nullius
|
|
December 08, 2020, 06:00:31 AM |
|
This is one of the two worst plagiarisms that I have ever yet seen on this forum. (The other is something that I found in the Russian forum—which, as aforementioned, I have been intending to report.) It is not obvious, the way that it is presented in OP; OP’s retroversion to Russian does not show that Ratimov’s English-language post is almost entirely a straight copy-paste. Insofar as I can tell, Ratimov wrote exactly two sentences of this long post in his own words.It is obvious when you do what OP suggested, which nobody actually did: Compare Ratimov’s English post with the Google translation of Ratimov’s so-called “source”. Ratimov did a total rip-off! When I have other posts to write (and other things to do in my life), I just spent several hours neatly formatting the Google translation of Ratimov’s “source” in BBcode, collating it with Ratimov’s plagiarised post, and packaging it with this explanation. —All to show the nature of a post which Ratimov evidently slapped together in a few minutes, for which he received much praise. I often spend hours of painstaking effort on one post. I know that some other high-merit users invest similarly. I have earned 2080 merits. Ratimov copies and pastes Google translations of others’ work. Ratimov has earned 3017 merits. Why should anyone bother, when it is so easy to earn merits with copy and paste?OP, good work. I would send you merit on your throwaway account there, if I were not trying to save up some sMerits now. Perhaps a merit source should merit you. Perhaps LoyceV or suchmoon, who are so strongly against copypasta posts? The CollationForward links: Plagiarised Post; Original. Colour codes: - Text copied by Ratimov verbatim, or almost verbatim.
- Text closely paraphrased by Ratimov. Some of this “paraphrasing” may be a straight copy and paste; Google Translate does not give the exact same results every time.
- Extraordinarily weird machine translation errors that Ratimov did not even bother to fix. Emphasizes the essential copy-paste nature of this post.
- In the original, this text was copied or closely paraphrased/text-spun by Ratimov.
It is recommended to open this post in two different browser windows, and compare the highlighted plagiarism with the highlighted original side-by-side. The forum’s format does not admit any adequate representation of such a collation. Where multiple paragraphs in the original were combined into one paragraph by Ratimov, I have preserved the original paragraph breaks with corresponding breaks in the highlighting. Observe that all internal quotations and images in Ratimov’s post were also simply copied by him from the original. Ratimov essentially reproduced a cut-down version of the Google Translate English version of a Russian article, and presented it as his own work—with a link to the original tossed into the middle of a list of so-called “source” links at the bottom. This is not presented a translation of a Russian article, with appropriate credit given to the author, Andrew Asmakov; and credit is also not given to the translator, Google. It appears to be Ratimov’s article; whereas it is a straight copy-paste, no different than any other “copypasta” besides its breathtaking scope and audacity. Plagiarised PostN.b. the merits from reputable users, who would not knowingly merit a copy-paste. As I noted earlier, I had intended to merit it myself, and to make a thoughtful reply. Merited by DdmrDdmr (2), OgNasty (1), ETFbitcoin (1), mk4 (1), 20kevin20 (1), GazetaBitcoin (1)In this article I would like to touch upon such a theme as online privacy. As we know, now is the period of a pandemic, and it is at this time that rights and freedoms are being infringed, including on the Internet. Governments are using the pandemic as an excuse to restrict access to information. It also expands the powers to monitor and implement new technologies aimed at digitizing, collecting and analyzing personal data of people without adequate protection from abuse. Countries are introducing new Internet rules to restrict the flow of information across national borders.But any action on the part of the government immediately provokes opposition, especially on the Internet. Indeed, for many users, the principles of unhindered access to information and free expression are fundamental to the development of civil society and economic prosperity. The history of the world wide web is also the history of the struggle for basic human rights, the possibilities for achieving which have grown immeasurably with the development of technology.Next, let's analyze the 5 most famous program documents published in the network, which still remain relevant, iincluding for cryptocurrency supporters.1. The Conscience of a HackerThe first significant attempt to explain the philosophy of hackers was an essay, written in January 1986 and later published in the electronic journal Phrack, entitled The Conscience of a Hacker. It was written by a hacker from Texas called The Mentor, Loyd Blankenship. Referring to the collective image of the world of adults, including teachers who think in familiar patterns, Blankenship writes:But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me...Or thinks I'm a smart ass...Or doesn't like teaching and shouldn't be here...Damn kid. All he does is play games. They're all alike.
You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us will-ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.
