Digital Ludeme Project
The Digital Ludeme Project is a five year ERC-funded research project hosted by Maastricht University. This project is a computational study of the world's traditional strategy games throughout recorded human history. It aims to improve our understanding of traditional games using modern AI techniques, to chart their historical development and explore their role in the development of human culture and the spread of mathematical ideas.
games  ai 
20 days ago
The Quiet Year - Buried Without Ceremony
The Quiet Year is a map game. You define the struggles of a community living after the collapse of civilization, and attempt to build something good within their quiet year. Every decision and every action is set against a backdrop of dwindling time and rising concern.

The game is played using a deck of cards – each of the 52 cards corresponds to a week during the quiet year. Each card triggers certain events – bringing bad news, good omens, project delays and sudden changes in luck. At the end of the quiet year, the Frost Shepherds will come, ending the game.

The Quiet Year occupies an interesting space – part roleplaying game, part cartographic poetry.
20 days ago
The Ground Itself by Everest Pipkin
The Ground Itself is a one-session storytelling game for 2-5 players, played with highly accessible materials (a coin, a six-sided die, and a deck of cards).

Focusing on place- one specific place, chosen by the group - The Ground Itself unfolds over radically disparate time periods that may range from 4 days to 18,000 years. By casting wildly into time, it considers how places both change and remember themselves. Fundamentally, The Ground Itself is about the echoes and traces we leave for others after we are gone.
20 days ago
Paul Soulellis – Urgentcraft
Paul Soulellis

Library of the printed web

From The Conference August 28, 2019

Paul Soulellis is an artist and educator based in Providence, RI. His practice includes teaching, writing and experimental publishing, with a focus on queer methodologies and network culture.

Paul poses important questions about history and erasure and has long been using publishing as a form of resistance. Innovation and creation is about power, but so is the act of deciding what to maintain and preserve, not least in the digital world. What is signal and what is noise?
20 days ago
The Global Disinformation Order (PDF)
2019 Global Inventory of Organised Social Media Manipulation

