Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Contents Foreword: There Are Two Kinds of People Author’s Note Acknowledgments 1 The Hacker Ethic: Germany’s Chaos Computer Club and the Genealogy of the Hacker Ethos
In Berlin Getting to the Chaos Commmunication Camp First-Wave Hackers: Hacking Culture in the US from the Late 1950s, including the Hands-On Imperative and Other Principles of a Hacker Ethos Second-Wave Hackers: Computers and Code for the People, including the People’s Computer Company, The WELL, Homebrew, Silicon Valley, RMS, and Free Software First-Wave Europe: The Early Development of European Hacker Culture in the 1970s and 1980s The Early Days of the Chaos Computer Club 1989: A Watershed Year for Germany and the CCC The Fall of the Wall The 1990s: Hackerdom Expands, Silicon Valley Takes Off, and a Schism Develops between the Philosophies of Proprietary Software and Free Software First Impressions: Be Excellent to Each Other
2 The Hacker Challenge: Cypherpunks on the Electronic Frontier
Third-Wave Hackers: The Cypherpunks Fellow Travelers, Reluctant Heroes, and the Cryptowars of the 1990s The Smart-Ass Antipodean
3 A Manifesto for the Twenty-first Century: Privacy for the Weak, Transparency for the Powerful
Code Is Law, and the Onion Router Proves It WikiLeaks A New Kind of Cypherpunk Snowden A Manifesto for the Twenty-first Century and the Concept of Popular Sovereignty
4 The Burden of Security: The Challenges for the Ordinary User
Security 101 The Sakharovs Berlin: City of Freedom, City of Exiles A Cryptoparty
5 Democracy in Cyberspace: First, the Governance Problems
Harry Internet Governance: “Loraxes Who Speak for the Trees” Harry Redux Of Trees and Tongues What Is Democracy? Or How to Govern Democratically in a World That Is No Longer Flat? Hacker Governance: Noisy Square
6 Culture Clash: Hermes and the Italian HackingTeam
The Italian Embassy Black, White, and Gray
7 Democracy in Cyberspace: Then the Design Problems
The Problem of Provable Security The Problem of Designing Privacy-Preserving Protocols Email: A Case in Point Remaking the Internet for the Twenty-first Century
8 The Gathering Storm: The New Crypto—and Information and Net Neutrality and Free Software and Trust-Busting—Wars
A New Digital Era Civics Is Necessary The New Cryptowars The New Information Wars The New Net Neutrality Wars The New Free Software Wars The New Trust-Busting Wars and the Unsustainability of Current Digital Capitalism The Gathering Storm
9 Hacker Occupy: Bringing Occupy into Cyberspace and the Digital Era
The Occupy Movement A Multitude of Diverse Experiments Hacking Experiments Using Federated Technology, or the Basic Internet Structure Hacking Experiments Using P2P Distributed Technology Hacking Experiments Using the Blockchain Solid? The Blockchain Reality Check “The Next System”
10 Distributed Democracy: Experiments in Spain, Italy, and Canada
Getting Control of Democratic Processes: The Indignant of Barcelona Hacking Corruption: Xnet’s 15MpaRato Hazte Banquero (Become a Banker) Maddish: Platforms for the People PartidoX Homage to Catalonia Hacking Electoral Politics in Italy: “A New Politics Is Possible” Hacking Democratic Decision Making Itself: A Canadian Algorithm for Global Democracy No More Wrecking Balls
11 The Value and Risk of Transgressive Acts: Corrective Feedback
Berlin’s Graffiti The Value of Transgressive Acts The Risk of Transgressive Acts Hacker Crackdown 3.0 Where Power Meets Its Limits: The Making of Martyrs Democratic Constitutionalism as Conversation Leading to Rough Consensus
12 Mainstreaming Hackerdom: A New Condition of Freedom
A City upon a Hill Libre Planet, the Heart of Free Software Richard Stallman and the Free Software Foundation Awards Pros, Cons, and Disobedience Awards MIT’s Media Lab Harvard and the Berkman Klein Center for Internet & Society Emergence Enlivening a Moral Imagination The Epicenter of a Civilization
Coda Notes Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion