Workers are given least-possible privilege. Deciding which participant is the Page is mainly a question of who should be trusted with the
information. In the Citibank/Mint example, you'd never want Mint to be the Page, but you could potentially have a 3rd participant supply the Page (perhaps
/...\ that's currently viewed as an advantage (IDLs have never been very successful on the Web). Instead, reltypes indicate an
informal (but complete!) specification which is published online, and which acts like a contract between two nodes. A consumer of a Web service (a User Agent) then fetches links, queries
/...\ then crawled your bank interface with an
HTML-scraper. The issue with this system is, of course,
data-containment: you give up your financial
information to
Mint in order to power the app.
I see. That's something we'd never suggest. Instead we'd move
with
> the assumption that you're right, and they should come to agreement with
> your position if only they had the correct
information. It might not
> feel like this, but it's the case. Many cultures around the world have
> conflicting world with the global Western
/...\ more complex cases. But it often comes
> at the expense of other ways to conceive life that do not assume an
>
informational world.
>
> I do think there are homomorphisms in the world, but I do not believe in
> an
informational world that can be reduced
then crawled your bank interface with an
HTML-scraper. The issue with this system is, of course,
data-containment: you give up your financial
information to
Mint in order to power the app.
I see. That's something we'd never suggest. Instead we'd move the
part
/...\ load Mint.com's application into a
Web Worker. Now contained on the client-side, Mint would be
given readonly access to the financial
information, and
read/write access to a section of the DOM for rendering its
UI, and no other privileges. This solves the data-containment
issue.
This really clarified
/...\ citibank.com - would make it much harder to
break into an tamper with the data; but also those banks would have
to share
information about users balances, which they might not want
to.) This case could be arranged to run the users account at the
users peer too.
B) citibank.com
Christian de Larrinaga [LibreList] Re: [redecentralize] RDC 15 2015-10-16 13:38:46 controlled and edited by it's readers, that are
censorship proof, that remove bias from journalism and allows more
accurate and transparent dissemination of
information to citizens. After
all,
information and news are what allows us, as a society to make good
decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to
give people the
information and data to accurately asses our problems
and challenge the status quo.I am interested
in changing this and exploring the ideas behind this if anyone is
interested come and say hello. Asides
outcomes on my intray today is I was approached for some
enabling documentation that alternative network community providers
could provide to communities to better
inform them of the issues and
comparisons between going to telco based broadband v. their own network
service.
The more upstream issues around using applications such
/...\ based
services and the general levels of insecurity through third party
information sharing or theft (doxing)
Local Internet Society chapters are a good resource for this such as
mine ISOC UK England but as volunteer bodies they need community support
to build this type of
information resource.
Christian
Anish Mangal
intray today is I was approached for some
> enabling documentation that alternative network community providers
> could provide to communities to better
inform them of the issues and
> comparisons between going to telco based broadband v. their own network
> service.
>
> The more upstream issues around
/...\ using applications such as web Ad based
> services and the general levels of insecurity through third party
>
information sharing or theft (doxing)
>
> Local Internet Society chapters are a good resource for this such as
> mine ISOC UK England but as volunteer bodies they need community
/...\ support
> to build this type of
information resource.
>
>
> Christian
>
> Anish Mangal wrote:
> > Wanting to have a discussion with folks who work with or are
> involved in
> > providing internet access to people/places which didn't have it
> before
already coming with
the assumption that you're right, and they should come to agreement with
your position if only they had the correct
information. It might not
feel like this, but it's the case. Many cultures around the world have
conflicting world with the global Western approach
/...\ effective even in more complex cases. But it often comes
at the expense of other ways to conceive life that do not assume an
informational world.
I do think there are homomorphisms in the world, but I do not believe in
an
informational world that can be reduced to ones
edited by it's readers, that are
> censorship proof, that remove bias from journalism and allows more
> accurate and transparent dissemination of
information to citizens.
> After all,
information and news are what allows us, as a society to
> make good decisions and build lasting systems that
/...\ enough just to give people the ability to change things we also
> need to give people the
information and data to accurately asses our
> problems and challenge the status quo.I am interested in changing this
> and exploring the ideas behind this if anyone is interested come
controlled and edited by it's readers, that are
censorship proof, that remove bias from journalism and allows more
accurate and transparent dissemination of
information to citizens. After
all,
information and news are what allows us, as a society to make good
decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to
give people the
information and data to accurately asses our problems
and challenge the status quo.I am interested
in changing this and exploring the ideas behind this if anyone is
interested come and say hello. Asides
tensions between these
companies and governments (taxes, mass surveillance), competitors
(abuse of dominating position) and users (less choice because of a
less competitive market,
information manipulation (one says B.
