. Brand and others would come to see the Internet as the essential, defining “tool” of their generation. Until its final issue in 1994, the WEC’s 32 editions provide as good a chronicle of the emergence of cyberculture (as it was then called) as you can find.
Cyberculture. It’s a curious and complicated term in today’s society, isn’t it? Cyberculture is at once completely outdated and awfully relevant.
As Fred Turner has argued, Brand is a key figure in the weaving together of two major cultural fabrics that have since split — counterculture and cyberculture. Brand is also immortalized in Tom Wolfe’s The Electric Kool-Aid Acid Test as a member of Ken Kesey’s Merry Pranksters. And Brand famously assisted researcher Doug Engelbart with the “Mother of all Demos,” the outline of a vision for technology prosthetics that improve human life; it would define computing for decades to come.
Brand attended Phillips Exeter Academy — an elite East Coast high school, and an institution of traditional power if there ever was one. He was a parachutist in the U.S. Army. He graduated with a degree in biology from Stanford, studied design at San Francisco Art Institute and photography at San Francisco State. He also participated in legal studies of LSD and its effects with Timothy Leary.
That’s hardly the typical resume of a technologist or an entrepreneur or an investor. But it should be. The business of making culture has been for too long now controlled by people who live outside it.
It is my opinion that the Internet of today can and must be countercultural again, that cyberculture should — needs to be — countercultural.
That word, countercultural, carries with it the connotation of liberal idealism and societal marginalia. Yet, the new countercultures we’re seeing online today are profoundly mainstream, and drawn along wholly different political lines. The Internet is its own party. The Internet has its own set of beliefs. Springs have sprung the world over and this isn’t simply a nerd thing anymore. We all care passionately about Internet life and Internet liberty and the continual pursuit of happiness both online and off.
Yet if the Internet is a measure of our culture, our zeitgeist, then what does it tell us about the spirit of this age? Our zeitgeist certainly isn’t what’s trending; it’s not another quiz of which TV character you are; it’s not another listicle. I changed the global power structure and all I got was this lousy t-shirt. And Facebook. And Twitter.
What is this generation’s Rolling Stone? What is our Whole Earth Catalog? It’s an important question because if the Internet is defining our culture, and our use of it defines our society, then we have a responsibility to ensure and propel its transformative impact, to understand the ways cyberculture can and should be the counterculture driving change rather than just distracting us from it.
The Daily Dot, a publication I co-founded, documents today’s cyberculture through the lens of online communities — virtual locales in which we arguably “reside” more deliberately than any geography. You should also be reading Edge, N+1, and Dangerous Minds. Even Vanity Fair has turned its eye to this theme, successfully I think, with articles like this. Rolling Stone is doing a pretty good job of being Rolling Stone these days, too.
I’m terminally optimistic, and I believe that counter-cyber-culture is inherently optimistic, as well. Even despite the U.S. government’s overreaching on privacy and “protecting” us from data about our own bodies, despite Silicon Valley’s mad rush to cash in on apps rather than substantial technology, despite most online media’s drastic descent to the lowest common denominator and even lower standards of journalism, I remain…optimistic.
We have found a courage in our growing numbers online. People old and young can be be bold and defining on the Internet, underwritten by the emotional support of peers everywhere. We’re voting for what we want the world to be, and how we want it to be. Why do you think Kickstarter works so well? We fund things that without our help are unlikely to exist, but ought to nonetheless. Our “likes” and “shares” are ultimately becoming votes for the kind of future we want to live in, and I’m optimistic that we will ultimately wield that responsibility with meaning and thoughtfully.
Tumblr. 4chan. Etsy. YouTube. We have emigrated to these outlying territories seeking religious freedoms, cultural freedoms, and personal freedoms alike. We colonized, and are still colonizing, new environs each day and every week. We claim and reclaim the Internet like so many tribal boundaries.
We’re winning more often than not, thank goodness. Aaron Swartz heroically beat SOPA and PIPA against all odds. Yahoo won against PRISM. The Internet won against cancer…with pizza. My godmother knows what Tor is.
The virtual reality community rebelled when princely Oculus sold to Facebook, for the reason that VR is a new superpower and a new countercultural medium that we’re afraid might have fallen into the wrong hands (I don’t believe that’s actually the case, but that’s grounds for another post altogether).
So, yes. A countercultural moment all our own stares us in the face. Like Brand, I hope we can manage to be politically aware and socially responsible in a way that technology begs us to be, without giving ground to the idea that the Internet is anything but ours.
Civil disobedience is a different game when the means of production and dissemination have been fully democratized. We seek differentiated high ground from which to defend our values. We build new back channels to communicate unencumbered. Instead of making catalogues, we make new categories. We wield technology, perhaps unaware on whose shoulders we stand, but at the same time free from the anxiety of influence.
We aspire to be more pure in that sense. We want and we give and we need and we will have…pure Internet.
Editor’s note: Josh Jones-Dilworth is a co-founder of the Daily Dot; founder and CEO of Jones-Dilworth, Inc., an early-stage technology marketing consultancy; and co-founder of Totem, a startup changing PR for the better. Follow his blog here.
(Page 1 of 8, totaling 80 entries) » next page
Show tagged entries