Global Contact Meetups: Difference between revisions
Ruddyconsult (talk | contribs) |
Ruddyconsult (talk | contribs) |
||
Line 133: | Line 133: | ||
Not only Germany's Federal Office of Investigation (BKA in German), but its counterparts in all EU member states are building DNA databases, and they are interconnected. By 2014 they plan to have synchronized data with “secure countries” such as the USA and have constructed a transatlantic catalog of “traveling violent offenders” (hooligans, demonstrators, etc.). The speaker hopes to improve the awareness of this development in the public, compares it to data retention, and has an English version of the site, http://www.fingerwegvonmeinerdna.de | Not only Germany's Federal Office of Investigation (BKA in German), but its counterparts in all EU member states are building DNA databases, and they are interconnected. By 2014 they plan to have synchronized data with “secure countries” such as the USA and have constructed a transatlantic catalog of “traveling violent offenders” (hooligans, demonstrators, etc.). The speaker hopes to improve the awareness of this development in the public, compares it to data retention, and has an English version of the site, http://www.fingerwegvonmeinerdna.de | ||
Prüm Convention, 2005, http://en.wikipedia.org/wiki/Pr%C3%BCm_Convention | |||
10) Session: The Bare Facts: Why everyone has something to hide | |||
Speaker: Mark Neis, neismark at gmx dot de | |||
The often-heard objection to doubts about data protection measures that one has nothing to hide has consequences for the individual and for society. A novel is cited about a government scientist who devises a truth drug http://en.wikipedia.org/wiki/Kallocain |
Revision as of 16:01, 15 October 2011
To support and synergize work already being done online and offline, organizers of the Contact Summit are coordinating resources for various conversations and projects (distributed Global Contact Meetups) to become aware of each other so that a network will emerge with a life of its own. To be part of the network, nodes should
- self-identify on this wiki page
- describe your focus (project or affinity),
- identify a contact person or project lead, and
- explain the help you need and/or the resources you have to offer.
- post a link to your Meetup Everywhere group
Remote Meetup groups
Germany, Berlin
- This event is cancelled http://www.meetup.com/Contact/Berlin/
Germany, Dresden (hashtag = #datenspuren)
- Selected sessions of this event are to be blogged in English (see descriptions of selected sessions below the horizontal line) http://datenspuren.de/ will take place at the hackerspace c3d2 described in this free online book.
Germany, Karlsruhe
- We are currently (8/18/2011) three individuals trying to spread the word about Contactcon and the Freedombox. We have access to some technical equipment in a meeting room at at the hackerspace Entropia described in this free online book.
- Contacts: thomas AT thomasruddy.org hannes AT stressinduktion.org
- Need: correction of the following page to read "Karlsruhe"
- Meetup: http://www.meetup.com/Contact/Stuttgart-DE/
New Zealand, Wellington
- Retake the Net is an initiative connecting people with concrete projects to help keep the net free and open. We were inspired by the Contact Summit but have a special Kiwi-focus. More about us: http://retakethe.net/about/faq
- We have a ~35 member meetup group who is getting together every 6 weeks or so to share updates on the projects: http://www.meetup.com/Contact/Wellington
- On 29 October 2011 we'll hold the inaugural Retake the Net Barcamp in Wellington: http://wiki.retakethe.net
- Our website: http://retakethe.net
- Contact: sibylle AT retakethe.net, or on Twitter at @retakethenet
Switzerland, Yverdon (hashtag = #forumeculture)
- 12 October: L'éthique sur l'Internet et les réseaux sociaux avec Richard M. Stallman
- Reporting in English by thomas AT thomasruddy.org from this French-language event on "Ethics on the Internet and Social Networks" featuring:
- Anne Collier from USA (www.connectsafely.org)
- Florence Devouard on Wikipedia images
- Olivier Philippot on Green IT
The following is a report on two sessions, one on "ethical ISP contracts" and another one intended to be an interactive exploration of general topics like the ones hinted at in the questions listed four paragraphs below.
In the first session intended for SMEs the speaker, a lawyer and author of a chapter in the free PDF book on international FOSS law, gave negotiation advice derived from his extensive practice. Michel Jaccard, co-author of an article in this brand-new open-source law book available in free fulltext.
In the latter workshop there was a perceptible gap between the participants' dissatisfaction with Facebook and any awareness of the alternative distributed social networking under principles of user-centricity or even FOSS. Ironically these same participants then went into the auditorium to listen to the sophisticated and comparatively radical critique by Richard Stallman of proprietary software.
Thus, one can conclude that the organizers, who have impeccable FOSS credentials, had undertaken the job of giving the local public free access to the event to realize objectives of continuing education. These participants, however, as one must qualify the assessment, still have a long way to go before they could be said to have reached an understanding of FOSS principles, even though Stallman assumed they could follow the argumentation offered in his good French.
