Category:Technology: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
No edit summary
Line 16: Line 16:




Four projects to decentralize the internet to protect free speech:
The [[Dot-P2P Project]], an alternative DNS hierarchy that resists censorship.
The Tahoe Least-Authority File System, a highly fault-tolerant, secure internet filesystem. Historically, network filesystems such as SMB/CIFS and NFS have been both centralized (having a single server) and insecure (lacking any authentication, confidentiality, or integrity for the data). Previous work, such as The Coda Filesystem and Mazières’ SFS, has attempted to address these problems. Tahoe-LAFS is a new effort in this area with an innovative, fine-grained internet-strength security model. Tahoe-LAFS could be used as the basis for a censorship-resistant, confidential, tamper-resistant publishing platform. Transported over Tor, it could also be anonymous.
The Tor Project, an anonymizing overlay network. Although better-known than the other projects described in this post, Tor remains a fruitful project to work on and there is plenty of work left to do. In particular, the use of Tor hidden services lags behind the use of Tor on the client side for many reasons, including performance and the need for more server infrastructure. And to help defeat censorship systems, there is always a need for more people run Tor Bridge Relays.
BitCoin, a decentralized internet currency. Digital cash systems, usually based on cryptographic “proof of work” schemes, have been around since 1990. Some digital cash systems are anonymous or pseudonymous (using e.g. Chaum’s blind signatures), but not all are. Historically, digital cash systems have not succeeded; BitCoin is a new attempt that may be promising. You can download and run the code now, and you can indeed buy things with BitCoins.


=Socio-technological framework=
=Socio-technological framework=

Revision as of 10:58, 30 December 2010

This is a place to monitor technological developments, the P2P infrastructure, software issues, technology-enabled cooperation, etc.. Eventually, this section should exhibit the answer to the following question: what are the technical requirements for human emancipation? How to we design and implement an infrastructure that guarantees the participation of all?

Our related Standards section monitors open standards, interoperability, etc...

Above all, never forget: Technology Is Not a Force for Either Liberation or Oppression, as explained by Dale Carrico.


Projects we find worthty of support:

  1. Open Source Mesh Networking projects monitored by Open Source Mesh
  2. P2P and the Social Cloud. Rafael Pezzi: Part 1 and Part 2: programmatic statement on a truly open and non-proprietary internet infrastructure
  3. Various strategies to achieve Free Fiber to the home
  4. High Priority Free Software Projects: "The FSF high-priority projects list serves to foster the development of projects that are important for increasing the adoption and use of free software and free software operating systems."
  5. Most congruent with our value system is the technical team at Organic Design in New Zealand.
  6. If your Internet is filtered and you cannot access to given websites, you may find these tools at Sesawe useful.


Four projects to decentralize the internet to protect free speech:

The Dot-P2P Project, an alternative DNS hierarchy that resists censorship.

The Tahoe Least-Authority File System, a highly fault-tolerant, secure internet filesystem. Historically, network filesystems such as SMB/CIFS and NFS have been both centralized (having a single server) and insecure (lacking any authentication, confidentiality, or integrity for the data). Previous work, such as The Coda Filesystem and Mazières’ SFS, has attempted to address these problems. Tahoe-LAFS is a new effort in this area with an innovative, fine-grained internet-strength security model. Tahoe-LAFS could be used as the basis for a censorship-resistant, confidential, tamper-resistant publishing platform. Transported over Tor, it could also be anonymous.

The Tor Project, an anonymizing overlay network. Although better-known than the other projects described in this post, Tor remains a fruitful project to work on and there is plenty of work left to do. In particular, the use of Tor hidden services lags behind the use of Tor on the client side for many reasons, including performance and the need for more server infrastructure. And to help defeat censorship systems, there is always a need for more people run Tor Bridge Relays.

BitCoin, a decentralized internet currency. Digital cash systems, usually based on cryptographic “proof of work” schemes, have been around since 1990. Some digital cash systems are anonymous or pseudonymous (using e.g. Chaum’s blind signatures), but not all are. Historically, digital cash systems have not succeeded; BitCoin is a new attempt that may be promising. You can download and run the code now, and you can indeed buy things with BitCoins.

Socio-technological framework

Brian Whitworth:

"Today technology designers must recognize Socio-Technological System Levels:

 1. Hardware systems, based on physical energy exchanges.
 2. Software systems, based on information data exchanges.
 3. Human–computer interaction systems, based on personal semantic exchanges.
 4. Socio–technical systems, based on community–wide exchanges.

