Posts Tagged ‘censorship’
by adminadam in videos
Defense Distributed‘s new promotional video:
Defense Distributed’s stated aims are as follows:
“To defend the human and civil right to keep and bear arms as guaranteed by the United States Constitution and affirmed by the United States Supreme Court; to collaboratively produce, publish, and distribute to the public without charge information and knowledge related to the digital manufacture of arms.”
They are a pending 501(c)(3) non-profit organization based in the State of Texas.
DD’s founders, Ben Denio and Cody Wilson seek to create a “a political and legal vehicle for demonstrating and promoting the subversive potential of publicly-available 3D Printing technologies.” To that effect, on July 27th, 2012 they launched the Wiki Weapon Project — the effort to create and release the files for the world’s first printable handgun.
The History of the DD is still in the making; the dust has not settled:
In August 2012, Indiegogo.com removed DD’s inaugural fundraising campaign from its website, citing a terms of service violation. This removal prompted stirrings in the 3DP and tech blogs, and led DD to court the Bitcoin community to help fund the Wiki Weapon. By September 2012, DD had raised enough money to set to prototyping and experimentation, when industry player Stratasys scandalously revoked its lease with the company and quickly repossessed its printer. This repossession, one of the first of its kind, made world news, and the Wiki Weapon found commensurate support.
By December 2012, DD began prototyping more durable rifle receivers for the popular AR-15, a fact not missed in American gun politics after that month’s Sandy Hook Massacre. By January 2013, DD had created the gun file repository DEFCAD and released the files for the first printable AR-15 standard capacity magazines. DD followed these achievements in March with the files for the first durable printed AR-15 rifle receiver.
On May 5, 2013, DD released the files for the Liberator pistol — the culmination of the Wiki Weapon Project. This release was met by a flurry of US governmental censures and investigations, and DD is still involved in a conflict with the US State Department over whether there is a requirement to seek government approval before releasing privately generated gun files into the public domain.
And now the Ghost Gunner has entered the scene…
Ghost Gunner is a miniature CNC machine designed to automatically manufacture publicy created designs with nearly zero user interaction. No prior CNC knowledge or experience is required to manufacture from design files. Defense Distributed’s first design is the venerable AR-15 lower receiver. Ghost Gunner automatically finds and aligns your 80% lower receiver to the machine, with simple installation instructions, point and click software and all required tools. Just follow a few simple instructions to mount your 80% lower receiver, tighten a couple screws (with simple tools we provide), and on day one, Ghost Gunner can help you legally manufacture unserialized firearms in the comfort of your own home.
[Read more at Ghostgunner.net]
“One of these centuries, the brutes, private or public, who believe that they can rule their betters by force, will learn the lesson of what happens when brute force encounters mind and force.”
— Ragnar Danneskjöld (from Atlas Shrugged, by Ayn Rand)
by adminadam in home
See more at weusenamecoins.com.
Quick Rundown of Namecoin:
- Used primarily for domain name registration
- Domains registered using Namecoin cannot be censored or shut down by ICANN, any government, or any other private entity
- Host your own website or use an out-of-jurisdiction VPS for greater resiliency against take-down requests
- Can also be used as a currency, for tips, etc.
- 21 million Namecoins total to be produced
- Mined and secured just like Bitcoin
- Transaction history kept forever in Blockchain public ledger
by adminadam in videos
I now plan to read his book, The Science Delusion, as well. It is an excellent talk and TED is doing itself a huge disservice in removing it from their front page. They have relegated it to a small back corner of their site and labelled it “open for discussion”. I personally feel disgusted at their behavior, especially considering the meritorious elucidation of the problems with science as it is currently practiced in our world today.
A big thank you to Rupert for his dedication to real science and real skepticism. And unless they reinstate it in a prominent place in an expedient fashion, a big shame on TED for their hypocrisy in claiming that they want to engage — with us, with Sheldrake, and with the world on the very important topic of what we actually know and what we think we know — as they actively try to dis-engage from it all.
Another view into the minds of TED organizers:
JRE #330 (The Joe Rogan Experience): Eddie Huang TED Conference Exposed
by adminadam in videos
Efforts to fight piracy and limit computer functionality converge on malware/spyware being pre-installed on every machine that ships. As an example, Intel has teamed up with video streaming services in the design of their new Sandy Bridge chips, which will supposedly allow for only DRM content to be streamed in HD. (Not that you have to utilize DRM-ladden content; you can find and play things in HD on your own still, but it’s the beginning of a larger trend — i.e. cars that can be remotely shut down, iPhones whose cameras turn off at the request of the authorities, etc.)
This trend is most disturbing in particular in regimes where the populace is not media-literate enough to get around these restrictions, unlike in wealthy, western countries where we can assume, as always, someone will find a way to hack into it (or out of it). [Maybe these people: ccc.de?]
Doctorow refers to all of our iThings and other increasingly restricted forms of hardware as Appliances, but what they are, he goes on to elucidate, are general purpose computers that ship with malware inside. With SOPA and all this copyright mess what we are seeing is just the first battle of the war on general purpose computing.