Organizers in Yverdon had posed the questions (here translated into English):
What are the bases for being able to use computer science with regard to principles of sustainable development, materials, networks and software – both individually and collectively?
How to use the Internet in a confident manner without having to fear viruses, plagiarism, abuse, spontaneity, cyber-harassment or other concrete risks?
Ethical points of reference and limits with Facebook, Twitter and other social networks?
What generic pedagogical scenarios are the most appropriate for getting the participants of a group involved in co-creation, as on Wikipedia?
In what ways is free culture a solid basis for integrating oneself well in the digital world?
- Despite its being listed last in the alphabet, chronologically this event will be the first to take place, thus providing initial input for the rest of the network in Dresden, Karlsruhe, New York and Wellington.
Short descriptions of selected sessions in Dresden
1) As decentrality is very important in new Social Media services, OStatus and buddycloud were presented.
Session: Data Models of Social Networks
Speaker: Anonymous academic (“Astro”)
The purpose is to improve users' awareness of what principles social network use. Examples of conventional Social Networks are git hub, delicious, etc. User profiles are in HTML and contain time stamps, contact references, feeds based on standards such as RSS, activity streams by others being “followed“, discovery of links, trackback, etc.
Basic functions are to subscribe and to follow topics using PubSubHubbub, Salmon Magic Envelope, etc.
This session also described decentralized social networks such as Ostatus (identi.ca) and buddycloud (XMPP / Jabber ID, federated servers, Atom, open/whitelist/authorize) and the associated principles useful for choosing among existing ones or designing new ones such as:
Unified Modeling Language (UML), http://en.wikipedia.org/wiki/Unified_Modeling_Language
Consistency, Availability, Partition tolerance (CAP), http://en.wikipedia.org/wiki/CAP_theorem
Zooko's triangle, http://en.wikipedia.org/wiki/Zooko%27s_triangle
2) Work on a PhD dissertation in the area of network covert channels and protocol engineering was summarized.
Session: Covert Channels: Information through the backdoor. State-of-the-art, detection, protection, methods
Speaker: Steffen Wendzel, www.wendzel.de
There are said to be two reasons why this topic is set to gain attention in the coming years: firstly, Information Leakage Protection to protect company information, and secondly, because journalists and other users in protected networks can escape censorship authorities by working in covert channels.
http://en.wikipedia.org/wiki/Covert_channel
3) In Dresden there have been two sessions on hosting and how to avoid it: Firstly, Michiel presented www.unhosted.org. Secondly, Benjamin Kellermann, an employee at the Chair for Data Protection and Data Security at the Dresden Polytechnic, showed how to make a user more self-sufficient from his provider and host. Calculations needed for cryptographic protocols can be done with JavaScript, which precludes any client-side installation (zero-footprint).
4) Malte Spitz, a 27-year-old politician with the 90 Alliance/ Greens, famous for having his day tracked by his mobile phone and published, will speak on data retention; a debate will follow.
5) Alexander Heidenreich will speak on mesh-networks, email networks, offline networking and packet radio.
6) There will be a demonstration of "how simple is to get into networks as an attacker and to read content".
7) A journalist demonstrated the use of his CD published and updated in a major German computer magazine intended to make a user independent of any computer he may have to borrow. The speaker has an extensive German Website of advice on privacy.
Session: Personal Data Protection for Beginners: Why and how to avoid data, data protection, data encryption
Speaker: Markus Mandalka
Why are extensive personal profiles being kept of our everyday lives? How can such data be abused? What daily data tracks should I therefore avoid, and how? Shake off data octopuses, fidelity cards, encryption techniques for storage (hard disks, USB sticks) and communication (email and chatting, anonymous surfing).
8) Session: The Internet Should Not be a Space Free of Law
Speaker: Bernd R. Fix http://aspector.com/~brf/
Instead, we should have a discussion about how to guarantee the right of expression in dealing with both problems involving the digital world and ones that go beyond the digital world.
9) Session: DNA Databases and the Distribution of them in Europe
Speaker: uta dot wagenmann at gen-ethisches-netzwerk dot de
Not only Germany's Federal Office of Investigation (BKA in German), but its counterparts in all EU member states are building DNA databases, and they are interconnected. By 2014 they plan to have synchronized data with “secure countries” such as the USA and have constructed a transatlantic catalog of “traveling violent offenders” (hooligans, demonstrators, etc.). The speaker hopes to improve the awareness of this development in the public, compares it to data retention, and has an English version of the site, http://www.fingerwegvonmeinerdna.de
Prüm Convention, 2005, http://en.wikipedia.org/wiki/Pr%C3%BCm_Convention
10) Session: The Bare Facts: Why everyone has something to hide
Speaker: Mark Neis, neismark at gmx dot de
The often-heard objection to doubts about data protection measures that one has nothing to hide has consequences for the individual and for society. A novel is cited about a government scientist who devises a truth drug http://en.wikipedia.org/wiki/Kallocain