Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
hacker_culture [2024/01/10 16:01]
ntnsndr [Terms and conditions]
hacker_culture [2024/04/11 18:59]
ntnsndr [Objective 3: Master] typo fix
Line 13: Line 13:
 ## Instructor ## Instructor
  
-Nathan Schneider ("​Professor Schneider"​)  ​+Nathan Schneider ("​Nathan"​ or "​Professor Schneider"​)  ​
 <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​ <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​
 Armory 1B24    Armory 1B24   
Line 113: Line 113:
 *25 points* *25 points*
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
 If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.
Line 134: Line 134:
  
 * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement. * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement.
-Be intentional about our use of screen devices, which [[:​screen_devices|risk]] interfering with our learning experience and that of students around us.+We will be intentional about any use of screen devices, which [[:​screen_devices|risk]] interfering with our learning experience and that of students around us.
 * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission.
 * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.* * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.*
Line 222: Line 222:
   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)
  
-**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/Journal/archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspxabout the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.consumerreports.org/issue/data-privacyon [potential threats](https://​coveryourtracks.eff.org/) and how they might be mitigated. ​What do online services you use [make you agree to](https://​privacyspy.org/​)? ​Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.
  
 ### 11. Disintermediation ### 11. Disintermediation
Line 234: Line 234:
  
   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)
-  * "[Shenzhen: The Silicon Valley ​of Hardware](https://​www.youtube.com/watch?​v=SGJ5cZnoodY)," ​_Wired_ ​(2016)+  * Fernanda R. Rosa, "[From Community Networks to Shared Networks: The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://​www-tandfonline-com.colorado.idm.oclc.org/doi/​full/​10.1080/​1369118X.2022.2085614)," ​_Information,​ Communication & Society_ 26, no. 11 (2023)
  
 **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help. **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help.