74 Matching Annotations
  1. Apr 2017
    1. When a system is broken, we resort to improvised solutions, jury-rigged workarounds, hacks.

      Beautiful, Nathan!!!

    1. (http://www.rand.org/pubs/testimonies/CT436z1.html)

      The federal cyber workforce must also be continuously refreshed to attract the best and brightest to serve.

      REQUIRE the government has hackers. A cyber security force (spec ops online) to prevent online terrorism and security hacks.

    1. As O’Reilly discovered a long time ago, memes are for losers; the real money is in epistemes.

      I wish there was more to the whole "meme" theme.

    2. It was the growing popularity of “open source software” that turned O’Reilly into a national (and, at least in geek circles, international) figure. “Open source software” was also the first major rebranding exercise overseen by Team O’Reilly.

      OSS will become huuuge in the coming years. I am happy to have learned about it in this class.

    3. American Dream 2.0: start a company, disrupt an industry, coin a buzzword

      This is really interesting. The American Dream 2.0, how the American Dream has been gentrified. Wow.

    4. There’s a way in which the O’Reilly brand essence is ultimately a story about the hacker as hero, the kid who is playing with technology because he loves it, but one day falls into a situation where he or she is called on to go forth and change the world,” he wrote in 2012. B

      Hacker Culture!!!!

    5. Plotinus from their Pliny.

      I looked these up, they are philosophers.

    6. analytical precision as “open source,” “Web 2.0,” “government as a platform,” and “architecture of participation.” O’Reilly doesn’t coin all of h

      He's a massive ass but one cannot deny, a smart-ass

    7. discuss technology was entirely predictable. That the conceptual imperialism of Silicon Valley would also pollute the rest of our vocabulary wasn’t.

      Interesting comparison between vocabulary and technology in Silicon Valley. I didn't understand this at first but I feel as if the author is trying to get a "gentrifying language" approach to the story.

    8. from wiki-everything to i-something, from e-nothing to open-anything

      This is perfect

    9. Old, trusted words no longer mean what they used to mean; often, they don’t mean anything at all. Our language, much like everything these days, has been hacked.

      This is how I feel about fake news, it has been hacked. (blackhat)

    1. ur real problems on its own. There's still no substitute for organizing more power in more communitie

      Maybe a mass bit coin server farm in silicon valley to start the bit coin revolution!

    2. "Shut down government programs as you fund redistrib

      agreed

    3. We are at the beginning of the time where machines will do a lot of the things humans have traditionally done,

      online currency!!! maybe bit coins (actually coins) one day.

    4. After one speaker enumerated the security problems of a promising successor to Bitcoin, the economics blogger Steve Randy Waldman got up to speak about "engineering

      perfect for bit coin style economic plans!

    1. Like any circuit, miners give off heat when they're operating. Bitcoin miners are designed to run at full power all the time, which means they give off a lot of heat.Enthusiasts like to emphasize the impressive math involved in keeping Bitcoin secure, but what really holds the whole enterprise together is game theory based on the assumption that the participants are rational actors. The Bitcoin system thus relies on  mathematics, computer science, economics—and anthropology.The exact amount is tricky to compute, because the efficiency of individual miner varies, and each locale in which they operate draws power from different sources at different levels of expense.A hash is the work it takes to solve an equation in the Bitcoin mining process; a gigahash is a billion of them.

      Love this clarification, going to use this in my exploit!!

    2. ates called it “better than currency.” But  the Bitcoin revolution has begun to look more and more like the

      Okay Gates, as long as it gets a little easier to use!!

    3. Bitcoin-based charity in Florida bought a nine-acre forest as a sanctuary for the homeless, and Wired deemed Bitcoin “the great equalizer” for its potential to put financial services in

      Bitcoin giving back to the community! love it!!

    4. I feel like a martyr—a Bitcoin marty

      love it

    5. ues its free fall from a high of over $1,100 in late 2013 to less than $250 today; the 25

      craaaazy how things have changed! money is a strange necessity

    6. ining” is the engine that keeps the Bitcoin network working, but it has swelled into a resource-hungry, capital-intensive, centralized syndicate. Is the Internet's native currency worth all the effort?

      Great insight into the past of the Bitcoin, Nathan!

    1. by the U.S. army, is a powerful recruitment tool for the military. These games are literally sending people to war

      I feel like this has been going on for some years now with the invention of drone flying in the military and using games to teach the technicians how to fly. This, however, is more footwork in the field I believe, actual fighting. Anyone else see this?

    2. Bitcoin has been more widely adopted in Argentina because of the country’s high inflation rate and capital controls that make it difficult to buy foreign currency. Bitcoin became very relevant in this context. It became an efficient way to send money a

      Really interesting way that bit coin has evolved in the ever changing tides of world currency.

