Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2024/01/10 16:01]
ntnsndr [Terms and conditions]
hacker_culture [2024/04/23 18:40] (current)
ntnsndr [13. Singularity]
Line 13: Line 13:
 ## Instructor ## Instructor
  
-Nathan Schneider ("​Professor Schneider"​)  ​+Nathan Schneider ("​Nathan"​ or "​Professor Schneider"​)  ​
 <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​ <​nathan.schneider@colorado.edu>​ ([[:​email_etiquette|tips]]) ​     ​
 Armory 1B24    Armory 1B24   
Line 113: Line 113:
 *25 points* *25 points*
  
-Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.+Become a goon. The final project for this course is to write an illustrated,​ 1,​800-to-2,​000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you.
  
 If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it. If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance,​ and a recommendation for what your organization should do about it.
Line 134: Line 134:
  
 * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement. * This syllabus is a living document and may be revised during the course. The current, binding form will be maintained on Canvas, and any changes will be explained in a Canvas announcement.
-Be intentional about our use of screen devices, which [[:​screen_devices|risk]] interfering with our learning experience and that of students around us.+We will be intentional about any use of screen devices, which [[:​screen_devices|risk]] interfering with our learning experience and that of students around us.
 * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission. * We respect one another'​s privacy and freedom to explore. Content shared in the course, in class or online, will not be shared beyond it without permission.
 * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.* * We adhere to basic [[:​university policies]] regarding accessibility and [[:academic honesty]]; we take responsibility for understanding relevant policies and procedures. *Verbum sat sapienti est.*
Line 222: Line 222:
   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)   * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://​archive.thinkprogress.org/​meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/​),"​ _ThinkProgress_ (April 29, 2014)
  
-**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.isaca.org/Journal/archives/​2010/​Volume-1/​Pages/​Performing-a-Security-Risk-Assessment1.aspxabout the [nature](http://​webkay.robinlinus.com/​) of potential ​[threats](https://​panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.+**Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://​www.consumerreports.org/issue/data-privacyon [potential threats](https://​coveryourtracks.eff.org/) and how they might be mitigated. ​What do online services you use [make you agree to](https://​privacyspy.org/​)? ​Check out software listed at [AlternativeTo](https://​alternativeto.net/​platform/​all/?​license=opensource),​ [PRISM Break](http://​prism-break.org/​),​ [PrivacyTools](https://​www.privacytools.io/​),​ or [Surveillance Self-Defense](https://​ssd.eff.org/​) if the dangers are digital. Go further with Janet Vertesi'​s [Opt Out Project](https://​www.optoutproject.net/​). Try out a few patches, and determine whether they'​re worth the trouble.
  
 ### 11. Disintermediation ### 11. Disintermediation
Line 234: Line 234:
  
   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)   * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://​colorado.kanopy.com/​node/​12574154)_ (2021)
-  * "[Shenzhen: The Silicon Valley ​of Hardware](https://​www.youtube.com/watch?​v=SGJ5cZnoodY)," ​_Wired_ ​(2016)+  * Fernanda R. Rosa, "[From Community Networks to Shared Networks: The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://​www-tandfonline-com.colorado.idm.oclc.org/doi/​full/​10.1080/​1369118X.2022.2085614)," ​_Information,​ Communication & Society_ 26, no. 11 (2023)
  
 **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help. **Exploit: Build a world.** Devise an imaginary world that doesn'​t exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "​real"​ world does not? What is the same, and what is different? What does that world reveal about this one? [These "​laws"​](https://​www.raphkoster.com/​games/​laws-of-online-world-design/​the-laws-of-online-world-design/​) from a practicing game designer, or [this guide](https://​radiopublic.com/​Ezra/​s1!8ed6a) from a master fantasy writer, might help.
Line 240: Line 240:
 ### 13. Singularity ### 13. Singularity
  
-  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)+  * Alessandro Delfanti and Johan Söderberg, "​[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://​ephemerajournal.org/​contribution/​repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism),"​ _Ephemera_ 18, no. 3 (2018)
   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)   * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://​www.wired.com/​story/​now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/​),"​ _Wired_ (January 31, 2018)