Autonomía digital y tecnológica

Código e ideas para una internet distribuida

Linkoteca. Archivo de navegación. Página 9


I’m not at all ‘anti-crypto.’ I’m a big fan of cryptography. I am, however, anti- tax evasion, money laundering, ponzi schemes, multi-level marketing, and needless waste of energy.

I’m also anti- silver bulletism, anti-technosolutionism, and anti-convincing everyday people to invest their scarce capital in unregulated sectors where it’s very easy for them to lose everything with no recourse.

Additionally, I’m anti- focusing tons of energy on convincing everyday people that salvation lies in speculation.

Finally: WHAT IF the same amount of time and energy put into convincing everyday people to invest in cryptocurrencies, NFTs, and DAOs went into convincing everyone to move their money to credit unions, invest in local businesses & land trusts, & directly support artists?

Enable HTTP/2 module
Apache’s HTTP/2 support comes from the mod_http2 module. Enable it from:

a2enmod http2
apachectl restart

If above commands do not work in your system (which is likely the case in CentOS/RHEL), use LoadModule directive in httpd configuration directory to enable http2 module.
Add HTTP/2 Support
We highly recommend you enable HTTPS support for your web site first. Most web browser simply do not support HTTP/2 over plain text. Besides, there are no excuses to not use HTTPS anymore. HTTP/2 can be enabled site-by-site basis. Locate your web site’s Apache virtual host configuration file, and add the following right after the opening tag:

Protocols h2 http/1.1

Bueno cansado de que Correos me cobrase el trámite aduanero y después de leer en algunos foros que era posible el autodespacho pero no veía del todo claro cómo hacerlo me decidí a hacerlo por mi mismo.

Este documento pretende ser una guía donde les voy a explicar los pasos exactos, documentación a entregar y lugares a los que dirigirse.

Este trámite es válido para todos aquellos envíos que recibamos de la U.E., incluyendo la España peninsular. Además podrán calcular cuanto van a tener que pagar y así ver si les sale rentable hacerlo o no.

Reconstructing the original signal

The sound wave is converted into data through a series of snapshot measurements, or samples. A sample is taken at a particular time in the audio wave, recording amplitude. This information is then converted into digestible, binary data.

The system takes these measurements at a speed called the audio sample rate, measured in kilohertz. The audio sample rate determines the range of frequencies captured in digital audio.

L’écoute, dans un cadre d’action collective est donc, dans l’idée de construction relationnelle, au cœur du processus.

Marcher ensemble.

Écouter ensemble.

Faire ensemble…

Plutôt agir que parler, même si la parole est source d’enseignement, d’échanges et de transmission, d’invention même, l’action de terrain reste la meilleure façon de faire vivre et évoluer des idées, des projets. Et donc ici, de construire des paysages sonores dignes de ce nom. Écoutables.

L’expérimentation, ou l’expérienciation, le fait d’acquérir des connaissances par l’expérience personnelle, sont donc moteurs dans ces constructions audio-paysagères.

cables submarinos canarias 2015

Los cables submarinos en Canarias que conectan las islas entre sí son los siguientes. Entre paréntesis se indica el año de puesta en servicio:

  • Cables interinsulares de Telefónica: salvo en el caso de El Hierro, su configuración en anillos evita que una isla quede desconectada por la rotura de un cable.
    • Transcan 2 – S1: Gran Canaria – Fuerteventura (1990)
    • Transcan 2 – S2: Fuerteventura – Lanzarote (1990)
    • Pencan 5 – S2 (TFE-GC): Tenerife – Gran Canaria (1992)
    • Tegopa – S1: Tenerife – La Gomera (1995)
    • Tegopa – S2: La Gomera – La Palma (1995)
    • Candalta 1: Tenerife – Gran Canaria (1999)
    • Transcan 3: Gran Canaria – Lanzarote (1999)
    • Telapa: Tenerife – La Palma (2004)
    • Gomera-Hierro: La Gomera – El Hierro (2007)
    • Candalta 2: Tenerife – Gran Canaria (2010)
  • Cable Submarino de Canarias: dispone de dos cables submarinos entre Tenerife y Gran Canaria (2002).
  • Canalink: dispone de dos cables submarinos entre Tenerife y Gran Canaria y uno entre Tenerife y La Palma (2011).