Obama has been elected thanks to big data...). Many other
stakeholders should be in this list (the taxi men, hotel trade
/...\ What will be the essential functional building blocks of
the Internet then?
Decentralization could be built around : 1/ PIMS (personal
information management systems) 2/ third parties who can hosts the
PIMS (banks, hosting companies, hardware vendors to self hostâ¦) 3/
vendors/administrations/associations providing data to individuals
from their
/...\ internet. Here are few hints, they are
mainly for the next 5 to 10 years, not beyond.
1/ personal cloud, PIMS (personal
information management systems),
self-data... whatever you call it : development of system that
empowers the individual to take back of their data, in order to be
really empowered
assumption that you're right, and they should come to
> agreement with
> > your position if only they had the correct
information. It might not
> > feel like this, but it's the case. Many cultures around the world
> have
> > conflicting world with
/...\ cases. But it often
> comes
> > at the expense of other ways to conceive life that do not assume an
> >
informational world.
> >
> > I do think there are homomorphisms in the world, but I do not
> believe in
> > an
informational
controlled and edited by it's readers, that are
censorship proof, that remove bias from journalism and allows more
accurate and transparent dissemination of
information to citizens. After
all,
information and news are what allows us, as a society to make good
decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to
give people the
information and data to accurately asses our problems
and challenge the status quo.I am interested
in changing this and exploring the ideas behind this if anyone is
interested come and say hello. Asides
with
> the assumption that you're right, and they should come to agreement with
> your position if only they had the correct
information. It might not
> feel like this, but it's the case. Many cultures around the world have
> conflicting world
/...\ complex cases. But it often comes
> at the expense of other ways to conceive life that do not assume an
>
informational world.
>
> I do think there are homomorphisms in the world, but I do not believe in
> an
informational world that
will.sch [LibreList] RDC 15 2015-10-15 13:25:28 controlled and edited by it's readers, that are
censorship proof, that remove bias from journalism and allows more
accurate and transparent dissemination of
information to citizens. After
all,
information and news are what allows us, as a society to make good
decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to
give people the
information and data to accurately asses our problems
and challenge the status quo.I am interested
in changing this and exploring the ideas behind this if anyone is
interested come and say hello. Asides
serve the wrong thing?
>> (this could be malicious or by accident)
>>
>> What you do have is crypto, and
information processing powers many times
>> greater
>> than when the property system was created. Would it be possible to
>> create
/...\ system that enforced cooperation using just
information?
>>
>> I think this is possible, not just because there are computer systems
>> which achive this within specific
>> contexts, but also, because humans can already do this naturally.
>> Small scale groups
/...\ coersion,
>> they use
information - everyone involved pretty much knows what is
>> going on, and if someone is being
>> abusive they get blocked out. Certainly, this system is not
>> invunerable, but it *is* a system.
>> A reputation system
they refuse to serve it, or serve the wrong thing?
(this could be malicious or by accident)
What you do have is crypto, and
information processing powers many times greater
than when the property system was created. Would it be possible to
create a system that enforced cooperation using just
/...\ information?
I think this is possible, not just because there are computer systems
which achive this within specific
contexts, but also, because humans can already do this naturally.
Small scale groups do not use coersion,
they use
information - everyone involved pretty much knows what is
going on, and if someone
they refuse to serve it, or serve the wrong thing?
(this could be malicious or by accident)
What you do have is crypto, and
information processing powers many times greater
than when the property system was created. Would it be possible to
create a system that enforced cooperation using just
/...\ information?
I think this is possible, not just because there are computer systems
which achive this within specific
contexts, but also, because humans can already do this naturally.
Small scale groups do not use coersion,
they use
information - everyone involved pretty much knows what is
going on, and if someone
Francis Irving [LibreList] Re: [redecentralize] RDC 15 2015-10-17 01:17:28 controlled and edited by it's readers, that are
censorship proof, that remove bias from journalism and allows more
accurate and transparent dissemination of
information to citizens. After
all,
information and news are what allows us, as a society to make good
decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to
give people the
information and data to accurately asses our problems
and challenge the status quo.I am interested
in changing this and exploring the ideas behind this if anyone is
interested come and say hello. Asides
they refuse to serve it, or serve the wrong thing?
