Category:Security: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
Line 20: Line 20:
#'''[http://irevolution.wordpress.com/2009/06/15/digital-security/ How To Communicate Securely in Repressive Environments].''' Patrick Meier: ''Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.''
#'''[http://irevolution.wordpress.com/2009/06/15/digital-security/ How To Communicate Securely in Repressive Environments].''' Patrick Meier: ''Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.''
#Athina Karatzogianni Dr. 2011. "[[Cyberconflict and the Future of Warfare]]" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming''' [http://works.bepress.com/athina_karatzogianni/8]
#Athina Karatzogianni Dr. 2011. "[[Cyberconflict and the Future of Warfare]]" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming''' [http://works.bepress.com/athina_karatzogianni/8]
#Patricia Hynes: [[War and the Tragedy of the Commons‎]], 7-part series
#David Morris: The [http://www.onthecommons.org/military-and-commons Military and the Commons]


=Key Tags=
=Key Tags=

Revision as of 11:58, 19 September 2011

This new section will monitor 'peer to peer warfare', security, cyber-crime and similar issues.


Internet Security Resources

  1. FLOSS Manual for Circumvention Tools‎ ; Bypassing Internet Censorship. [1]
  2. Guide to Mobile Security for Citizen Journalists‎; [2]
  3. EPIC Online Guide to Practical Privacy Tools‎ [3]
  4. Anonymous Blogging with WordPress and Tor[4]
  5. Security in a Box‎
  6. Quick Guide to Secure Communication‎ [5]
  7. Everyone's Guide to Bypassing Internet Censorship‎


Key Articles

  1. John Robb on Cyberinfrastructure Defense
  2. The Power of Statelessness. By Jakub Grygiel: The withering appeal of the state [6]
  3. How To Communicate Securely in Repressive Environments. Patrick Meier: Core to effective strategic nonviolent action is the need to remain proactive and on the offensive; the rationale being that both the resistance movement and repressive regime have an equal amount of time allocated when the show-down begins. If the movement becomes idle at any point, this may give the regime the opportunity to regain the upper hand, or vice versa.
  4. Athina Karatzogianni Dr. 2011. "Cyberconflict and the Future of Warfare" Hall Gardner and Oleg Kobtzeff (eds.) Ashgate Companion to War, Ashgate, forthcoming [7]
  5. Patricia Hynes: War and the Tragedy of the Commons‎, 7-part series
  6. David Morris: The Military and the Commons

Key Tags

For updates, see the following tags:

  1. http://del.icio.us/mbauwens/P2P-Warfare
  2. http://del.icio.us/mbauwens/P2P-Security
  3. http://del.icio.us/mbauwens/P2P-Crime
  4. http://del.icio.us/mbauwens/P2P-Policing

Pages in category "Security"

The following 200 pages are in this category, out of 409 total.

(previous page) (next page)
(previous page) (next page)