See the Graphic at http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewFile/3173/2647/28318


(Source: The social environment model: Small heroes and the evolution of human society by Brian Whitworth and Alex P. Whitworth. First Monday, Volume 15, Number 11 - 1 November 2010 [1])


Typology

This typology by David Weinberger [2] is actually quite useful in determining basic attitudes towards the internet and technology:

"1. Exceptionalist (E) vs. Ordinarist (O). Exceptionalists believe that the Internet is exceptional, extraordinary, and disruptive, the way, say, the printing press was. Ordinarists believe that the Internet is just another new medium, no more revolutionary than, say, CB radio.

2. Technodeterminist (T) vs. Contextualist (C). Technodeterminists believe that the Net by itself brings about transformations against which it is futile to struggle. Contextualists believe that technology by itself does nothing and changes nothing; other factos determine the effects of technology.

3. Optimist (H) vs. Pessimist (P). Optimists believe that the Net is, or brings about, good things. Pessimists believe otherwise. (Note: Since everyone believes their beliefs are true, everyone thinks they are a realist. When someone actively asserts s/he is a realist, s/he is actually asserting a form of counter-optimism, i.e., pessimism.) (Note: The “H” stands for Happiness or Hope."


Short Citations

All P2P really means is person-to-person: normal folk using web tools - without the annoyance of an institution or mega-corp getting in the way.

- James Cherkoff [3]


"The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it"

- Weiser [4]


“Man is a Tool-using Animal. . . . Nowhere do you find him without Tools; without Tools he is nothing, with Tools he is all.”

- Thomas Carlyle)


One of the key elements of p2p is the end of the distinction between infrastructure and users. Under p2p the users BECOME the infrastructure.

- Paul Hartzog

Long Citations

A truly technological machine is an open one, and the ensemble of open machines presupposes man as permanent organiser, as living interpreter of machines both in themselves and in relation to other machines. Far from being overseer of a gang of slaves, man is the permanent organiser of a society of technical objects which need him as musicians need a conductor... So man's function is to become both coordinator and permanent inventor of the machines around him.

- Simondon, Du mode d'existence des objets techniques (1958) [5]


“I choose to see personal web‐server technology (Opera Unite, Firefox POW, etc) as a breakthrough technology, so people can put their own data into the cloud without paying Flickr or whomever. It is this sort of 'personal technology' I believe will characterize (what we now call) Web 3.0 (and not 3D, or semantic web, etc.). So my dilemma is that, while these technologies are pretty evident today, it is not clear that the people I suspect Pew counts as “the savviest innovators” are looking at them. So I pick “out of the blue” even though (I think) I can see them coming from a mile away.”

– Stephen Downes, National Research Council, Canada [6]


"Advocating for appropriate technology is not "anti-technology," directing our attention to politically pernicious deployments of technodevelopment exploiting the vulnerable and profiting elite-incumbents is not "anti-technology," delineating the catastrophic impacts of false models and marketing hype is not "anti-technology."

As I keep on insisting, time and time again, "technology" doesn't exist at a level of generality that properly enables one to affirm a "pro-technology" or "anti-technology" stance in any kind of monolithic way. Technology is better conceived not as an idol to affirm or as an ethos with which to identify but as an interminable process of collective technodevelopmental social struggle in which a diversity of stakeholders (not all of them necessarily even human) are constantly contesting, collaborating, educating, agitating, organizing, appropriating, and coping with ongoing and proximately emerging technoscientific changes, costs, risks, and benefits."

- Dale Carrico [7]

Key Resources

General Infrastructure

  1. CircleID is a good source to monitor internet infrastructure developments


Anonymity and Censorship Circumvention

  1. Virtual Private Network sites are ideal to circumvent internet censorship: HotSpot Shield , AlwaysVPN (also for Linux) and Social VPN: Run the installer and they just work with one click every time you get to a blocked website.
  2. Anonymizer Sites & Services: "there are two general types: networked and single-point. There is one known networked anonymizer called EFF Tor, highly recommended"
  3. Free proxy lists
  4. Free Public Proxy Servers Lists


Broadband

  1. Various strategies to achieve Free Fiber to the home


Collaboration

  1. Free groupware: links to collaborative software which can be freely used, copied, studied, modified, and redistributed
  2. The Big List of Social Sites includes a directory of social networking sites, social bookmarking sites, and social aggregation sitges.
  3. List of collaborative software and ofwiki software compiled by Mark Elliot


Filesharing

  1. Complete list of P2P Filesharing programs with comparative notes. + A list of free and open source filesharing systems


Free Software Infrastructure

  1. High Priority Free Software Projects: "The FSF high-priority projects list serves to foster the development of projects
  2. Find Open Source Alternatives to commercial software in the OSALT directory
  3. Government and Open Source Software + the 2007 Government Open Source Policies from the Center for Strategic and International Studies, listing the Open Source policies of hundreds of national, state/province/territory and local governments
  4. Directory of Open Source Alternatives to commercial software (also here.
  5. Top 100 Open Source Linux Applications
  6. Open Source Living: guide to the best freely available open source software on the web