(this could be malicious or by accident)
What you do have is crypto, and
information processing powers many times greater
than when the property system was created. Would it be possible to
create a system that enforced cooperation using just
/...\ information?
I think this is possible, not just because there are computer systems
which achive this within specific
contexts, but also, because humans can already do this naturally.
Small scale groups do not use coersion,
they use
information - everyone involved pretty much knows what is
going on, and if someone
serve the wrong thing?
>> (this could be malicious or by accident)
>>
>> What you do have is crypto, and
information processing powers many times
>> greater
>> than when the property system was created. Would it be possible to
>> create
/...\ system that enforced cooperation using just
information?
>>
>> I think this is possible, not just because there are computer systems
>> which achive this within specific
>> contexts, but also, because humans can already do this naturally.
>> Small scale groups
/...\ coersion,
>> they use
information - everyone involved pretty much knows what is
>> going on, and if someone is being
>> abusive they get blocked out. Certainly, this system is not
>> invunerable, but it *is* a system.
>> A reputation system
this could be malicious or by accident)
>> >>
>> >> What you do have is crypto, and
information processing powers many
>> >> times
>> >> greater
>> >> than when the property system was created. Would
/...\ possible to
>> >> create a system that enforced cooperation using just
information?
>> >>
>> >> I think this is possible, not just because there are computer systems
>> >> which achive this within specific
>> >> contexts
/...\ because humans can already do this naturally.
>> >> Small scale groups do not use coersion,
>> >> they use
information - everyone involved pretty much knows what is
>> >> going on, and if someone is being
>> >> abusive they
more reliable peers.
(See above: this must be the users choice or it's too bad.)
> What you do have is crypto, and
information processing powers many times greater
> than when the property system was created. Would it be possible to
> create a system that enforced cooperation
/...\ using just
information?
>
> I think this is possible, not just because there are computer systems
> which achive this within specific
> contexts, but also, because humans can already do this naturally.
I agree that using human society as the model is the most important step
/...\ program everything they understand well enough to explain
formally. Why not these?
> Small scale groups do not use coersion,
> they use
information - everyone involved pretty much knows what is
> going on, and if someone is being
> abusive they get blocked out.
I agree with
holger krekel [LibreList] any meeting point for tonight? 2015-10-16 08:18:38 controlled and edited by it's readers, that are censorship proof, that remove bias from journalism and allows more accurate and transparent dissemination of
information to citizens. After all,
information and news are what allows us, as a society to make good decisions and build lasting systems that benefit
/...\ enough just to give people the ability to change things we also need to give people the
information and data to accurately asses our problems and challenge the status quo.I am interested in changing this and exploring the ideas behind this if anyone is interested come and say hello. Asides
already coming with
the assumption that you're right, and they should come to agreement with
your position if only they had the correct
information. It might not
feel like this, but it's the case. Many cultures around the world have
conflicting world with
/...\ more complex cases. But it often comes
at the expense of other ways to conceive life that do not assume an
informational world.
I do think there are homomorphisms in the world, but I do not believe in
an
informational world that can be reduced to ones
outcomes on my intray today is I was approached for some
enabling documentation that alternative network community providers
could provide to communities to better
inform them of the issues and
comparisons between going to telco based broadband v. their own network
service.
The more upstream issues around using applications such
/...\ based
services and the general levels of insecurity through third party
information sharing or theft (doxing)
Local Internet Society chapters are a good resource for this such as
mine ISOC UK England but as volunteer bodies they need community support
to build this type of
information resource.
Christian
Anish Mangal
then crawled your bank interface with an HTML-scraper. The issue with this system is, of course, data-containment: you give up your financial
information to Mint in order to power the app.
In the runtime-extension architecture I'm suggesting, the banking site (let's say Citibank) behaves like
/...\ load Mint.com's application into a Web Worker. Now contained on the client-side, Mint would be given readonly access to the financial
information, and read/write access to a section of the DOM for rendering its UI, and no other privileges. This solves the data-containment issue.
The User-Agent
canonical hash proofing some interesting property. The property
could be simply a key or better a certificate proofing additional
information together with the key.)
What's hard to decentralize would be human-meaningful names to those
identities.
Or did you address something else by "identity"? Sorry-- I've been writing
/...\ canonical hash proofing some interesting property. The property
could be simply a key or better a certificate proofing additional
information together with the key.)
What's hard to decentralize would be human-meaningful names to those
identities.
Or did you address something else by "identity"?