 

Además, las islas están conectadas con el exterior por los siguientes sistemas:

  • Telefónica dispone de tres cables submarinos, dos conectan Cádiz con Tenerife (PENCAN 6 y PENCAN 8) y el tercero (PENCAN 7) con Gran Canaria. Los dos últimos fueron ampliados en 2015 con tecnología 100G.
  • Canalink dispone de un sistema de cable submarino que conecta Tenerife con Cádiz; este cable dispone de un ramal que conecta con Marruecos.
  • La isla de Tenerife está conectada al sistema ACE (Africa Coast to Europe), consorcio con participación de Orange.
  • La isla de Gran Canaria está conectada al sistema WACS (West African Cable System), consorcio con participación de Vodafone.

It’s probably good to have some clarity on why centralized platforms emerged to begin with, and in my mind the explanation is pretty simple:

  1. People don’t want to run their own servers, and never will.
  2. A protocol moves much more slowly than a platform. This isn’t a funding issue. If something is truly decentralized, it becomes very difficult to change, and often remains stuck in time. That is a problem for technology, because the rest of the ecosystem is moving very quickly, and if you don’t keep up you will fail.

…there is nothing particularly “distributed” about the apps themselves: they’re just normal react websites. The “distributedness” refers to where the state and the logic/permissions for updating the state lives: on the blockchain instead of in a “centralized” database.

One thing that has always felt strange to me about the cryptocurrency world is the lack of attention to the client/server interface. When people talk about blockchains, they talk about distributed trust, leaderless consensus, and all the mechanics of how that works, but often gloss over the reality that clients ultimately can’t participate in those mechanics.

With the shift to mobile, we now live firmly in a world of clients and servers – with the former completely unable to act as the latter – and those questions seem more important to me than ever.

This was surprising to me. So much work, energy, and time has gone into creating a trustless distributed consensus mechanism, but virtually all clients that wish to access it do so by simply trusting the outputs from these two companies without any further verification. It also doesn’t seem like the best privacy situation. Imagine if every time you interacted with a website in Chrome, your request first went to Google before being routed to the destination and back. That’s the situation with ethereum today. All write traffic is obviously already public on the blockchain, but these companies also have visibility into almost all read requests from almost all users in almost all dApps.

Instead of storing the data on-chain, NFTs instead contain a URL that points to the data. What surprised me about the standards was that there’s no hash commitment for the data located at the URL. Looking at many of the NFTs on popular marketplaces being sold for tens, hundreds, or millions of dollars, that URL often just points to some VPS running Apache somewhere. Anyone with access to that machine, anyone who buys that domain name in the future, or anyone who compromises that machine can change the image, title, description, etc for the NFT to whatever they’d like at any time (regardless of whether or not they “own” the token). There’s nothing in the NFT spec that tells you what the image “should” be, or even allows you to confirm whether something is the “correct” image.

I think this is very similar to the situation with email. I can run my own mail server, but it doesn’t functionally matter for privacy, censorship resistance, or control – because GMail is going to be on the other end of every email that I send or receive anyway. Once a distributed ecosystem centralizes around a platform for convenience, it becomes the worst of both worlds: centralized control, but still distributed enough to become mired in time. I can build my own NFT marketplace, but it doesn’t offer any additional control if OpenSea mediates the view of all NFTs in the wallets people use (and every other app in the ecosystem).

If we do want to change our relationship to technology, I think we’d have to do it intentionally. My basic thoughts are roughly:

  1. We should accept the premise that people will not run their own servers by designing systems that can distribute trust without having to distribute infrastructure.
  2. We should try to reduce the burden of building software.
Platform's relationship to users

Centralized platforms follow a predictable life cycle. At first, they do everything they can to recruit users and third-party complements like creators, developers, and businesses.

They do this to strengthen their network effect. As platforms move up the adoption S-curve, their power over users and third parties steadily grows.

 

When they hit the top of the S-curve, their relationships with network participants change from positive-sum to zero-sum. To continue growing requires extracting data from users and competing with (former) partners.

Famous examples of this are Microsoft vs. Netscape, Google vs. Yelp, Facebook vs. Zynga,  Twitter vs. its third-party clients, and Epic vs. Apple.

Cuando la batalla política se lleva a cabo en el territorio del conocimiento, no tiene nada de extraño que aparezca, además de las típicas disputas entre los expertos, un estrafalario rechazo al conocimiento en general, que adopta hoy formas muy diversas de escepticismo y credulidad, como la desinformación, el negacionismo o las teorías conspiratorias.