From OII
disinformation  information-apocalypse 
20 days ago
Naming is hard.
20 days ago
Sad by design | Eurozine
While classical melancholy was defined by isolation and introspection, today’s tristesse plays out amidst busy social media interactions. Geert Lovink on ‘technological sadness’ – the default mental state of the online billions.
20 days ago
experimental p2p community
chat platform
p2p  tools 
20 days ago
Cybernetics Library
The Cybernetics Library is an interdisciplinary browsing library that re-contextualizes the expansive history of cybernetic thought and practice. Unexpected connections between art, technology, and society are facilitated from a contemporary vantage.
cybernetics  art 
20 days ago
Facial Recognition Map is an open-source project to map the current and historic uses of facial recognition technology in publicly-accessible spaces in the UK.
surveillance  cyberpolitics 
20 days ago
Understanding the Lived Effects of Digital ID
In this research, we document many of the lived effects of digital ID systems among mostly marginalised communities in Bangladesh, Ethiopia, Nigeria, Zimbabwe and Thailand.
cyberpunk  cyberpolitics  privacy 
20 days ago
cracker (n)
One who breaks security on a system. Coined ca. 1985 by hackers in defense against journalistic misuse of hacker (q.v., sense 8). An earlier attempt to establish worm in this sense around 1981--82 on Usenet was largely a failure.
20 days ago
HackCurio: Decoding the Cultures of Hacking
Hack_Curio is a video portal into hackerdom that helps explain why hacking is one of the most important phenomena of global culture and politics in the late 20th and early 21st century. Our site features short video clips that are accompanied by a brief explainer about the footage. Our material hails from many different sources: Hollywood and Bollywood film, documentaries, tv ads, talks, homebrewed videos, newscasts, and more. You can find the full catalog of the videos, entries, and authors under "the list" or just visit the category pages, listed below, to find a set of videos united by a shared theme. From military sock puppets to corporate spooks to rick-rolling protesters, what you’ll see here is that hackers do different things and cohere into distinct traditions. They are people of different kinds: they are young and old, men, women, and nonbinary. They are not invisible, immaterial, hidden or cloaked except, of course, when they want to be. Hackers are funny, and scary; hackers are do-gooders, and assholes; they write code; hunt for bugs; tell the government to fuck off; land in jail (and even break out of jail); they work for three-letter agencies and expose them; they secure and break into our systems; invent new laws; bitch and rant; whistle, hum, and rap. Many people have something to say about hackers, from drag queens to politicians. Still curious? Dive in.
culture  security 
20 days ago
T Kill a Centrifuge
A Technical Analysis of What Stuxnet’s Creators Tried to Achieve
security  cyberphysicalsystems 
20 days ago
DIKW pyramid - Wikipedia
a class of models[2] for representing purported structural and/or functional relationships between data, information, knowledge, and wisdom
epistemology  data 
24 days ago
volatilityfoundation/volatility: An advanced memory forensics framework
The Volatility Framework is a completely open collection of tools,
implemented in Python under the GNU General Public License, for the
extraction of digital artifacts from volatile memory (RAM) samples.
The extraction techniques are performed completely independent of the
system being investigated but offer visibilty into the runtime state
of the system. The framework is intended to introduce people to the
techniques and complexities associated with extracting digital artifacts
from volatile memory samples and provide a platform for further work into
this exciting area of research.
security  forensics 
4 weeks ago
DockerSlim (docker-slim): Don't change anything in your Docker container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)
security  containers 
4 weeks ago
JWT Attack Playbook
From the GitHub page of the jwt_tool Python script.
5 weeks ago
Decent Security: Easily Report Phishing and Malware
This is how you can strike back at criminals sending phishing spam - by getting their webpages on blacklists. Blocking their sites helps protect other people and helps researchers trying to stop this. Sites can be blocked within 15 minutes of your report, but you may not immediately see it.
7 weeks ago
Check, Please! Starter Course
In this course, we show you how to fact and source-check in five easy lessons, taking about 30 minutes apiece. The entire online curriculum is two and a half to three hours and is suitable homework for the first week of a college-level module on disinformation or online information literacy, or the first few weeks of a course if assigned with other discipline-focused homework.
october 2019
Link your Mastodon account to Twitter and Instagram. No bamboozle.
september 2019
Habitat Chronicles: The Unum Pattern
A server presence and a client presence are not doing the same job. The fundamental underlying concept that presences embody is not some notion of master vs. replica, but division of labor. Each has distinct responsibilities in the joint work of being the unum. Each is authoritative about different aspects of the unum’s existence (and typically each will maintain private state of their own that they do not share with the other).
august 2019
TrackMeNot is a lightweight browser extension that helps protect web searchers from surveillance and data-profiling by search engines. It does so not by means of concealment or encryption (i.e. covering one's tracks), but instead by the opposite strategy: noise and obfuscation. With TrackMeNot, actual web searches, lost in a cloud of false leads, are essentially hidden in plain view. User-installed TrackMeNot works with Firefox and Chrome browsers, integrates with all popular search engines, and requires no 3rd-party servers or services.
august 2019
Trunk for the Fediverse
Trunk allows you to mass-follow a bunch of people in order to get started with Mastodon or any other platform on the Fediverse.
august 2019
Mobbin is a hand-picked collection of the latest mobile design patterns from apps that reflect the best in design. Get inspiration from over 170 iOS apps and 10,000 patterns (screenshots from iPhone X) available on the platform. Sign up to save your favorite patterns.
design  frontend 
august 2019
Dive in
"come to realize that you find good things to do by getting your hands dirty, not by sitting on the sidelines and bemoaning how no task seems worthy of your conviction."

links to the center for applied rationality so i'm skeptical; this method doesn't really leave room for political analysis of what you're doing
august 2019
Commons Network
Commons Network works with activists, thinkers and policy makers to tell stories, build networks and influence policies to support commoners and defend the commons. We believe the world urgently needs a new narrative and that the commons represents the socially and economically sustainable paradigm for this. We believe communities, cities and regions, rather than nation-states, are the backbone of the new translocal consciousness.
coops  politics 
august 2019
Resonate – the ethical music streaming co-op
Support the artists you love. What takes other services 200 plays, we do in 9 with stream2own.

Co-own your platform. Be a part of an active community; share in decisions and in profits.