Thanks
query so they know where the IM should be sent.
In this scenario, do you think it's possible for me to get this
information without the server also getting it (by decrypting the IP/port pairs however I'd decrypt them), thereby eliminating the critical zero-knowledge aspect
/...\ such a system, which we'd only write encrypted data to? Â We could even have several of these servers, which perhaps exchange
information with one another (simple DB replication?), in which case we'd have a federated  zero-knowledge system hosted by many providers
canonical hash
proofing some interesting property. The property could be
simply a key or better a certificate proofing additional
information together with the key.)
What's hard to decentralize would be human-meaningful
names to those identities.
Or did you address something else by "identity"?
Sorry-- I've been writing
/...\ canonical hash proofing some
interesting property. The property could be simply a key
or better a certificate proofing additional
information
together with the key.)
What's hard to decentralize would be human-meaningful
names to those identities.
Or did you address something else by "identity"?
Thanks
Jörg F. Wittenberger [LibreList] Re: [redecentralize] FireChat in Economist 2014-06-03 08:29:42 same code
that's in public source control.
This BTW is only correct as far as it pertains to the secrecy of the
information handled by the software. Though even unmodified code
would often leave data accessible to administrators anyways.
To assess correctness of execution there is a proven
Eric Mill [LibreList] Re: [redecentralize] FireChat in Economist 2014-06-03 10:35:02 same code
that's in public source control.
This BTW is only correct as far as it pertains to the secrecy of the
information handled by the software. Though even unmodified code
would often leave data accessible to administrators anyways.
To assess correctness of execution there
Paul Frazee [LibreList] Re: [redecentralize] FireChat in Economist 2014-06-03 10:17:33 same code
that's in public source control.
This BTW is only correct as far as it pertains to the secrecy of the
information handled by the software. Though even unmodified code
would often leave data accessible to administrators anyways.
To assess correctness of execution there
Jörg F. Wittenberger [LibreList] Re: [redecentralize] FireChat in Economist 2014-06-04 10:32:38 same code that's in
public source control.
This BTW is only correct as far as it pertains
to the secrecy of the information handled by the
software. Though even unmodified code would
often leave data accessible to administrators
anyways.
To assess correctness of execution there is a
proven
like this on the meta level-- we need to start thinking about algorithms and their spaces of execution as social statements. In the information age, they are. The way software is structured and executed affects the form and function of the socioeconomic realm
need is the name because the key names are self-authenticating which means they can be used to bootstrap authentication of other information like the endpoint's current IP address, and this can all be done transparently by the snow daemon so it doesn't have to be reimplemented
absolutely nothing can't contribute to the running of the system. So
perhaps the first question to ask when designing a BIG is, what
information is it acceptable for the BIG to know?
Cheers,
Michael
On 02/08/14 00:07, Adam Ierymenko wrote:
> I just started a personal blog
ones that end up in the local node's routing table (that keeps
track of who is out there on the network).
* Nodes share information from their routing tables with each other to
discover who else is on the network and keep themselves up-to-date (it's
part
When it comes to contracts, one might find it a good idea to define a
slightly higher level hash function: extract (or attach) relevant
information to assert provenance: creator, witness, time etc. and hash
these together with the hash of the actual value.
Now if you take this hash
picture is too big.. ;)
All in all a very interesting umbrella project.
cheers, Benjamin.
--
Benjamin Heitmann, BSc, MSc
PhD Researcher
Unit for Information Mining and Retrieval (UIMR)
Digital Enterprise Research Institute (DERI)
NUI Galway, Ireland
publications and slides:
http://www.deri.ie/about/team/member/benjamin_heitmann/
http://www.slideshare.net/metaman/
https://www.researchgate.net/profile/Benjamin_Heitmann/
public
while being sure these peers are not defecting.
I think the problem is trying to compute trust algorithmically. In a completely decentralized network the information necessary to do that is not intrinsically available so you have to bootstrap trust in some other way.
Everybody trusting some root authority
sure these peers are not defecting.
>
> I think the problem is trying to compute trust algorithmically. In a completely decentralized network the information necessary to do that is not intrinsically available so you have to bootstrap trust in some other way.
>
> Everybody trusting some root authority
based on existing trust networks rather than trying to construct a new one from whole cloth. The question is how to gather the existing information in a way that provides a good user experience. You can imagine something like Facebook: You need to add a couple of friends manually
comes to contracts, one might find it a good idea to define
> a slightly higher level hash function: extract (or attach) relevant
> information to assert provenance: creator, witness, time etc. and
> hash these together with the hash of the actual value.
