Page 598 of 631

As recent events in Tunisia, Egypt, and Libya have illustrated (and Myanmar demonstrated several years prior), democratic activists around the globe need a secure and reliable platform to ensure their communications cannot be controlled or cut off by authoritarian regimes. To date, technologies meant to circumvent blocked communications have focused predominantly on developing services that run over preexisting communication infrastructures. Although these applications are important, they still require the use of a wireline or wireless network that is prone to monitoring or can be completely shut down by central authorities. Moreover, many of these technologies do not interface well with each other, limiting the ability of activists and the general public to adopt sophisticated circumvention technologies.

With support from New America Foundation’s Open Technology Initiative (OTI), Chambana.net, and Acorn Active Media the developers, technavists, and organizers here propose to build a new type of tool for democratic organizing: an open source “device-as-infrastructure” distributed communications platform that integrates users’ existing cell phones, WiFi-enabled computers, and other WiFi-capable personal devices to create a metro-scale peer-to-peer (mesh) communications network.

(via Limiting Freedom on the Internet – NYTimes.com)

He read their emails, watched them through webcams without their knowledge and most damaging was his discovery of nude photos they had taken of themselves. Mijangos then threatened to post the images online unless his victims were willing to provide more racy photos or videos to him or if they went to police, according to court documents. He also posed as some of the victims’ boyfriends to convince them to send him nude pictures.

Websites like Facebook that sit on the open Internet and offer a set of robust services don’t come together overnight. We hire the best and brightest, and have implemented numerous protocols, like our six-week intensive “boot-camp” and peer-reviewed code pushes, to ensure that only code that meets our rigorous standards is active on the site. Even so, sometimes software code contains bugs. Generally speaking, there are bugs in software because of software complexity, programming errors, changes in requirements, errors made in bug tracking, limited documentation or bugs in software development tools. To deal with this, we have entire teams dedicated to searching out and disabling bugs, and we also hire outside auditors to help test our code. Our all night “bug-a-thons” are also successful in locating and fixing issues.

« Older posts Newer posts »

© 2026 no-Flux

Theme by Anders NorenUp ↑