Set the terms on which you share. Have a say in how your information is used; decide how to distribute your music.
coops  music 
august 2019
The Subnodes project is an open source initiative focused on streamlining the process of setting up a Raspberry Pi as a wireless access point for distributing content, media, and shared digital experiences. The device behaves as a web server, creates its own local area network, and does not connect with the Internet. This is key for the sake of offering a space where people can communicate anonymously and freely, as well as maximizing the portability of the network–no dependability on an internet connection means the device can be taken and remain active anywhere.
august 2019
Radical Networks
Founded in 2015, Radical Networks is an annual conference that promotes artistic, grassroots activist, and experimental work in telecommunications, including the internet and world wide web. As a summit for investigators and instigators from all disciplines, the event facilitates the open exchange of ideas and collaborations, centering marginalized and underrepresented communities.

Our mission is to have the public critically engage with the communications tools and networks we use and participate in every day, while gaining access to the knowledge needed to create our own tools and alternative infrastructures for community, experimentation, and dissent.
august 2019
OverTheWire: Wargames
The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
august 2019
Use & Modify
This is a personal selection of beautiful, classy, punk, professional, incomplete, weird typefaces. Open source licenses make them free to use and modify. This selection is the result of deep search and crushes. This selection is yours. RB ✕
august 2019
Don't Panic: Making Progress on the "Going Dark" Debate (pdf)
Although we were not able to unanimously agree upon the scope of the problem or the policy solution that would strike the best balance, we take the warnings of the FBI and others at face value: conducting certain types of surveillance has, to some extent, become more difficult in light of technological changes. Nevertheless, we question whether the “going dark” metaphor accurately describes the state of affairs. Are we really headed to a future in which our ability to effectively surveil criminals and bad actors is impossible? We think not.
crypto  security 
august 2019
Can Art Fight Fascism?
Justin Kaushall considers Adorno’s argument that radical art radically changes consciousness.

At a time when populist movements are on the march throughout the world, why should we pay attention to art? Isn’t it self-indulgent to concern oneself with art, music, or literature when the foundations of society and of the international order are being shaken? Or can art itself really change the world?
fascism  art  politics 
august 2019
XMPP: Admin-in-the-middle
In every discussion on instant messaging, some people show up and recommend XMPP-based messengers like Conversations, Gajim, Dino, or Monal. Oftentimes, it is said that these messengers are extremely privacy-friendly due to being federated/decentralized.

We debunked several federation myths and showed issues with XMPP. Furthermore, we showed that privacy policies of several XMPP servers don’t meet basic requirements of the European GDPR.

In this article, we show the perspective of an XMPP server administrator. A server administrator can do basically everything, including injecting arbitrary messages, modifying address books, or logging passwords in cleartext. We strongly recommend always running your own XMPP server (or switch to more secure services).
decentralization  security 
august 2019
An opinionated reading list for the critical programmer. Books and articles about the intersection of Technology with politics, society and ethics. A list curated by programmers for programmers.
technology-studies  programming 
august 2019
A script to de-googlify CSS files, downloading relevant fonts in the process. Because privacy matters and self-hosting is a thing.
august 2019
boofuzz: Network Protocol Fuzzing for Humans — boofuzz 0.1.5 documentation
Like Sulley, boofuzz incorporates all the critical elements of a fuzzer:

Easy and quick data generation.
Instrumentation – AKA failure detection.
Target reset after failure.
Recording of test data.

Unlike Sulley, boofuzz also features:

Much easier install experience!
Support for arbitrary communications mediums.
Built-in support for serial fuzzing, ethernet- and IP-layer, UDP broadcast.
Better recording of test data – consistent, thorough, clear.
Test result CSV export.
Extensible instrumentation/failure detection.
Far fewer bugs.
august 2019
« earlier      
aesthetics ai architecture art bug-bounties career categorytheory community-and-care conferences containers coops crypto cryptocurrency ctf culture culture-of-engineering cybernetics cyberphysicalsystems cyberpolitics cyberpunk cyborgs dark-web data data-visualization decentralization design development devops digital-geography disability disinformation documentation economics elixir environment epistemology fascism fediverse fediverse-space feminism forensics frontend games information-apocalypse infrastructure interesting internet ios libre lifestyle machinelearning mathematics mori music network organization organizations osint p2p philosophy politics privacy programming security software solarpunk surveillance teaching tech-industry technology-studies tools urban via:dakira via:dsalo video visualization webdevelopment wikipedia writeups xmpp

Copy this bookmark: