32 Matching Annotations
  1. Last 7 days
    1. and if located behind a firewall that preventssmartphones from communicating directly,

      Huh, such firewalls exist? I thought they can be hole-punched.

    2. In particular, adeep-fake payload that is not attributed to its source can be promptly filtered as spam

      ^

    3. However, sinceevery block in GSN is signed, when one breaches privacy within the protocol the breach carriestheir signature so the culprit can be identified.

      What stops a culprit to send off-group a message that is not his own? We can only achieve the "culprit detection" by addressing and signing every message we send to A. This is a lot of re-signing. And we won't have a convergent DAG.

    4. Furthermore, each block sent includes the most recent IP address of the sender,allowing agents to keep track of their friend’s changing IP addresses.

      Perhaps better to attach a new IP address to a message once it does change. What's the point in telling over-and-over the same IP?

    5. Every so often, an agent 𝑝sends to every friend 𝑞 every block 𝑝 knows and believes that 𝑞 needs, based on the last blockreceived from 𝑞.

      ^

    6. Agents communicate only with their friends

      More like an edge gives a communication path.

      A->B (A follows B) - B can talk to A.

      A<->B - B can talk to A, A can talk to B.

    7. However, their exclusion is not required in social networking, and hence social networking protocolscan be simpler than payment systems protocols

      I.e., Equivocation exclusion is not required for social networking.

    1. Every p-block with a payment in r-coins by a correct trader p ̸ = ris eventually approved or disapproved by an r-block [provided p and r are friends or have acommon friend in SG(B)]a.

      Strange that you need to have a friend-path in order to use r's coins. I'd expect r to accept&approve a message from me, given I hold his coin (which he can see from my message).

    2. An r-block b that repays a redemption claim with comment (redeem, P ), P =[p1, p2, . . . , pk], k ≥ 1, has a payment in pi-coins, i ∈ [k], provided the balance of r does notinclude any pj -coins for any 1 ≤ j < i at the time of creating b, and has a payment in r-coins,r /∈ P , provided the balance of r does not include any P -coins at the time of creating b

      Why have signed coins?

      Makes it possible to track which coins been equivocated.

      But what's the use for it?

      What's the difference between "you can't use these specific coins as they were equivocatedly used already" and "you can't use these opaque coins, as they are in equivocation"?

      Later, at least, may succed given equivocation issuer have enough balance for both. Although then there's no point in creating equivocation in the first place. So nevermind, won't happen, except by silly equivocators.

    3. An r-block b with an empty payment and comment (disapprove, h′) pointsto an r-coin payment block b′, where h′ points to the reason for disapproval: To b′, if it isunbalanced, or to a block b′′ equivocating with b′

      Again, this can be derived out of DAG. Seems redundant.

      It would somewhat spare computation, as one can check equivocation by following a pointer, but then he would need to ensure that both equivocated blocks are observed by a self-parent chain of the "DISAPPROVE" issuer.

    4. Given a blocklace B and two agents p, r ∈ Π, the r-coins balance of p in B isthe sum of r-coins payments accepted by p in B minus the sum of r-coins payments issued by p in B.

      Great, so r-balance of p is derived by the history of ops regarding r. So no need for p to calculate it and add to every op, would be redundant. Not sure the derivation is the proposed protocol though.

    5. Finality: A p-block consumes a non-p-block b′ with a payment to p only if r approves b′.

      Would be nice to have finality optional. As to not incur round-trip to a possibly offline r. Double-spends will be detected and punished. Given the value of double-spend spend is less than a cost - no incentive to do so.

    6. consisting of r-coins, which can be thought of as IOUs issued and signed by r

      Why do coins need to be signed?

    7. The black agent mints a black coin, increasing its balance from 3 to 4 coins

      Why to capture 4? Ops like burn(10), mint(1) do the same, yet being more semantic, as they convey what happens, rather than the result.

      E.g., when green has 3 green_coins, and we see send(1, green_coin, (to) black), send(3, green_coins, (to) green) did green just miscalculated his balance (should be 2), or did he sent and minted one at the same time?

    8. C

      That looks messy, accidentally so, it seems.

      1. Green agent only needs to REDEEM(green_coin) op to convey what he wants.

      2. Self-payments are redundant.

      3. Links other than self-parent and other-parent(s) are redundant. You can derive anybody's balance out of their self-parent chain.

      3.1 Other-parent_s_ make the order of received messages ambiguous.

      1. REPAY is redundant. When REDEEM is received, and given one can indeed redeem (recepient has his coin at the moment of receival) - the REDEEM should be automatic. I.e., plainly observing that REDEEM been accepted by recepient is enough to derive out of it one of 1) it's a suffessfull redeem 2) it's a failed redeem.
    9. and the red agent acceptsthe payment, increasing its balance to 6 black coins.

      Why does he need to explicitly accept? Can't it be done by default? Can he reject?

    10. The black agent approves the payment

      Why does he need to approve? It is a mean of equivocation detection. But it requires all coins going through its creator. Incurring latency and possible indefinete out-of-service as creator goes offline.

      Why is it not optional? Like we can exchange coins with recepient directly, and he may come to redeem it later, if he wishes, detecting eqiuvocation at that point.

      Some services, that offer say a cup of coffee, would be willing to take the risk of loosing $5 of value on to-be-detected equivocations. Since equivocators will be punished severily that does not worth 5$ of value. So they can be rest assured that nobody's gonna do that.

      Now this example holds if coffee provider prices in currency other than its own, say bank's.