  2. Mar 2017
    1. All makers face this problem. Prices are determined by supply and demand, and there is just not as much demand for things that are fun to work on as there is for thing

      Just like "remixing" where the demand for new media is ever lasting, making remixing almost necessary to keep up with the supply and demand.

    2. ce had to leave a board meeting to have some cavities filled. I remember sitting back in the dentist's chair, waiting for the drill, and feeling like I was on vacation.

      Sounds like the worst job known to man.

    3. le running a company to pick these out. So instead of entrusting the future of the software to one brilliant hacker, most companies set things up so that it is designed by committee, and the hackers merely implement the design.

      Interesting.

    4. hackers identified with other makers, like writers and painters, they wouldn't feel tempted to do this. Writers and painters don't suffer from math envy. They feel as if they're doing something completely unrelated. So are hackers, I think.

      This, to me, is another reason why hacking might be described as "cold". Math is generally a terribly hard aspect of school for me, but is painfully necessary. Math tends to be a little colder of a subject, numbers and variables, than beautifully crafted words (to the naked eye). But a beautiful sequence in code is also stake for appraisal.

    5. You should figure out programs as you're writing them, just as writers and painters and architects do.

      I love this way of learning/teaching. Although it may not be for everyone, I agree with the author fully.

    6. So, if hacking works like painting and writing, is it as cool? After all, you only get one life. You might as well spend it working on something great.

      Everything is "cool" in its own way. For something to be "cool" initially a person has to deem it so. People do these things, which makes them cool.

    7. Perhaps one day "computer science" will, like Yugoslavia, get broken up into its component parts. That might be a good thing. Especially if it meant independence for my native land, hacking

      Funny comparison, "lol".

    8. It's as if mathematicians, physicists, and architects all had to be in the same department.

      A department of creative thought perhaps?

    9. hacking was cold, precise, and methodical, and that painting was the frenzied expression of some primal urge.

      Interesting distinction. I attribute this to WHERE these activities take place. Hacking in a "cold" basement or room usually, and art in a "warm, sun-it room" stereotypically.

    1. "trying a bit too hard at times to get others to join me in a particular style of open discourse and conflict resolution"

      To put it nicely! Whitacre was very pushy with Shanley and the users/organizations that chose to join Gittip. He deserves the decrease in "gifts".

    2. o withdraw the talk upon request and without questioning the requester.

      say this 4 times fast

    3. - including Shanley Kane, Ashe Dryden,

      Our friend Ashe!!!!

    1. Elinor Ostrom Explained!)

      I wish these people were more nationally recognized!!

    2. strom claims that "all efforts to organize collective action, whether by an external ruler, an entrepreneur, or a set of principals who wish to gain collective benefits, must address a common set of problems." These problems are "coping with free-riding, solving commitment problems, arranging for the supply of new institutions, and monitoring individual compliance with sets of rules."

      Really sums up Ostrom's points into one quote.

    1. Hackerspaces worldwide use the internet to interact and hack for the weekend. Third weekend each mo

      Love this idea a lot. Reminds me of poetry in a coffee shop

  3. gabriellacoleman.org gabriellacoleman.org
    1. impending government antitrust suit over bundling (Swedin and Ferro 2005).Given the lack of legal restrictions on software, hackers and program

      Why would bundling be an "anti-trust" move?

    2. ricey (thirty thousand dollars) but popular " le management system that enabled businesses to

      holy shit, in the 1970s??? $30,000 was a lot of money.

    3. eavors in various " elds stretching from journalism to science.

      Yes!! Journalism WILL benefit even more from this in the future when Trump realizes there is a mass population of hackers in the United States that won't allow for him to f*** everything up. (At least I hope so) Hackers Unite!

    4. s, many developers, armed with this legal consciousness, have questioned or directly protested the so- called harmonization (i.e., tighten-ing) of intellectual property law.

      This section really relates to my exploit in the sense that writing, in general, has become so scrutinized under all of the "fake news" scare, the Trump administration and worldly issues. It is more important now than ever to protest these "tightenings" of intellectual property as a whole:::::Exploit quote

    5. chie2 y motivated by a desire to ensure their pro-ductive freedom (and not by some com

      How I feel about hacking. Productive freedom is such a good phrase for this because so many people just want to obtain productivity from a hack, not some weird "black hat" matter.

    6. excited (and puzzled) by the legal alternative it provided

      Me too!! Puzzling to figure all of this out. Yet so interesting.

    7. treatment in the conclusion: the cultivation, among hackers, of a well- developed legal consciousness

      This really sums up her whole first part for me nicely. I love how the author uses the word "cultivation" to achieve the "legal consciousness"

    8. here as two distinct trajectories that once existed independently but have come into direct con2 ict, especially over the last decade. The " rst trajectory pertains to free software’s matu

      Now the Tale of Two Cities quote really resonates! Anyone else?