Hay un populismo antitecnológico, que sospecha de la ciencia y el desafecto frente a la representación, pero hay también un populismo epistémico que consiste en procesar una fe ciega en que la política puede ser disuelta en los datos, las cifras, las evidencias científicas y el saber experto.

…deseo de despojar a la política de lo político, es decir, de la gestión de intereses en conflicto, la toma de decisiones con un saber insuficiente y el esfuerzo por lograr compromisos sostenibles.

Not all audio files are created equal. Sometimes, they’re too quiet, too loud, or just off. When you find yourself with a problematic audio file, you aren’t stuck just dealing with it. FFmpeg, a powerful open-source audio utility can help. It can adjust the volume of your files and normalize them to get rid of unpleasant fluctuations in volume. What’s even better, it’s fully scriptable and even baked into Python scripts that streamline the whole thing.

Spacebuster. Raaumlabor

The Spacebuster is build on the basis of a step van and a big inflatable space coming out of the back of the van fitting up to 80 persons in it. People enter the bubble through the passenger’s door of the van walking through to the back down a ramp right into the inflated space. The bubble is supported by air pressure generated by a fan underneath the ramp. The membrane of the bubble is translucent so people on the inside can see schematically what´s going on outside and vice versa. So the membrane acts as a semi permeable border between the public and the more private.

Dedico mi vida a denunciar que Internet (lo digital), no es un espacio diferente a la realidad; es parte de la realidad. Dedico la vida a explicar que si permitimos que se cree un estado de excepción en Internet, el paso a que se traslade al resto de los ámbitos de la vida es solo uno.

«Discurso de odio» es una expresión perversa: trabajar contra el «discurso del odio» (donde «odio» es solo un atributo subordinado a «discurso»), es trabajar en primer lugar contra «el discurso» y, por tanto, contribuir a la narrativa que recorta la libertad de expresión y no a la que erradica las discriminaciones.

Con Xnet llevamos años defendiendo el derecho al anonimato. Pero así como el derecho a la libertad de expresión no es la obligación de nadie a escuchar, el derecho al anonimato es el derecho a que puedas tú mismo garantizar tu propio anonimato sin ser criminalizado por hacerlo. Nada más. Obviamente no significa que se deba perseguir quien dice que el mismo gato está en la foto de tu perfil anónimo y del que no  lo es.

Por otra parte, si acosas o insultas en la red, el juez manda a que se averigüe quien eres; se averigua y persigue el delito. Fin del melodrama.

“It will have zero income tax forever, zero capital gains tax. Invest here and make all the money you want. We’re fine,” Bukele said.

This announcement closed “Bitcoin Week,” a large Bitcoin conference that drew hundreds of foreign investors. The tax-free, “techy,” and ecological Bitcoin City — the first of its kind — will be funded by Bitcoin bonds and powered by geothermal energy from a nearby volcano. Crypto mining, the process of creating new bitcoin through intensive cryptographic puzzles, is a notoriously energy-intensive process that has been criticized for increasing global emission rates in vulnerable areas.

Pros of No-Code Platforms

  • An immediate solution to problems you have in terms of website development because you will be able to create software solutions without having to hire expert programmers.
  • Regardless of your degree, career, or position in a business, you can now build a website by yourself that will add value to your craft or business.
  • Building a website is faster and cheaper. Hiring developers will cost you a lot of money and with no-code, you will be able to cut the cost.
  • It will save you months and months of working since you can now build a website straight away without the need to code.
  • You will have creative freedom on what you want to add to your website since the process is more visual.
  • Obviously, with no-code, web developers will have less on their plates and can focus more on streamlining processes or creating new innovations.

Cons of No-Code Platforms

  • Security breaches with no-code are unavoidable, and once the platform you are using is affected by this factor, your website will be compromised as well.
  • You don’t have the full authority with using no-code networks, so basically you are taking a risk in using such platforms.
  • You will not be able to customize software using the no-code platform.
  • You have to adapt your business process based on the capability feature of the no-code network or platform you are using.

La lista TOP500 se publica dos veces al año y registra los supercomputadores más potentes del año. Solo ha habido un cambio en los diez primeros puestos, y es uno curioso y con un poco de sorna.

