Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
hacker_culture [2024/01/17 16:38] ntnsndr |
hacker_culture [2024/04/23 18:40] (current) ntnsndr [13. Singularity] |
||
---|---|---|---|
Line 113: | Line 113: | ||
*25 points* | *25 points* | ||
- | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack that for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. | + | Become a goon. The final project for this course is to write an illustrated, 1,800-to-2,000-word report on a real-world hack for a relevant establishmentarian organization. Pick a hack that particularly fascinates you. |
If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | If the hack in question is of questionable legality, write as an FBI agent, perhaps. If the hack is just a brilliant piece of technology, write as a stiff for a big computer company trying to figure out how to capitalize on it. In any case, with clear language and documented research, explain the nature of the hack, its significance, and a recommendation for what your organization should do about it. | ||
Line 222: | Line 222: | ||
* Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://archive.thinkprogress.org/meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/)," _ThinkProgress_ (April 29, 2014) | * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://archive.thinkprogress.org/meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/)," _ThinkProgress_ (April 29, 2014) | ||
- | **Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://www.isaca.org/Journal/archives/2010/Volume-1/Pages/Performing-a-Security-Risk-Assessment1.aspx) about the [nature](http://webkay.robinlinus.com/) of potential [threats](https://panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://alternativeto.net/platform/all/?license=opensource), [PRISM Break](http://prism-break.org/), [PrivacyTools](https://www.privacytools.io/), or [Surveillance Self-Defense](https://ssd.eff.org/) if the dangers are digital. Go further with Janet Vertesi's [Opt Out Project](https://www.optoutproject.net/). Try out a few patches, and determine whether they're worth the trouble. | + | **Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://www.consumerreports.org/issue/data-privacy) on [potential threats](https://coveryourtracks.eff.org/) and how they might be mitigated. What do online services you use [make you agree to](https://privacyspy.org/)? Check out software listed at [AlternativeTo](https://alternativeto.net/platform/all/?license=opensource), [PRISM Break](http://prism-break.org/), [PrivacyTools](https://www.privacytools.io/), or [Surveillance Self-Defense](https://ssd.eff.org/) if the dangers are digital. Go further with Janet Vertesi's [Opt Out Project](https://www.optoutproject.net/). Try out a few patches, and determine whether they're worth the trouble. |
### 11. Disintermediation | ### 11. Disintermediation | ||
Line 234: | Line 234: | ||
* Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://colorado.kanopy.com/node/12574154)_ (2021) | * Anisia Uzeyman and Saul Williams (dirs.), _[Neptune Frost](https://colorado.kanopy.com/node/12574154)_ (2021) | ||
- | * "[Shenzhen: The Silicon Valley of Hardware](https://www.youtube.com/watch?v=SGJ5cZnoodY)," _Wired_ (2016) | + | * Fernanda R. Rosa, "[From Community Networks to Shared Networks: The Paths of Latin-Centric Indigenous Networks to a Pluriversal Internet](https://www-tandfonline-com.colorado.idm.oclc.org/doi/full/10.1080/1369118X.2022.2085614)," _Information, Communication & Society_ 26, no. 11 (2023) |
**Exploit: Build a world.** Devise an imaginary world that doesn't exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "real" world does not? What is the same, and what is different? What does that world reveal about this one? [These "laws"](https://www.raphkoster.com/games/laws-of-online-world-design/the-laws-of-online-world-design/) from a practicing game designer, or [this guide](https://radiopublic.com/Ezra/s1!8ed6a) from a master fantasy writer, might help. | **Exploit: Build a world.** Devise an imaginary world that doesn't exist yet. Make a map, tell a story, provide a timeline, or offer some other picture of your world. What does this world allow you to explore that the "real" world does not? What is the same, and what is different? What does that world reveal about this one? [These "laws"](https://www.raphkoster.com/games/laws-of-online-world-design/the-laws-of-online-world-design/) from a practicing game designer, or [this guide](https://radiopublic.com/Ezra/s1!8ed6a) from a master fantasy writer, might help. | ||
Line 240: | Line 240: | ||
### 13. Singularity | ### 13. Singularity | ||
- | * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](http://www.ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) | + | * Alessandro Delfanti and Johan Söderberg, "[Repurposing the hacker: Three cycles of recuperation in the evolution of hacking and capitalism](https://ephemerajournal.org/contribution/repurposing-hacker-three-cycles-recuperation-evolution-hacking-and-capitalism)," _Ephemera_ 18, no. 3 (2018) |
* Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | * Virginia Heffernan, "[Now That Tech Runs the World, Let's Retire the Hacker Ideal](https://www.wired.com/story/now-that-tech-runs-the-world-lets-retire-the-hacker-ideal/)," _Wired_ (January 31, 2018) | ||