The Social VPN Project This is a free and open-source P2P Social Virtual Private Network (VPN) that seamlessly networks your computer with the computers of your friends so that: Your computer can communicate directly to computers of your friends, and all communication is encrypted and authenticated.
2008年3月20日 · A VPN, or virtual private network, is a faster, fancier, and more elegant way to achieve the same result. Essentially a VPN creates your own private, encrypted channel that runs alongside the normal Internet. From within China, a VPN connects you with an
LibreVPN is a virtual mesh network using tinc plus configuration scripts that even let you build your own mesh VPN. It’s also IPv6 enabled. Language: Platform: Website: http://tinc-vpn.org Litecoin LiteCoin is a peer-to-peer Internet currency that enables instant
- Contextual Citation
- Related Wiki Sections
- Socio-Technological Frameworks to Understand P2P Technology
- Towards A P2P Philosophy of Technology
- Key Resources: Generic
- Wikipedia Articles
"My deep concern is that the new tech generations are having to face the age-old debate about decision-making through centralization V decentralization without necessarily understanding the stakes involved. Couple this with the fact that those stakes are rapidly changing as a result of the steady increase in global population and steady decline of ...
This is a place to monitor technological developments, the P2P infrastructure, software issues, technology-enabled cooperation, etc.. Eventually, this section should exhibit the answer to the following question: what are the technical requirements for human emancipation? How to we design and implement an infrastructure that guarantees the participa...Projects to decentralize/distribute the internet: see our section on P2P Infrastructure
"The capacity to promote autonomy is a fundament characteristic of a convivial tool". - Ivan Illich, in: "Tools for Conviviality"
* The Bleeding Edge. Why Technology Turns Toxic in an Unequal World. By Bob Hughes. New Internationalist Books, 2016 1. Check out the work of Andrew Feenberg and his take on technological determinism. 1. Check out the works of Kevin Carson on technological autonomy for a peer to peer age 1. Read this interview of Bernard Stiegler, (the only specifi...
This typology by David Weinberger is actually quite useful in determining basic attitudes towards the internet and technology: "1. Exceptionalist (E) vs. Ordinarist (O).Exceptionalists believe that the Internet is exceptional, extraordinary, and disruptive, the way, say, the printing press was. Ordinarists believe that the Internet is just another ...
All P2P really means is person-to-person: normal folk using web tools - without the annoyance of an institution or mega-corp getting in the way. - James Cherkoff "The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it" - Weiser “Man is a Tool-using Animal. . . . Nowhere do you find him without Tools; without Tools he is nothing, with Tools he is all.” - Thomas Carlyle) One of the key elements of...
"If we are to preserve the democratic and creative promise of the Internet, we must continuously diagnose control points as they emerge and devise mechanisms of recreating diversity of constraint and degrees of freedom in the network to work around these forms of reconcentrated power." - Yochai Benkler “Modern methods of production have given us the possibility of ease and security for all; we have chosen, instead, to have overwork for some and starvation for others. Hitherto we have continue...
* The Bleeding Edge. Why Technology Turns Toxic in an Unequal World. By Bob Hughes. New Internationalist Books, 2016
Benefits of the Second Industrial Revolution vs the Benefits of the Third Industrial Revolution; by Kevin Kelly.
Collaborative Filtering, http://en.wikipedia.org/wiki/Collaborative_filtering Collaborative software, http://en.wikipedia.org/wiki/Collaborative_software Computer-supported collaboration, http://en.wikipedia.org/wiki/Computer-supported_collaboration Computer-supported cooperative work, http://en.wikipedia.org/wiki/Computer_supported_cooperative_wor...
During the Jan 25 revolution, the Mubarak regime caused a nearly total blackout of Internet, cellular and SMS service. While the Net was up, Telecomix provided tools such as TOR, VPNs and other encryption for safe communication. To restore access to censored sites, we built mirrors and proxies.
The Tiki Suite is especially suited to decentralized and knowledge-centric organizations and offers most (80%+) of the features all organizations need, such as: Email, Website & Blog, Shopping Cart, Intranet & Project Management, E-learning, Social
"Relakks offers a neutral IP on top of your existing ISP service through a strongly encrypted VPN connection. Basically, this gives users the advantage of a Swedish IP address from anywhere in the world. The cost of the service is 5 euros per month ...