    9. Free software hackers and enthusiasts have successfully secured a domain of legal autonomy for software production during an era of such unprecedented transformations in intellectual property law that critics have described it in ominous terms

      This reminds me of The Internet of Ownership, which was a great site we were directed to for this weeks exploit. The site contained a whole source of free, malleable software that was either up and running, or needed help to be made.

  4. Feb 2017
    1. On the other hand, if many people get GNU from their friends, and such companies don't succeed, this will show that advertising was not really necessary to spread GNU.

      Crowdsourcing. I like this idea.

    2. nvironment by encouraging all students to study and improve the system code. Harvard's computer lab used to have the policy that no program could be installed on the system if its sources were not on public display, and upheld it by actually refusing to install certain programs. I was very much inspired by this.

      Very cool. High school is filled with useless busy work that I didn't retain a thing of. Things like these are important for young minds. They actually MATTER to life. Not regurgitated facts that don't make sense to 85% of a classroom.

    3. NU is written, everyone will be able to obtain good system software free, just like air.(3)

      Very beneficial for sure. Air is good.

    4. The fundamental act of friendship among programmers is the sharing of programs; marketing arrangements now typically used essentially forbid prog

      interesting. I used to think programmers/hackers liked to kind-of battle it out with each other.

    5. GNU is not in the public domain. Everyone will be permitted to modify and redistribute GNU, but no distributor will be allowed to restrict its further redistribution.

      Seems like a fair, reasonable and smart idea.

    6. ce the g in the word “

      Lol I was wondering how to pronounce this. There is a snowboarding company called GNU so I didn't know if it would be the same or not.

    7. es in the 68000/16000 class with virtual memory, because they are the easiest machines to make it run on. The extra effort to make it run on smaller machin

      What do these numbers mean???

    1. deep secures

      Firewalls? Security for online registration?

    2. Well, he gave me another F on a theme." "I never get F's. If you'd read books once in a--"

      Ohhhh hacking a teacher lol Never heard the word burn before for this term.

    3. "Well, let's do some fun. Any requests?" Georgie wanted something to get even with his old man, and I had a new routine cooking, but Lisa's eyes lit up 'cause Rayno handed the term to her, first. "I wanna burn Lewis," she said. "Oh fritz!" Georgie complained. "You did that last week!" "Well, he gave me another F on a theme." "I never get F's. If you'd read book

      What is "burn Lewis"?

    4. Rayno

      Seems like a true hacker tag

    5. ereotype of the punk hacker with a mohawk. That, and I named the beast, of course.

      lol

    1. attracted like-minded pioneers

      Hackers I believe!

    2. Not every artist's generation is in the lucky position of witnessing the birth of a new technology that has the potential to revolutionize

      I feel like she is referring to the age of computers. Strange that a few of these revolutions have happened since then.

    1. It was a bold move, because Shimomura was a respected security expert and a character almost as complex as Mitnick. A 30-year-old science geek, Shimomura w

      Ahhh a battle of the wits

    2. sifting through trash,

      never thought of that

    3. was arrested five times for his digital trespassing, Mitnick wouldn't stop.

      ie. Black hat

  5. gabriellacoleman.org gabriellacoleman.org
    1. remember when I found python, back in the 1.52 days [1.52 refers to a version number].2 I was an unemployed slacker living in a student co- op. I’d sit in a (since disappeared) cafe in Berkeley and write reams of more or less useless code, simply for the joy of it. I’d reach some sort of transcendental state fueled by relevant whitespace, clear syntax, and pints of awfully strong, black coffee. In those days I " rst felt the pure abstract joy of programming in a powerful way— the ability to conjure these giant structures, manipulate them at will, have them contain and be contained by one another. I think I learned more in those couple of months, thanks to Google and a free ricochet connection, than in my previous years in CS [computer science].Eventually, however, it became clear I had to get a real job. Flaky freelance contracts which never paid sucked so hard. So, I hemmed and hawed and was con2 icted and " nally got a job, and it involved perl. It was, perhaps, a worst- case perl scenario. A very rapidly growing web-site, a few developers with vastly different styles, a lack of real commu

      interesting story of becoming a hacker in the "real world". I had wondered about this.

    2. “counting the number of stars in the sky.” This code has a technical function, but within a community of peers, its performance is also a declaration and demonstration of the author’s savvy.

      interesting

    3. see that the Perl programmer has taken six lines of code and reduced them to a single line by taking advantag

      Why can't you do this with other programs?

    4. often call “obfuscated”

      good hacker lingo

    1. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

      Perfect words for me when describing what a hacker is and understanding that.

    2. You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak...

      Favorite line

    3. Damn kid. All he does is play games. They're all alike.

      Love how the author uses these 3rd person quotes to show how he was different as a hacker from the normal teachings of everyday life

    4. fteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike.

      Sounds like me as a teen in school. Except I could never do the math even in my head.

    5. Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike.

      LOL