Autonomía digital y tecnológica

Código e ideas para una internet distribuida

Linkoteca. Archivo de navegación. Página 31


Nacida del trabajo de entidades, medios de comunicación y colectivos integrantes de la coalición Defender a quien Defiende, es también una herramienta de visibilización y análisis de las vulneraciones de los derechos humanos cometidas por cuerpos policiales y agentes de seguridad privada en el Estado español, especialmente en contextos de protesta social (derechos de reunión y manifestación prioritariamente).

…a mechanism that installs updates automatically so you don’t have to worry about it. Obviously, this is meant for personal servers operated by hobbyists where convenience is more important than availability. In a professional environment, you would test new packages first because seemingly innocent changes may break complex applications.

D’Ignazio says this issue is compounded by the fact that women and people of color are underrepresented in data science and technical fields in general, a trend that is worsening. She also highlights skewed quantity and quality of data that is collected about various groups of people. For instance, there are very detailed datasets on gross domestic product and prostate function, but very poor datasets on hate crimes and the composition breast milk.

Darme cuenta que lo que me regalan las grandes coorporaciones no es tanto como les gusta hacernos creer, bajo su eslogan de gratis. Sacan mucho mas de mis datos que yo de sus servicios.
Acomodar mis practicas a mi discurso. Porque la soberanía tecnologica como los feminsismos no se basan solo en teorias si no NUESTRAS PRACTICAS.
Dejar de acumular servicios, como una depredarora capitalista. Y usar solo los que cuido y pago.
Repasar lo aprendido y usar la red optimizando recursos y no a lo capitalista ( consumista, acumuladora) solo porque es gratis.

Amazon Go, the «human-free» grocery store from Amazon.com, watches your every move with hundreds of cameras and sensors. And ties everything to an account with your smart phone and credit card. This is absolutely terrifying on multiple levels. Let me walk you through why and the related services that make this abomination possible.

Significantly, it preserves subdirectories, dev files, hard links, and critical file attributes such as permissions, uid/gid ownership, modification times, extended attributes, acls, and resource forks. It can work in a bandwidth-efficient mode over a pipe, in a similar way as the popular rsync backup tool.

rdiff-backup backs up a single directory to another over a network using SSH, implying that the data transfer is encrypted thus secure. The target directory (on the remote system) ends up an exact copy of the source directory, however extra reverse diffs are stored in a special subdirectory in the target directory, making it possible to recover files lost some time ago.

Every user on a system may have their own crontab file. The location of the root and user crontab files are system dependant but they are generally below /var/spool/cron.

There is a system-wide /etc/crontab file, the /etc/cron.d directory may contain crontab fragments which are also read and actioned by cron. Some Linux distributions (eg, Red Hat) also have /etc/cron.{hourly,daily,weekly,monthly} which are directories, scripts inside which will be executed every hour/day/week/month, with root privilege.

The :global command is your friend – learn it well. It lets you run arbitrary :ex commands on every line that matches a regex. It abbreviates to :g.

To delete all lines that match «George Bush»:

:g/George Bush/ d

The command that follows can have its own address/range prefix, which will be relative to the matched line. So to delete the 5th line after George Bush:

:g/George Bush/ .+5 d

To delete the DEBUG log entries:

:g/DEBUG/ .,+10 d

Los pisos en plataformas de alojamiento vacacional aumentaron de 4.500 en 2013 a 22.000 en 2017.

El problema de la vivienda en la capital holandesa, cuyos alquileres son los más altos de todo el país, llevó a un Tribunal de distrito a dictaminar recientemente que una persona puede perder su casa en Amsterdam si su propietario la usa exclusivamente para alquiler vacacional y, por esa razón, no reside en ella.

All JavaScript is collected and delivered by lib/exe/js.php. This file will concatenate all found files, whitespace compress (if compress is enabled) and cache the result. It also instructs browsers to cache the file, so when you are developing new JavaScript, be sure to refresh your browser cache (hitting Shift-F5, Shift+CTRL+R or similar) whenever your script was updated.

DokuWiki will load JavaScript from the following places:

autogenerated JavaScript (language strings, config settings, toolbar)
lib/scripts/*.js
lib/plugins/*/script.js
lib/tpl//script.js
conf/userscript.js

Created Route from the hotspot map

Here are some things Strava may reveal

Whether you run, swim, ski or cycle.
If you tell it, what bicycles you have.
Who you go out on a run or ride with
When you are away from your house
Where you commute to, and when
Your fitness, and whether it is getting better or worse.
When you travel, what TZ, etc.

The fact that you can infer nation-state secrets is an interesting escalation. Currently it’s the heatmap which is getting the bad press, which is part of the dataset that Strava offer commercially to councils. FWIW, the selection bias on Strava data (male roadies or mountain bikers) means that its not that good. If someone bought our local data, they’d infer that muddy wood trails with trees and rocks are what the city needs. Which is true, but it doesn’t address the lack of any safe way to cross the city.

What is interesting about the heat map, and not picked up on yet, is that you can potentially deanonymize people from it.

social metaphors tend to communicate more about the values of society rather than the technology of the Internet itself

The electronic frontier metaphor conceptualizes the Internet as a vast unexplored territory, a source of new resources, and a place to forge new social and business connections.

City Island, an island in the heart of the city. It’s occupying the vacant site of a former public indoor swimming pool. A developer demolished the building to build a new shopping center. But financial crisis interrupted these developing plans and the plot became a leftover, surrounded by a construction fence right in the heart of the popular and pulsing district of La Latina, Madrid.

Here the collective exyzt installed it’s on 3 weeks extended contribution to the noche en blanco of Madrid. The city island, was a temporary but lively public space to enjoy the shade of the rainforest and its lagoon. After three weeks and a massive public interest, collective exyzt moved but left sufficient building material and a well prepared ground for a neighbourhood initiative, which supported by local architecture collectives started El Campo de Cebada.

¿Cuánto beneficio económico tenemos de no tener compuestos orgánicos volátiles en la vivienda? ¿y de no tener mala calidad del aire? ¿y de no tener ruido en el interior de las viviendas? ¿y por no tener gas radón? ¿y por no emitir CO2?

Cuando pensamos en comprarnos una casa no solo debemos hacerlo desde una mirada simple de cuánto nos cuesta la inversión, lo tenemos que empezar a pensar desde un valor más complejo, cuánto nos va a costar mantenerla y la salud que nos va a proporcionar.

según Walter Gropius las mujeres no estaban capacitadas física y genéticamente para determinadas artes ya que pensaban en dos dimensiones, frente a sus compañeros masculinos, que sí podían hacerlo en tres.

Lo que resultaba más apasionante de la Bauhaus era que no había ningún sistema de enseñanza aún establecido. Y sentías como si dependiese solo de ti. Debías encontrar de algún modo tu manera de trabajar. Esa libertad es, probablemente, algo esencial que todo estudiante debería experimentar

Fsociety Hacking Tools nos provee de varias herramientas destinadas para diferentes usos, entre los que encontramos:

Recopilación de información
Ataques de contraseñas
Pruebas inalámbricas
Herramientas de explotación
Sniffing y Spoofing
Piratería web
Piratería web privada
Explotación posterior

Martín Domínguez Esteban ha sido un arquitecto fantasma. Dos veces exiliado, su nombre fue borrado por el franquismo y el castrismo, y su obra adjudicada a otros autores.

Durante décadas, el hipódromo, proyectado en 1934, se adjudicó oficialmente al ingeniero Eduardo Torroja. Los otros coautores, Martín Domínguez y Carlos Arniches, fueron borrados de la memoria. El edificio Focsa aparece asignado al arquitecto Ernesto Gómez Sampera. Martín Domínguez es ignorado en las guías de arquitectura cubana, incluso en la que editó en 1998 la Junta de Andalucía con las autoridades de La Habana.