47
About - nLab
The nLab is a collaborative wiki. It grew out of the desire to have a place for development (the “Lab” in “nLab”) and indexed archives of the ideas and concepts surrounding the discussions at the The nn-Category Café. These discussions primarily are about mathematics, physics and philosophy from the perspective of category theory and higher category theory (the “n” in “nLab” and nPOV).
mathematics  categorytheory 
15 days ago
CC Search
Search for free content in the public domain and under Creative Commons licenses.
20 days ago
Center for the Cultivation of Technology
A non-profit home for your open source project

The Center for the Cultivation of Technology is a charitable non-profit
host organization for international Free Software projects.
development  libre 
29 days ago
The Law of Leaky Abstractions – Joel on Software
Abstractions fail. Sometimes a little, sometimes a lot. There’s leakage. Things go wrong. It happens all over the place when you have abstractions.
programming 
4 weeks ago
Life Rewired Reads #1
After wilfully ignoring the intelligences of others for so long, the centrality of human intelligence is on the point of being knocked violently aside by our own inventions. A new Copernican trauma looms, wherein we find ourselves standing upon a ruined planet, not smart enough to save ourselves, and no longer by any stretch of the imagination the smartest ones around. Any appeal to survival will have to be made both to technology and other non-human intelligences, and it will be possible only if we are prepared to accept the toy intelligences we’re building not as yet more indications of our own superiority, but as intimations of our ultimate interdependence, and as calls to humility and care.
machinelearning  environment 
4 weeks ago
Ghidra
A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
security 
6 weeks ago
Why Phone Numbers Stink As Identity Proof — Krebs on Security
Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they’ve become de facto identities. At the same time, when you lose control over a phone number — maybe it’s hijacked by fraudsters, you got separated or divorced, or you were way late on your phone bill payments — whoever inherits that number can then be you in a lot of places online.
security 
9 weeks ago
Gnunet
GNUnet is a new network protocol stack for building secure, distributed, and privacy-preserving applications. With strong roots in academic research, our goal is to replace the old insecure Internet protocol stack.

GNUnet is typically run as an overlay network on top of the the existing Internet infrastructure forming the basis of a hybrid peer-to-peer mesh and relay backbone for applications to run on. It could just as well be run independently of the Internet, over dedicated radio and cable.

GNUnet is made for an open society: It's a self-organizing network and it is free software as in freedom. GNUnet puts you in control of your data. You determine which data to share with whom, and you're not pressured to accept compromises.
decentralization 
10 weeks ago
Radicle 🌱
A peer-to-peer stack for code collaboration
decentralization  development 
10 weeks ago
cabal
experimental p2p community chat platform

on DAT
decentralization 
12 weeks ago
Inter font family
Free, open-source sans-serif font designed for screens.
design 
12 weeks ago
Resources for decentralised organising
🐒 Hi I’m Richard D. Bartlett! I’m writing a book about decentralised organising, finding lessons across diverse contexts, from social movements to formal workplaces.

I recently asked on Twitter and on a mailing list for examples of decentralised organisations that have a public, transparent, well-documented handbook that explains how they work (e.g. decision making, roles, communications tools, etc). The response was overwhelming so I’ve digested it into this page.
decentralization  organization 
february 2019
The Quiet Year – Buried Without Ceremony
Collaborative storytelling game.

The Quiet Year is a map game. You define the struggles of a post-apocalyptic community, and attempt to build something good within their quiet year. Every decision and every action is set against a backdrop of dwindling time and rising concern.

The game is played using a deck of cards – each of the 52 cards corresponds to a week during the quiet year. Each card triggers certain events – bringing bad news, good omens, project delays and sudden changes in luck. At the end of the quiet year, the Frost Shepherds will come, ending the game.
games 
january 2019
Manuel Castells - why networks matter (pdf)
Power elite? Precisely not. Elites change with each reconfiguration of networks. Power is exercised by specific configurations of these networks that express dominant interests and values, but whose actors and forms can change. This is why to challenge a certain group in government or in business does not alter the structural logic of domination. This is why to counter networks of power and their connections, alternative networks need to be introduced: networks that disrupt certain connections and establish new ones, such as disconnecting political institutions from the business-dominated
media and re-anchoring them in civil society through horizontal communication networks. Networks versus networks. Domination can hardly be exercised against self-configurating networks. And democratic control is lost in a global network of multidimensional domination hidden in the complexity of switches.
decentralization  cyberpolitics 
january 2019
There are no rights ‘in’ cyberspace — Mark Graham
there isn’t some sort of universally accessible ‘cyberspace’ that we are all brought into once we log onto the Internet. The Internet is not an abstract space or digital global village, but rather a network that enables selective connections between people and information. It is a network that is characterized by highly uneven geographies and in many ways has simply reinforced global patterns of visibility, representation and voice that we’re used to in the offline world.
cyberpolitics  digital-geography 
january 2019
Cwtch
Privacy Preserving Infrastructure for Asynchronous, Decentralized, Multi-Party, and Metadata Resistant Applications
decentralization  privacy 
january 2019
OpenPrivacy position paper: Surveillance Resistant Systems
Historically, we have not built systems that serve the needs of the marginalized, and the resulting asymmetrical power distribution has led to surveillance and censorship at best, and genocide at worst. Today, the threat to the marginalized is still often from the institutions that ostensibly exist to keep our society safe.
privacy 
january 2019
An entertaining polemic against the tech industry - Nothing to lose but their laptops
the industry has reduced real wages, made workers feel dehumanised and less secure, and exposed them to constant, stress-inducing change.
tech-industry 
january 2019
The purpose-free organization
An organization’s main purpose is to give its members a certain social status. Whether employees do productive work or bullshit jobs makes no difference in the life of the organization. Other theories, which state that organizations exist to achieve a specific goal, fail to explain how so many of them can still smoothly obtain resources and pay salaries while being totally dysfunctional (the kind of organizations whose own employees tell you “I don’t understand how it can still run!”).
organizations 
january 2019
Polis
Polis helps organizations understand themselves by visualizing what their members think.
visualization  decentralization 
january 2019
Is There Any Point to Protesting? | The New Yorker
“This is politics transmitted into pastime—politics-as-drug-experience, perhaps—rather than anything capable of transforming society,” Srnicek and Williams write. “If we look at the protests today as an exercise in public awareness, they appear to have had mixed success at best. Their messages are mangled by an unsympathetic media smitten by images of property destruction—assuming that the media even acknowledges a form of contention that has become increasingly repetitive and boring.”
cyberpolitics 
january 2019
How Dat Works
Almost every concept is introduced with an example or by showing it in context. Visual aspects such as layout, alignment, whitespace, repetition and color are underused in technical documentation so How Dat Works makes heavy use of these.

