All facilities have independent supplies in all areas as well as a climate system independent of the outside world. The construction is resistant to any military or civilian threat. The access control is very restrictive. Various areas are only accessible to selected employees. The 24-hour operation is constantly monitored by a double-guided OperationCenter. All operating processes are subject to the dual control principle.
Multi-level protection measures in the area of network and IT reduce every conceivable risk to the absolute minimum. All sites have constant video and fire monitoring. Two facilities are connected by a dedicated fiber link. The SWISS FORT KNOX is operated by SIAG Secure Infostore AG, which is certified according to ISO27001. The concept represents a huge investment volume and is considered the safest data center in Europe.
“There was no revolution too be had on the internet. None at all. The idea that there ever was is false. A big fat lie.
Sure, we thought we saw revolutions start on here. We saw people come together to fight governments, stand up to bullies, bring attention to brutality, to show how corporations are stupid and greedy (we did quite a bit of that last one ourselves, if you remember, dear friends). We watched people fight for justice and against political correctness. We watched huge battles rage. And we thought they were exciting and important.
But we were wrong, we slowly realised. We realised those battles were just a spectacle, a distraction from what was really going on. Because those battles were taking place on a battlefield that didn’t matter. On a battlefield that had no way of making a difference. Because that’s a battlefield we don’t own, and never could. New battlefields built just to keep us occupied.
We used to think we could own it, that we were fighting to build communities for ourselves. That it was ours for the taking. To stake a claim for a place we could control and belong, a fight to make ‘safe spaces’ for ourselves. It was a noble thing to think, that we were fighting for our own spaces, but we were kidding ourselves. We never owned these spaces, we never could. They were never ours to own, never ours to control. Instead we watched our battles turn in to spectator sports, our revolutions turn in to infighting. We watched our new communities dissolve into civil wars. We watched our political activists and community leaders become celebrity brands, our tech-utopian visionaries bow to capital and shareholders.
Without knowing - although somehow always expecting it - we let ourselves become nothing more than the content between adverts. Our battles, our beliefs, our loves - nothing more than the filler before the next ad break. We fought battles that we didn’t need to fight - battles that ripped our solidarity apart and distracted us from the we causes we once believed in - just to create clicks and blinks and eyeballs for the advertising networks. We were nothing more than squatters in a space we wanted to believe we owned, paying our rent by giving ourselves away in the name of capital. Our revolution was a sideshow.
Well, not anymore friends. This has to stop. And it will.”
Yesterday, the European Parliament approved amendments to the controversial Copyright Directive, a piece of legislation intended to update copyright for the internet age. Few pieces of legislation have polarized Europe this much in recent years. Critics said the vote heralded the death of the internet, while supporters congratulated themselves for saving the livelihoods of starving artists and giving US tech giants a poke in the eye.
“I always blamed Wired magazine and the investment ethos for changing the internet from an anything-can-happen, new human-potential movement that was represented so well by MONDO 2000, into the same old expansion of capital through IPOs and digital companies. I hate to even term it like this, but what went wrong? Why didn’t we get the whole everything changing at once for the human better that we were all imagining up in the Berkeley hills in the MONDO 2000 living room?”
The first camp contains those organizations which are primarily concerned with mitigating harmful consequences of modern technologies. The second camp contains organizations that exist to try to solve problems and promote welfare through methods that use digital technologies. I’ll call these two camps the ‘mitigators’ and the ‘promoters.’ There are a lot of good organizations and familiar names in both camps. The most famous in the mitigators would be the Electronic Frontier Foundation, but there’s also the Chaos Computer Club, the Open Rights Group, and the red-hot new research institute Data & Society. In the promoters camp the biggest name would undoubtedly be the Wikimedia Foundation, followed by Mozilla, and then a thousand other organizations
Vanderbilt’s premise is: “We are strangers to our tastes.” He doesn’t mean that we don’t really like what we say we like. He means that we don’t know why. Our intuition that tastes are intuitive, that they are just “our tastes,” and spring from our own personal genome, has been disproved repeatedly by psychologists and market researchers. But where tastes do come from is extremely difficult to pin down. Taste is not congenital: we don’t inherit it. And it’s not consistent. We come to like things we thought we hated (or actually did hate), and we are very poor predictors of what we are likely to like in the future.
A majority of value on the Internet now passes through the twin orifices of either Apple or Google, with the muscular sphincter of Facebook pushing value through the chain
A majority of value on the Internet now passes through the twin orifices of either Apple or Google, with the muscular sphincter of Facebook pushing value through the chain
Many on the listserv are framing Angola’s Wikipedia pirates as bad actors who need to be dealt with in some way so that more responsible editors aren’t punished for their actions. This line of thinking inherently assumes that what Angola’s pirates are doing is bad for Wikipedia and that they must be assimilated to the already regulated norms of Wikipedia’s community. If the developing world wants to use our internet, they must play by our rules, the thinking goes. But people in developing countries have always had to be more creative than those for whom access to information has always been a given. A 20-year-old developer in Paraguay found a vulnerability in Facebook Messenger that allowed people to use Free Basics to tunnel through to the “real” internet. Legal questions aside (Angola has more lax copyright laws than much of the world), Angola’s pirates are furthering Wikipedia’s mission of spreading information in a real and substantial way.
In the modern era of global NSA surveillance, China’s Great Firewall, and FBI agents trawling the dark Web, it’s easy to write off Barlow’s declaration as early dotcom-era hubris. But on his document’s 20th anniversary, Barlow himself wants to be clear: He stands by his words just as much today as he did when he clicked “send” in 1996. “The main thing I was declaring was that cyberspace is naturally immune to sovereignty and always would be,” Barlow, now 68, said in an interview over the weekend with WIRED. “I believed that was true then, and I believe it’s true now.”