>
So the creator (via their
On Aug 14, 2014, at 1:30 AM, David Geib < trustiosity.zrm@gmail.com > wrote: It
contribute to the running of the system. So
> perhaps the first question to ask when designing a BIG is, what
> information is it acceptable for the BIG to know?
Good point about metadata privacy, but I think it’s ultimately not a factor here. Or rather
devolve power in general. > Human societies are networks too. I think this work has po litical and philosophical implications inasmuch as the same information theoretic principles that govern computer networks might also operate in human ones.
> If we can fix it here, maybe it can help us find
Ierymenko < adam.ierymenko@zerotier.com > wrote:
Human societies are networks too. I think this work has po
litical and philosophical implications inasmuch as the same information theoretic principles that govern computer networks might also operate in human ones. If we can fix it here, maybe it can help us find
Ierymenko < adam.ierymenko@zerotier.com >
wrote:
Human societies are networks too. I think this work
has po litical and philosophical implications inasmuch
as the same information theoretic principles that govern
computer networks might also operate in human ones.
If we can fix it here, maybe it can help us find
I don’t think there’s anything wrong with
only thing we do slightly different is the data set coordination.
PoW is just not good enough. It leaks information, is expensive and
slow. I don't want to wait a minute for the website to update. And I
want to run my copy locally on really small devices. That
canonical hash proofing some interesting property. The property
could be simply a key or better a certificate proofing additional
information together with the key.)
What's hard to decentralize would be human-meaningful names to those
identities.
Or did you address something else by "identity"?
Thanks
this almost reduce to the "hard AI problem?" Detecting which nodes are malicious might not even be computable. It's the lack of verifiable information. Unless you have some trust anchors to create a frame of reference you can never tell who is defecting vs. who is lying about others
Benjamin Heitmann, BSc, MSc
> > > PhD Researcher
> > > Unit for Information Mining and Retrieval (UIMR)
> > > Digital Enterprise Research Institute (DERI)
> > > NUI Galway, Ireland
> > >
> > > publications and slides:
> > > http://www.deri.ie/about/team/member/benjamin_heitmann/
very interesting umbrella project.
>
> cheers, Benjamin.
>
>
> --
> Benjamin Heitmann, BSc, MSc
> PhD Researcher
> Unit for Information Mining and Retrieval (UIMR)
> Digital Enterprise Research Institute (DERI)
> NUI Galway, Ireland
>
> publications and slides:
> http://www.deri.ie/about/team/member/benjamin_heitmann/
> http://www.slideshare.net/metaman/
very interesting umbrella project.
>
> cheers, Benjamin.
>
>
> --
> Benjamin Heitmann, BSc, MSc
> PhD Researcher
> Unit for Information Mining and Retrieval (UIMR)
> Digital Enterprise Research Institute (DERI)
> NUI Galway, Ireland
>
> publications and slides:
> http://www.deri.ie/about/team/member/benjamin_heitmann/
> http://www.slideshare.net/metaman/
Benjamin Heitmann, BSc, MSc
> > > PhD Researcher
> > > Unit for Information Mining and Retrieval (UIMR)
> > > Digital Enterprise Research Institute (DERI)
> > > NUI Galway, Ireland
> > >
> > > publications and slides:
> > > http://www.deri.ie/about/team/member/benjamin_heitmann/
Jörg F. Wittenberger [LibreList] Re: [redecentralize] Spring of User Experience 2014-03-03 16:07:34 might have a
bug there anyway.
You are however welcome to review the concept. If you find any flaw
please publish and inform us. If you don't find any, I hope you
might find the results useful for you.
You are also invited to hack around
Paul Frazee [LibreList] Re: [redecentralize] Introduction 2014-01-06 13:18:13 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Adam Ierymenko [LibreList] Re: [redecentralize] Introduction 2014-01-06 10:51:29 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Adam Ierymenko [LibreList] Re: [redecentralize] Introduction 2014-01-06 11:40:41 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Paul Frazee [LibreList] Re: [redecentralize] Introduction 2014-01-06 13:46:47 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Adam Ierymenko [LibreList] Re: [redecentralize] Introduction 2014-01-06 11:50:49 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Paul Frazee [LibreList] Re: [redecentralize] Introduction 2014-01-06 13:53:30 decentralized." There seems to be an exponential difficulty curve re: *completely* decentralizing a protocol and that in turn comes from some fundamental constraints in information theory such as the CAP theorem. My goal is for ZeroTier One to be reliable, zero-configuration, and very fast, and doing that without
Jörg F. Wittenberger [LibreList] Re: [redecentralize] Hosting services in the browser 2014-06-06 08:46:27 like this on the meta
level-- we need to start thinking about algorithms and
their spaces of execution as social statements. In the
information age, they are. The way software is structured
and executed affects the form and function of the
socioeconomic realm
Kiktron RAKO [LibreList] Re: [redecentralize] 2014-06-06 16:04:20 using the tools that we are provided. Sadly there are few of us that know how to use the internet. We need to inform and teach people how to reuse the internet. Â You may call it a new social movement. Please see my humble draft. I tried
might have a
bug there anyway.