Se trata de la llegada  la lista del supercomputador Voyager-EUS2, que ha desarrollado Microsoft Azure y que cuenta con una potencia de 30 petaflops por segundo. Todo estupendo, pero lo realmente curioso es que el supercomputador de Microsoft no funciona con Windows, sino con Linux.

Cette annonce s’adresse aux passionné.e.s d’informatique
qui cherchent une co-location à Toulouse centre ville

Les profils recherchés sont des étudiant.e.s en informatique,
ou tout autre personne passionnée par les ordinateurs et
les réseaux (pas de gamers pas contre)

Captura de pantalla de The true size of Africa

The whole point being made was that we all have been taught geography mainly based on the Mercator projection – as the background in daily television news, the cover of my school atlas, in general the ubiquitous depiction of the planet.

But the basic fact is that a three-dimensional sphere being shown as a single two-dimensional flat image will always be subject to a conversion loss: something has to give…

The reason why Mercator was such an important advance is simple: on it one can draw straight lines to account for travel routes – in the days of the gigantic merchant fleets and naval battles an immensely valuable attribute.

Captura de pantall de «Corporate Memphis»: ¿Por qué todas las webs parecen iguales?

…decenas de revistas, cuentos, webs y aplicaciones comerciales con una estética similar a la de la ilustración que decora este artículo. A ese estilo se le conoce como «Alegria» o «Corporate Memphis». Es un producto de la precarización y la devaluación del trabajo y tiene decenas de variantes y versiones, todas igualmente exánimes y repetitivas.

El resultado es un cambio cualitativo. Cualquiera puede hacer una ilustración dentro de los códigos visuales del «Corporate Memphis». Ya no es solo que el ilustrador -uno de los últimos artesanos- se haya proletarizado, ni siquiera que una vez proletarizado haya sido expulsado de la oficina y se haya precarizado al extremo vendiendo horas de trabajo en una plataforma. Ahora el ilustrador como tal es ya innecesario.

La automatización combinatoria de un código estándar de imágenes pre-diseñadas permitirá que ilustrar se convierta en una tarea más del desarrollador web. Una entre otras muchas que ya se han automatizado o están en camino de hacerlo. Porque el desarrollador es el primero que ha sufrido la estandarización y procedimentación automatizada de su trabajo. Ahora, Inteligencia Artificial mediante, está siendo alienado incluso de la algoritmia.

The Trojan Room coffee pot was a coffee machine located in the Computer Laboratory of the University of Cambridge, England. Put on the Internet in 1991 by Quentin Stafford-Fraser and Paul Jardetzky, it was migrated to the web in 1993 becoming the world’s first webcam.

To save people working in the building the disappointment of finding the coffee machine empty after making the trip to the room, a camera was set up providing a live picture of the coffee pot to all desktop computers on the office network. After the camera was connected to the Internet a few years later, the coffee pot gained international notoriety as a feature of the fledgling World Wide Web, until it was retired in 2001.

The tricky bit, as a new study called An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples, is working out which code is OK and which isn’t.

After analysing real code from Stack Overflow, the researchers found a small but still significant number of examples where this happened over a 10-year period to 2018.

The team reviewed 72,483 C++ code snippets for weaknesses defined by the industry Common Weakness Enumeration (CWE) guidelines, finding 69 representing 29 different types of security flaw, most often CWE-150 (‘Improper neutralization of space, meta, or control sequence’).

I’d be fascinated to see a study that compared cutting and pasting code – which carries the small risk of copying and pasting security errors – with coders who don’t copy and paste code and solve unfamiliar problems by always writing their own solution.

Solving the problem yourself carries three possible penalties: #1 it will take longer; #2 there is a good chance that the code (which solves a problem the developer is not well versed in solving) will make it in to the world without ever being reviewed by another person; and #3 if it does go unreviewed, there is a good chance the developer will never learn of their mistake and could well end up repeating it, even cutting and pasting it, into other projects.

What can we do when faced with a world where people lie as a way of shaping the world to their own ends? First, we have to get smart. Disinformation – the conscious, intentional spreading of false information – is not an accident. It’s a strategy. When we encounter information that is surprising, unsettling, or even a little too comfortable, we need to ask ourselves a set of questions: How does the author know this is true? What is s/he trying to persuade me of? Who benefits if I believe this to be true? How can I check this information against other sources I trust?

…disinformation wants to keep us powerless, fighting to assert that’s true rather than challenging those who are in power.