A good example of visualization of a protocol.
decentralization  documentation  visualization 
january 2019
Dropgangs, or the future of darknet markets • Opaque Link
To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends.

Instead of using websites on the darknet, merchants are now operating invite-only channels on widely available mobile messaging systems like Telegram. This allows the merchant to control the reach of their communication better and be less vulnerable to system take-downs. To further stabilize the connection between merchant and customer, repeat customers are given unique messaging contacts that are independent of shared channels and thus even less likely to be found and taken down. Channels are often operated by automated bots that allow customers to inquire about offers and initiate the purchase, often even allowing a fully bot-driven experience without human intervention on the merchant’s side.
security  dark-web 
january 2019
Common Cyborg | Jillian Weise | Granta
tryborg concerns: The Anthropocene, Texting, Networking

cyborg concerns: Can I afford my leg? Will a stalker, a doctor or the law kill me?
cyborgs  disability 
january 2019
Self-fulfilling crisis - Wikipedia
Self-fulfilling crisis refers to a situation that a financial crisis is not directly caused by the unhealthy economic fundamental conditions or improper government policies, but a consequence of pessimistic expectations of investors. In other words, investors’ fear of the crisis makes the crisis inevitable, which justified their initial expectations.
economics  cybernetics 
january 2019
Silent Shout — Real Life
Wi-fi is outdated and makes users vulnerable to data capture. Why do we still depend on it?
infrastructure 
january 2019
Sleep Subjects — Real Life
The products work on us rather than for us, selling us a fiction about subjectivity: that we are completely machine-readable, or at least aspire to be.

Our dreams might be the final frontier of capitalism’s march toward colonizing, quantifying, and capitalizing every aspect of everyday life. The dream may also then be the only ground left on which we can make a stand: Dreams are a space of unknowing, a space of confusion and non-reality outside the effective virtualities that render us machine-readable and wanting to be even more so. Dreams might be a space of autonomy from which we can draw inspiration to move beyond capitalist realism. But only if dreams themselves remain beyond the grasp of the computable subjectivity and its ideological machinery can they offer something other than the reductive vision of tracking, and of total availability to the technologies that intend to tell us who we really are.
technology-studies 
january 2019
Law of triviality - Wikipedia
where the term bikeshedding comes from
january 2019
The Twelve-Factor App
In the modern era, software is commonly delivered as a service: called web apps, or software-as-a-service. The twelve-factor app is a methodology for building software-as-a-service apps that:

Use declarative formats for setup automation, to minimize time and cost for new developers joining the project;
Have a clean contract with the underlying operating system, offering maximum portability between execution environments;
Are suitable for deployment on modern cloud platforms, obviating the need for servers and systems administration;
Minimize divergence between development and production, enabling continuous deployment for maximum agility;
And can scale up without significant changes to tooling, architecture, or development practices.

The twelve-factor methodology can be applied to apps written in any programming language, and which use any combination of backing services (database, queue, memory cache, etc).
development  devops 
january 2019
Vanitas - Wikipedia
A vanitas is a symbolic work of art showing the transience of life, the futility of pleasure, and the certainty of death, often contrasting symbols of wealth and symbols of ephemerality and death.
art  mori 
november 2018
OpenCellID
Public list of cell phone towers.
infrastructure 
february 2017
Does a Protest's Size Matter? - NYTimes.com
After studying protests over the last two decades, I have to deliver some bad news: In the digital age, the size of a protest is no longer a reliable indicator of a movement’s strength. Comparisons to the number of people in previous marches are especially misleading.
cyberpolitics 
january 2017
aesthetics ai art categorytheory culture-of-engineering cybernetics cyberpolitics cyborgs dark-web data-visualization decentralization design development devops digital-geography disability documentation economics environment games infrastructure internet libre machinelearning mathematics mori organization organizations philosophy politics privacy programming security solarpunk tech-industry technology-studies visualization

Copy this bookmark:



description:


tags: