.documents .documentos . documenti
Cyberfeminism : Revolution
Tactical use of terms
PAR CORNELIA SOLLFRANK - 2002-12-16 12:22:44
Speaking about the political ‚left' and being ‚leftist' nowadays may sound a bit clumsy but still can be relevant if the issue is clearly defined. But speaking about ‚revolution', and being ‚revolutionary' in fact seems to completely lack any realism. ¶¶¶
How to become a cyberfeminist ?
PAR CORNELIA SOLLFRANK - 2002-12-09 11:58:10
As initiator of the Old Boys Network (www.obn.org) - the first cyberfeminist alliance - and author of a few well-known documents and artworks about cyberfeminism, I often get requests from enthusiastic cyberfem newbies asking (in effect) "how can I learn to be a cyberfeminist ?". Oddly enough there don't seem to be any other FAQs or web documents that address this vital question, so here's mine. ¶¶¶
TCPA&Palladium Frequently Asked Questions
PAR ROSS ANDERSON - 2002-12-09 10:33:50
TCPA stands for the Trusted Computing Platform Alliance, an initiative led by Intel. Their stated goal is `a new computing platform for the next century that will provide for improved trust in the PC platform.' Palladium is software that Microsoft says it plans to incorporate in future versions of Windows ; it will build on the TCPA hardware, and will add some extra features. ¶¶¶
Open letter to the Indymedia network
PAR INDYMEDIA THESSALONIKI - 2002-12-02 14:05:37
This naive point of view overlooks the crucial question : why do the commercial media want imc s material ? It is clear that this material has content opposite to the reason the institutional - commercial media have for existing. Functioning the way they do, imc aim to the abolition of companies, of multinational media and of course of the hierarchical structures of working conditions. ¶¶¶
Can you trust your computer ?
PAR RICHARD M. STALLMAN - 2002-10-25 10:50:32
The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. (Microsoft's version of this is called "palladium.") Proprietary programs will use this device to control which other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. ¶¶¶
"The war on freedom and democracy"
an analysis of the effects on civil liberties and democratic culture in the EU
PAR TONY BUNYAN - 2002-09-27 09:15:25
The "war on terrorism" has turned into an ongoing "war on freedom and democracy" which is now setting new norms - where accountability, scrutiny and human rights protections are luxuries to be curtailed or discarded in defence of "democracy". ¶¶¶
France : internet under cybersurveillance
PAR LSIJOLIE - 2002-09-26 07:53:52
The "Loi sur la Sécurité Quotidienne" (LSQ), that has been adopted in last november, places the internet under cybersurveillance, and criminalize the free use of crypto tools. ¶¶¶