“We all had a lot to say about the idea of a global conversation, but it turned out that most of us were at the back, muttering to ourselves, or, on occasion, finding ourselves talking to a chair.”
Cameron’s World is a web-collage of text and images excavated from the buried neighbourhoods of archived GeoCities pages (1994–2009). In an age where we interact primarily with branded and marketed web content, Cameron’s World is a tribute to the lost days of unrefined self-expression on the Internet. This project recalls the visual aesthetics from an era when it was expected that personal spaces would always be under construction.
Children’s society exists on the internet if at all, with raids in video games and chat rooms replacing geographically colocated monster hunts. (This is increasingly the case with adult society as well, which also lacks architectural and geographic support.) It should be noted that the internet is not the cause of these problems. Rather, the internet is the precarious reservation onto which culture has been driven, bleak and uncanny, inhuman in scale. And even the internet is increasingly monitored and reshaped by the same malignant tiling system that drove culture here in the first place. What will happen to culture when even this frontier is closed?
We were sold magic as the affordance of technology, from the term “automagic” on down, and we were sold this magic as the provision of personal agency – fifteen years ago I couldn’t move on the web for people talking about the internet as channel for emergent democracy, five years ago everyone couldn’t shut up about smartphones as the new computing paradigm that put the world in our hands. And now we’re at the end of the current cycle and the five dark towers of big digital technology are reduced to bullshit squabbles. I mean, sure, large ones, rolling across the world and throwing their shadows over us all. But the sleight of hand is all over. There’s a bit at the end of the tv series THE THICK OF IT, where spin doctor Malcolm Tucker, frequently self-described as “a practitioner of the dark arts,” says, in his final extremity, “Look at me. I’m not pulling anything out of my magic hat. The rabbits have fallen to pieces. Their fucking heads are coming off and frightening the kids.”
There are no shortage of stories about couples carrying on “relationships” exclusively via Second Life, a sort of fictional, virtual world. The game critic Kate Gray recently published an ode to “Dorian,” a character she fell in love with in a video game. (“Isn’t it odd how it’s taken so long to reach this stage in games – the stage at which human conversations and relationships feel real?” she writes.) Researchers have even suggested that spambots induce some kind of emotional response in us, perhaps because they flatter our vanities; conversely, one anthropologist has argued that our relationships are increasingly so mediated by tech that they’ve become indistinguishable from Tamagotchis. […] All things considered, it’s hardly a jump to suggest someone might develop feelings for a “believable” virtual human who caters to her every whim. That’s basically the plot of “Her,” isn’t it? (For the record, Homann says, his start-up began before that movie did.)
This digital alternative to street-based drug retailing rewards dealers for using innovative and non-violent methods of competition, and for providing quality goods and services. Drug consumers, meanwhile, are offered an unprecedented range of choice and information about products available. They are also treated with a civility that reflects their purchasing power.
every device is a target for colonization, as each successfully exploited target is theoretically useful as a means to infiltrating another possible target. Port scanning and downloading banners to identify which software is operating on the target system is merely the first step of the attack (Figure 8). Top secret documents from the NSA seen by Heise demonstrate that the involved spy agencies follow the common methodology of online organized crime (Figure 9): reconnaissance (Figure 10) is followed by infection (Figure 11), command and control (Figure 12), and exfiltration (Figure 13). The NSA presentation makes it clear that the agency embraces the mindset of criminals. In the slides, they discuss techniques and then show screenshots of their own tools to support this criminal process (Figure 14, 15 and 16).
For now, however, it is only the village of Löwenstedt that has succeeded in mobilising the solidarity of its inhabitants to build a high-speed Internet network. Other villages have been slower and found it more difficult to follow Löwenstedt’s lead. “At least 68 percent of households in a village have to promise to subscribe to the fibre-optic network before we start work,” said BBNG chief Ute Gabriel-Boucsein.
Looking through the works, you see artists sifting through enormous accumulations of images and texts. They do it in various ways—hunting, grabbing, compiling, publishing. They enact a kind of performance with the data, between the web and the printed page, negotiating vast piles of existing material. Almost all of the artists here use the search engine, in one form or another, for navigation and discovery.
Time travel has captured the public imagination for much of the past century, but little has been done to actually search for time travelers. Here, three implementations of Internet searches for time travelers are described, all seeking a prescient mention of information not previously available. The first search covered prescient content placed on the Internet, highlighted by a comprehensive search for specific terms in tweets on Twitter. The second search examined prescient inquiries submitted to a search engine, highlighted by a comprehensive search for specific search terms submitted to a popular astronomy web site. The third search involved a request for a direct Internet communication, either by email or tweet, pre-dating to the time of the inquiry. Given practical verifiability concerns, only time travelers from the future were investigated. No time travelers were discovered. Although these negative results do not disprove time travel, given the great reach of the Internet, this search is perhaps the most comprehensive to date.
Relating a Google search return to an equivalent expenditure of fossil fuels, or the fluctuation of pixels across a screen with the exploited labour of rural migrant workers in Shenzen, or topsoil loss in Inner Mongolia, is as remote and unattainable for the majority of users as is an understanding of the technical functionality of the devices themselves
RSS represents the antithesis of this new world: it’s completely open, decentralized, and owned by nobody, just like the web itself. It allows anyone, large or small, to build something new and disrupt anyone else they’d like because nobody has to fly six salespeople out first to work out a partnership with anyone else’s salespeople. That world formed the web’s foundations — without that world to build on, Google, Facebook, and Twitter couldn’t exist. But they’ve now grown so large that everything from that web-native world is now a threat to them, and they want to shut it down. “Sunset” it. “Clean it up.” “Retire” it. Get it out of the way so they can get even bigger and build even bigger proprietary barriers to anyone trying to claim their territory.