      And banks are generally online. But still. Why force it? Let them do a round-trip to currency owner at their choice, a tradeoff that's up to them.

    11. decreasing its balance to 2 black coins

      Why does red agent need to issue pay to itself?

      What red agents holds after he transferred 1 black coin can be derived from history his ops.

      We can't trust what he issues, he may issue to self 1000 black coins. So we'd need to go check history whether he computed it right.

      But then again, if we need to do that, why issue an explicit payment to self?

    12. Agree to redeem any domestic coin issued in return for any foreign coin held. Forexample, Alice must agree to a request by Bob to redeem an Alice-coin Bob holds against any coin heldby Alice.

      The device of Alice may be offline, e.g., smartphone discharged. We can't assume constant connectivity.

    13. eachpricing their goods and services in terms of their own personal coins. Next, assume that every two villagersexchange 100 personal coins with each other

      Pricing in your own coins means personal coins may not match in value behind them. One may offer a cup of coffee for 1 coin, another for 5. Simply exchanging 100 coins with each other would mean one'll get 1/5 of value from this exchange. So 1:5 exchange would be needed. But how to know that in advance?

    1. Minting: Each agent p mints (i.e. creates initial NFTs with)its own p-coins, as many as it pleases

      An agent may create as many agent's coins as he pleases.

  2. Jan 2024
  3. Aug 2023
  4. Oct 2020
    1. Similar-looking moments and activities—large marches, big protests, occu-pations—do not represent the same points in the trajectories of the net-worked movements as they did in movements organized along traditional models and without digital tools.
  5. Jun 2019
  6. Feb 2018
    1. Dentro de esta propuesta, bien llamada ‘investigación desde la acción colectiva’ (IAC), “las comunidades hacen parte de la producción del conocimiento como investigadoras y los investigadores e investigadoras hacen parte de las acciones colectivas [de transformación social]”

      [...] plantear la desjerarquización y deselitización del conocimiento, es decir, a la descolonización epistémica como elemento integral de estas visiones.

      La hackatón en ese sentido tendría que diversificarse, para admitir más saberes. Aún nos falta, pero estamos abriéndonos a saberes bibliotecarios, editoriales y periodísticos, desde las prácticas y convocatorias que realiza el Data Week. Los diplomados podrían extender esto.

    2. El concepto de territorio, como es utilizado por los movimientos que describí antes, es una abreviatura para el sistema de relaciones cuya recreación continua re/crea a su vez la ‘comunidad’ en cuestión.
    3. os movimientos sociales, que pueden sufrir cambios estructurales y adoptar diversas estructuras en respuesta a las interacciones con el entorno pero tienen que mantener una organización básica con el fin de permanecer como las unidades que son. La interacción histórica entre unidades autopoiéticas (mundos, uno podría decir) a menudo adquiere un carácter recurrente, estableciendo un patrón de cambios estructurales mutuamente congruentes que permite a las unidades respectivas mantener su organización (interacciones pluriversales).
  7. Jan 2018
    1. El punto de partida es, de nuevo, aparentemente sencillo: que cada comunidad practica el diseño de sí misma. Este fue, puede argumentarse, el caso en las comunidades tradicionales (que producían las normas con las que vivían sus vidas, en gran medida de forma endógena) y lo es, todavía en muchas comunidades, tanto en el Sur Global como en el Norte Global, que abordan el diseño de sí mismas frente a las manifestaciones de las crisis, cada vez más profundas, y la inescapable mediación tecno-económica de sus mundos.

      Esto se ha visto, específicamente, en el caso de Grafoscopio, el Data Week y HackBo y de nuevo habla del diálogo entre estructura y agencia.

  8. Sep 2017
    1. Hacker and maker spaces arise from grassroots networks through a shared interest in maintaining a semi-permanent space for solo and collaborative work. They generally employ democratic and meritocratic conventions rather than ''top-down" organizational practices. These conventions evolve over time as they are reflexively modified by members through communication (McPhee & Zaug, 2009) and practices (Cox, 2005; Wenger, 1998) in and around physical space. This loose organizational structure and plurality of participant identities results in a tremendous variety of spaces that are best thought of as having a family resemblance (Wittgenstein, 1953) of organizational conventions and shared histories rather than consistency in interests or ideology. Some are firmly entrenched in information security (infosec) while others maintain a focus on artistic endeavors involving welding and woodwork. Several have arisen with an overtly feminist orientation and push back against the often male-dominant nature of these spaces.
    2. Hacker and maker spaces (HMSs) are open-access workshops devoted to creative and technical work. Their growing numbers (over 500 worldwide) make them a significant grassroots movement supporting informal learning. Scholars have found pedagogical benefits of tinkering and hacking, but the cultural contexts from which these practices arise remain under-studied.

      Nótese que también se habla de espacios creativos y no sólo técnicos.

    Tags

    Annotators

    1. Recent research has focused on hackerspaces as grassroots organizations for producing ad hoc, self-made tools (Toombs etal., 2014) and as homes for emerging technical entrepreneur-ship (Lindtner etal., 2014).Founder Sho Sho Smith built HackerMoms to identify with this ethos, what she called “true creativity”: making without a purpose or necessity, without people trying to elevate themselves or their career.2 Although she has admitted that she first associated hacking with criminal activity, she soon found it essential to the kind of life she desired

      Interesante la idea de hacer sin propósito o necesidad. No sé hasta que punto sea compatible con la idea de artesanía, en la medida en que esta es en sí misma un propósito y una necesidad, pero puede tener que ver precisamente con el caracter expresivo de la creación y no con el económico del mismo.