Search Results: "nickm"

7 May 2007

Gunnar Wolf: Nekkid city!

I did it.
We did it.
The whole lot of us did it.
And we liked it.
In fact, we loved it.
Today, Spencer Tunick held his long awaited session in Mexico City. I signed up a long time ago, yet could not believe this was really going to happen - And man, did it happen!
For those still wondering who is Tunick (lazy you, as with the first link, it becomes just obvious), he is an artist who enjoys gathering large crowds, getting them all naked, and photographing them. Some people (including me, until this morning) erroneously categorize him as a photographer - No way! Out of Tunick's own words, out of many comments I heard and read today (i.e. at El Universal's forum), I can assure you only a participant can feel Tunick's art - A sensation of togetherness, of freedom, of clean enjoyment, throwing out the denial and repression we have regarding ourselves and our society. I was quite skeptical. The Mexican society is well known for being conservative on many issues. Nudism in Mexico is basically something not even talked about. There are a couple of nudist beaches, but they are closely associated with relaxed morals and drug abuse, and are just not safe for, say, women on their own. Nudists are seen as sex-maniacs... And, yes, this is as far as it gets from truth.
As I said, not only did it happen here, but how! We were between 18,000 and 20,000 naked people in the Z calo, Mexico City's main square, the third largest square in the world. The previous attendance record for Tunick's works was at Barcelona, Spain, with 7,000 people. And the surprise is not just the number - I insist, it fills me with joy to recognize a positive change in my country, to recognize we are not that retrograde anymore.
Nadezhda and I were there, as many couples, groups of friends, even families (although, yes, people under 18 were requested not to come - they would be expelled if found). I think the main age group was people in their late 20s, but there were many people from every age group. We met people who travelled from Jalapa, Veracruz (5 hr away), to be here today. I read reports of people coming from Guanajuato (5 hr), Oaxaca (6-7 hr), even Durango (14 hr)! We met near the Z calo at 4:30 AM, as Tunick likes making his work with the early morning light. As you can imagine, and after quite a busy and tiring day, I feel like minced meat... So I'll leave this for now. I expect to come back to the topic in the next couple of days - But anyway: This was amazing. Incredible.

14 December 2006

Hanna Wallach: platform studies

Nick and Ian have just announced a new MIT Press book series: Platform Studies. The series will investigate the relationships between the hardware and software design of computing systems and the creative works produced on those systems. The first book’s already under contract and will be about the Atari 2600 (sweet!) but Nick and Ian are currently seeking book proposals for the rest of the series. They’ve got a list of example platforms on the Platform Studies website (I’d personally be really keen to see something related to free software) so if you’re interested, why not check out the site and submit something!

5 March 2006

Uwe Hermann: HOWTO: Anonymous communication with Tor - some hints and some pitfalls [Update]

Warning: Very long post ahead. You have been warned! What? Tor is a Free Software project (revised BSD license), developed by Roger Dingledine and Nick Mathewson, which creates an infrastructure for anonymous TCP communication. From the project website:
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features. Tor aims to defend against traffic analysis, a form of network surveillance that threatens personal anonymity and privacy, confidential business activities and relationships, and state security. Communications are bounced around a distributed network of servers called onion routers, protecting you from websites that build profiles of your interests, local eavesdroppers that read your data or learn what sites you visit, and even the onion routers themselves.
Tor also allows you to set up and/or use a so-called Tor hidden service, i.e., a server which offers some service (a website, ssh access, or similar) without revealing its IP to its users. Why? Why would you want to use Tor? Well, because you probably don't want anybody (neither state agencies, nor companies, nor "hackers", nor any other individuals or groups) to be able to record, analyze, and (ab)use information about your web browsing habits, or any other communication habits. For instance, you don't want Google to have a complete search-profile of you, which — even worse — might some day get in the hands of other parties. In the days of massive data retention you don't want all your electronic traces to be recorded, stored for ages, analyzed, and data-mined for dubious reasons and with even more dubious results and false conclusions drawn which might negatively affect you. If you're a human rights activist in China, you want anonymous communication. If you're a whistleblower, you want anonymous communication. The list is endless. For securing your communications, so that nobody is able to sniff your emails, your chat messages, your passwords, your private documents and conversations, you use encryption. For communicating anonymously you can use Tor. Combine both, and you have secure and anonymous communication. In case you're wondering whether criminals might abuse Tor, read the Tor Abuse FAQ. Short answer: yes, but if you're willing to break the law, you already have anonymity (open access points, stolen/prepaid mobile phones, etc.). You don't need Tor to do bad things if you're a criminal. If you're one of those horrible "oh, but I don't have anything to hide" guys, consider this: Say you have a drug/alcohol problem and want to visit an anti-drugs/anti-alcohol website or forum for help. Would you want the whole world, your neighbors, your co-workers, your boss, to know that, or would you rather want to keep that a secret? Say you have AIDS and want to get information on the web? Or, to make the example even more dramatic: Would you want some random guys to be able to watch you while you fuck your wife? No? So you have something to hide after all, right? My point is: Everyone has something to hide, even more, it is a basic human right to have the ability to hide something. It's called privacy. How? Tor implements a form of onion routing to, basically, push encrypted data through multiple Tor nodes (servers), before it reaches the final destination (e.g. a website). The result is that neither the website owner, nor a local eavesdropper, nor any single Tor server knows who requested that specific website, hence you are communicating anonymously. For more technical details, read the Tor overview and the Tor documentation pages. In order to use Tor, you have to install and run a local Tor client/daemon (this is not necessarily a Tor server!). On Debian, type apt-get install tor, on other systems you can get the respective binary packages or download the sources and compile Tor yourself. Usually Tor is used together with Privoxy, a configurable HTTP proxy which sanitizes your web-browsing experience by removing nasty banner ads, pop-ups, JavaScript, webbugs, cookies etc. etc. So: apt-get install privoxy. After installing and starting Tor and Privoxy, you can now configure your webbrowser to use Privoxy as an HTTP proxy (see below), and Privoxy will in turn use Tor to anonymize your communication if you add "forward-socks4a / localhost:9050 ." to your /etc/privoxy/config. Anonymizing various applications Most (but not all) of the following information is also covered in the very useful Torify HOWTO in the Tor wiki (I will add the missing information there, ASAP). As I'm pretty paranoid, I have checked every single of these configurations with Ethereal to ensure that the traffic is really anonymized. However, if you are paranoid, you shouldn't trust me, but rather test this stuff for yourself! Warning: DNS Leaks:
The biggest problem with many applications is that they leak DNS requests. That is, although they use Tor to anonymize the traffic, they first send a DNS request untorified in order to get the IP address of the target system. Then they communicate "anonymously" with that target. The problem: any eavesdropper with more than three brain cells can conclude what website you visited, if they see that you send a DNS request for rsf.org, followed by some "anonymous" Tor traffic. The solution: use Tor together with Privoxy, that prevents DNS leaks. Many non-HTTP-based applications are usually torified using a small tool called torify (e.g. by typing torify fetchmail), but often this approach has DNS leaking problems, see below. You might also want to check out toraliases, a small shell script you can source from your ~/.bashrc file. It defines some functions and aliases which transparently direct the traffic of some (but not all!) programs through Tor. Applications which cannot easily be torified Anything not using TCP usually cannot be torified, as Tor only works for TCP. Pitfalls to be aware of More information More information is available in the Tor documentation, the Tor wiki, and especially in the Tor FAQ. In addition, there's an IRC channel on Freenode (#tor), some slides and a video (torrent) about Tor you might find interesting. If you would like to help, you can run a Tor server, donate some money, or volunteer to do other things (code, debug, document, translate, and more). That's it for now. I'm very grateful for comments and suggestions, especially for hints on how to anonymize more applications. Also, if you notice any dumb mistakes I made, please leave a comment. Update 2006-03-07: Fixed typos, added link to the toraliases project (thanks Benjamin Schieder).

18 November 2005

Matthias Urlichs: Interactive fiction is good for you ... NOT

Do not read further. If you couldn't control yourself, do not go here. If you did, run sudo apt-get remove frotz. Immediately. If by any chance you didn't, under no circumstances should you open a terminal and type frotz bookvol.z5. You did? Oh dear. Try not to ... spend ... the rest ... of your ... week ... aarrrggghhh .. too late... See you sometime later. Much later.

Hanna Wallach: book and volume

Wow. Over 2 months and not a single blog post. Not intentional, but sometimes you have to do what you have to do. (Which in my case has been 10,000 lines of C++ and a workshop paper.) So, what’s new? Lots really, and I will write more as I wait for my 10,000 lines of C++ to run over the next few weeks, but for now, I’ll just mention the following: yesterday, Nick released Book and Volume, his latest piece of interactive fiction. I played it over a period of several months in my official role as “beta tester” and have the honour of being one of only four people to have (at this point in time) completed the game. It’s great. It’s immensely satisfying and very funny, offering a unique take on the life of a stressed system administrator and the corporate nature of American culture. You can read more about the piece on Grand Text Auto and on Nick’s site, which also contains instructions for installing an appropriate interpreter (apt-get install frotz, for the Debian kids) and a link to the the game itself. For now, however, I shall leave you with the opening paragraphs:
Your pager tickles you awake. Upstairs in the house of your childhood, in your room, and it must be time for school because—no, it’s the weekend, you remember, but your alarm is going off anyway. You should have been awake already. You’re going to miss the bus. Your mother climbs in the window. You’re dreaming. You’re a grown-up: It opens to you again, a sluggish window summoned by a mouse click. Waking up now in your own apartment, your new apartment. Your pager is buzzing and vibrating both, serious. It is in fact the weekend, but you’re not in elementary school. No one is crawling in through the window. You’re a system administrator for nWare. Waking up urgently, here in nTopia.