You are however welcome to review the concept. If you find any flaw
please publish and inform us. If you don't find any, I hope you
might find the results useful for you.
You are also invited to hack
discussion. Certainly what the legal profession has done with and
Corporations have used patents for are abominations. I don't, however, feel
that information is free, even if it is built on top of - and it all is I
think we agree - the shoulders of our forebears. I submit, though
government-first. We the people are being lost in the battle between those two trying to control and manage all technology and information flow.
... Anything that you alone control, that has no other master, no company that can disable it, no clou
d API that it depends
like this on the meta level-- we need to start thinking about algorithms and their spaces of execution as social statements. In the information age, they are. The way software is structured and executed affects the form and function of the socioeconomic realm
Bastien Guerry [LibreList] FLOSS4P2P: Call for Participation 2015-02-18 10:28:26 building shared libre/ open
resources. Commons-based Peer to Peer Production (CBPP) is rapidly
growing: not just for software and encyclopedias, but also for
information (OpenStreetMap, Wikihow), hardware (FabLabs, Open Source
Ecology), accommodation (Couchsurfing) and currency (Bitcoin,
Altcoins).
In the last few years, it has become clear to many that
Pierre Ozoux [LibreList] IndieHosters, hosting for freedom 2014-12-21 20:49:42 network of hoster of free software as a service
where the user is free to migrate from one service provider to
another.
More information:
https://www.indiegogo.com/projects/indiehosters/x/9169969
Founded by Michiel de Jong and me
Cheers
Benjamin Heitmann [LibreList] GNU Internet Stack / youbroketheinternet.org 2013-12-29 18:08:24
Ximin Luo [LibreList] Real World Crypto 2014-01-08 10:20:53
P S [LibreList] First Person Technologies 2014-03-29 17:32:15 government-first. We the people are being lost in the battle between those two trying to control and manage all technology and information flow. ... Anything that you alone control, that has no other master, no company that can disable it, no cloud API that it depends on to work
Jeremy Malcolm [LibreList] Digital consumers breaking through the cloud 2014-03-25 10:53:12 Declaration of Human Rights, which guarantees us all freedom from arbitrary interference with our privacy and correspondence, and the right to receive and impart information and ideas through any media and regardless of frontiers. Whilst it may seem to trivialise human rights to attach them to the question
Tic Nticsebastian [LibreList] (no subject) 2014-05-28 00:08:52 using the tools that we are provided. Sadly there are few of us that know how to use the internet. We need to inform and teach people how to reuse the internet. Â You may call it a new social movement. Please see my humble draft. I tried
Goffi [LibreList] Hello + Salut à Toi / Libervia 2015-08-22 18:15:14 start to
think about Python 3 port).
Ok, that's enough for a first message, you can check the website for
more information: http://salut-a-toi.org or, if by any chance you are at
FrOSCon, come to see us.
Ah, last but not least, we have a strong emphasis on ethic
server - messages are synchronized directly
between the users' devices. If the Internet's down, Briar can sync via
Bluetooth or Wi-Fi, keeping the information flowing in a crisis. If
the Internet's up, Briar can sync via the Tor network. Either way it
protects users and their relationships from
Kiktron RAKO [LibreList] Re: [redecentralize] 2014-05-27 23:24:13 using the tools that we are provided. Sadly there are few of us that know how to use the internet. We need to inform and teach people how to reuse the internet. Â You may call it a new social movement. Please see my humble draft. I tried
Benjamin ANDRE [LibreList] Re: [redecentralize] 2014-05-28 00:20:46 using the tools that we are provided. Sadly there are few of us that know how to use the internet. We need to inform and teach people how to reuse the internet. Â You may call it a new social movement. Please see my humble draft. I tried