Meshworks and Wireless Commons

  1. List of Wireless Community Networks Worldwide
  2. Open Source Mesh Networking projects monitored by Open Source Mesh


Political Organizing

  1. The Organizer's Tool Crib is a participatory directory of online tools and resources for social change activists.
  2. Infrastructure for social movements at Rise Up
  3. Tactical Tech helps activist organizations with training, support and tools such as NGO in a Box


P2P Network Computing

  1. For the most fully distributed Peer to Peer Computer Networks at present, please check out Tribler ;Peerple ; Wipeer
  2. Research into more fully distributed P2P systems for the future: Chord, CX Project, Farsite, Globe Project, Oceanstore, Pastry
  3. Decentralized P2P software programs are monitored and indexed here; Flud maintains a list of Distributed Internet-based Backup Systemssuch as Tahoe


P2P Searching

  1. List of Distributed Search Engines; [8]


Virtual Worlds

  1. Peer to Peer Virtual Worlds: VastPark, Solipsis, Vast; see also: Multiverse


Articles

General Infrastructure

  1. The Rise of the Stupid Network. David Isenberg's classic essay for locating intelligence in the periphery, not the core.
  2. End-to-End Arguments in System Design: The best way to design a network is to allow the sender and receiver to decide what the data means, without asking the intervening network to interpret the data.
  3. World of Ends: Doc Searls and David Weinberger summarize the key characteristics of the internet.


Anonymity and Censorship Circumvention

  1. How Anonymizers Work
  2. How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.
  3. Top Ten methods to access banned websites + Everyone's guide to circumvent internet censorship



Broadband

  1. Telecommunication expert Gordon Cook asks: Is Bandwidth Infinite?
  2. Various strategies to achieve Free Fiber to the home


Free Software Infrastructure

  1. Understanding Free Software, Open Source Software and Floss, thanks to this booklet


P2P Network Computing

  1. Peer-to-Peer Networks as a Distribution and Publishing Model: the best introduction to the advantages of P2P Computing!

Podcasts on P2P Technology

  1. Adam Greenfield on Ubiquitous Computing
  2. Bruce Sterling on the Internet of Things
  3. Conversation with Ward Cunningham


Webcasts on P2P Technology

Full list at: P2P Videos on Internet Technology

Wikipedia Articles

Collaborative Filtering, http://en.wikipedia.org/wiki/Collaborative_filtering

Collaborative software, http://en.wikipedia.org/wiki/Collaborative_software

Computer-supported collaboration, http://en.wikipedia.org/wiki/Computer-supported_collaboration

Computer-supported cooperative work, http://en.wikipedia.org/wiki/Computer_supported_cooperative_work

Debian Free Software Guidelines, http://en.wikipedia.org/wiki/Debian_Free_Software_Guidelines

Filesharing, http://en.wikipedia.org/wiki/Filesharing

GNU, http://en.wikipedia.org/wiki/GNU

GNU General Public License, http://en.wikipedia.org/wiki/GNU_General_Public_License

Grid Computing, http://en.wikipedia.org/wiki/Grid_computing

FLOSS, http://en.wikipedia.org/wiki/FLOSS

FOSS, http://en.wikipedia.org/wiki/FOSS

Free Content, http://en.wikipedia.org/wiki/Free_content

Free software, http://en.wikipedia.org/wiki/Free_software

Open Source, http://en.wikipedia.org/wiki/Open_source

Open Source Initiative, http://en.wikipedia.org/wiki/Open_Source_Initiative

Open Source Definition, http://en.wikipedia.org/wiki/Open_Source_Definition

Open Source software, http://en.wikipedia.org/wiki/Open_source_software

Open Source Software, http://en.wikipedia.org/wiki/Open_Source_Software

Peer to Peer (technology), http://en.wikipedia.org/wiki/Peer_to_peer

Point to Point (technology), http://en.wikipedia.org/wiki/Point-to-Point

Public Domain, http://en.wikipedia.org/wiki/Public_domain

Recommendation system, http://en.wikipedia.org/wiki/Recommendation_system

Reputation, http://en.wikipedia.org/wiki/Reputation

Social software, http://en.wikipedia.org/wiki/Social_software

Wiki, http://en.wikipedia.org/wiki/Wiki

Wiki software, http://en.wikipedia.org/wiki/Wiki_software

Subcategories

This category has the following 2 subcategories, out of 2 total.

Pages in category "Technology"

The following 200 pages are in this category, out of 2,015 total.

(previous page) (next page)

A

B

(previous page) (next page)

Media in category "Technology"

The following 4 files are in this category, out of 4 total.