I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike. Blankenship's work is often referred to as the beginning of a story of confrontation between online activists and the real world in general, which later grew into a struggle with governments.Lloyd Blankenship about the history of writing the Hacker's Manifesto. H2K2 Conference in 2002.2. The Crypto Anarchist ManifestoIn the 1970s, when the first working prototypes of the Internet appeared, the issue of protecting data in an open environment became relevant. In 1978, American cryptographer David Chaum developed a blind digital signature - a public key encryption model. It allowed the creation of a database of people who could remain anonymous, while guaranteeing the reliability of the information they provided about themselves.Chaum also dreamed of digital voting, the process of which could be verified without disclosing the identity of the voter, but primarily digital cash. In the mid-1980s, he was able to create a model in which users made payments while maintaining anonymity and guaranteeing the reality of funds. On the basis of these developments, the movement of cryptographers was born, advocating computer technology as a means of destroying the state. The main ideologist of this movement was the former leading researcher at Intel Timothy May.Timothy May Inspired by Chaum's 1985 paper "Security without identification: transaction systems to make big brother obsolete," which described a system that cryptographically hides the customer's identity, May set about exploring public key cryptographic security. He was firmly convinced that, when combined with networked computing, this technology could "destroy the structures of social power." In 1988, May published The Crypto Anarchist Manifesto, an essay he wrote based on Karl Marx's Communist Manifesto:A specter is haunting the modern world, the specter of crypto anarchy. It says that information technology will allow people to manage their lives without governments, but through cryptography, digital currencies and other decentralized tools. The anonymity these tools bring should be a catalyst for profound social change.Timothy May writes:Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re- routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation. According to May, the ideological foundation of The Crypto Anarchist Manifesto was anarcho-capitalism, a form of anarchism that emphasizes voluntary transactions and the free market. His essay was partly a source of inspiration for the first prototypes of Bitcoin, and many cryptocurrency proponents consider Timothy May to be one of those people who made a huge contribution to its ideological foundation. However, in 2018, when it was 10 years since the publication of the Bitcoin white paper, May stated that, observing what was happening, he experienced "some interest, a certain surprise and great disappointment", and that "Satoshi would vomit" if he saw all hype and yelling to the heavens and HODL, as well as ever tighter regulation.In his opinion, attempts to "befriend" regulators are likely to kill the key use cases for cryptocurrencies, which should not be variations on PayPal or Visa.3. A Cypherpunk's ManifestoTimothy May also pioneered the cypherpunk movement, which he founded in 1992 with John Gilmore and Eric Hughes to champion the ideals of privacy and technology openness. It is believed that the movement was born in one of the informal meetings with close friends organized by May, Hughes and Gilmore. Such meetings began to be held regularly, and in order to attract other people who shared the interests and core values of the movement, an electronic mailing list called "Cypherpunk" was created. In a short time, she gained hundreds of subscribers who tested ciphers, exchanged ideas and discussed new developments. The correspondence was conducted using the latest encryption methods such as PGP.The group members had heated discussions on topics of politics and philosophy, which, combined with the study of computer science, cryptography and mathematics, led to the emergence of the Cypherpunk Manifesto. The document containing the main ideological provisions of this movement was published in 1993 by the aforementioned Eric Hughes.Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals. The manifesto emphasized that privacy and secrecy are not the same thing:Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world. The ideas of cypherpunks were subsequently implemented to one degree or another in cryptocurrencies. The mailing list included the creator of the Proof-of-Work algorithm Adam Back, the authors of the b-money proposals Wei Dai and Bitgold Nick Szabo, the movement had a significant impact on the creator of Zcash Zuko Wilcox. And it was in the cypherpunk mailing list in October 2008 that someone under the pseudonym Satoshi Nakamoto published the famous white paper "Bitcoin: A Digital Peer-to-Peer Cash System."4. A Declaration of the Independence of CyberspaceIn February 1996, the founder of the Electronic Frontier Foundation (EFF), John Perry Barlow, published an iconic document called A Declaration of the Independence of Cyberspace, which is still considered a classic of Internet libertarianism. The document consisted of harsh and unprincipled statements addressed to world governments and became a response to the Telecommunications Decency Act signed before this US President Bill Clinton, with the help of which the authorities tried to censor the Internet. Barlow's goal was to show that if states are still able to set limits on the dissemination of seditious ideas in traditional media, then on the World Wide Web they are powerless and such attempts are doomed to failure. He did not set the goal of "freeing the Internet", because the Internet was and remains free, and cyberspace has an innate immunity to supreme power.Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.
We have no elected government, nor are we likely to have one, so I address you with no greater authority than that with which liberty itself always speaks. I declare the global social space we are building to be naturally independent of the tyrannies you seek to impose on us. You have no moral right to rule us nor do you possess any methods of enforcement we have true reason to fear.
Governments derive their just powers from the consent of the governed. You have neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. Cyberspace does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions.
You have not engaged in our great and gathering conversation, nor did you create the wealth of our marketplaces. You do not know our culture, our ethics, or the unwritten codes that already provide our society more order than could be obtained by any of your impositions.
You claim there are problems among us that you need to solve. You use this claim as an excuse to invade our precincts. Many of these problems don't exist. Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract. This governance will arise according to the conditions of our world, not yours. Our world is different.
We will create a civilization of the Mind in Cyberspace. May it be more humane and fair than the world your governments have made before. Despite the fact that the act signed by Bill Clinton later in the same 1996 by a federal court decision was declared unconstitutional, the struggle of supporters and opponents of freedom on the Internet continues, and Barlow's "Declaration" will remain relevant for a long time. Governments continue to practice blocking resources, seizing servers, and even physical arrests to this day, but cyberspace has resisted that too. New encryption tools, anonymization and blocking bypass tools appear.5. Guerilla Open Access ManifestoTime is like water - it flows and changes. The history of the struggle for fundamental rights on the Internet confirmed this when in 2008 the world saw the Guerilla Open Access Manifesto, by Aaron Swartz.According to Schwartz's manifesto:Information is power. But like all power, there are those who want to keep it for themselves. The world's entire scientific and cultural heritage, published over centuries in books and journals, is increasingly being digitized and locked up by a handful of private corporations. Want to read the papers featuring the most famous results of the sciences? You'll need to send enormous amounts to publishers like Reed Elsevier.
"I agree," many say, "but what can we do? The companies hold the copyrights, they make enormous amounts of money by charging for access, and it's perfectly legal - there's nothing we can do to stop them." But there is something we can, something that's already being done: we can fight back.
But all of this action goes on in the dark, hidden underground. It's called stealing or piracy, as if sharing a wealth of knowledge were the moral equivalent of plundering a ship and murdering its crew. But sharing isn't immoral - it's a moral imperative. Only those blinded by greed would refuse to let a friend make a copy.
Large corporations, of course, are blinded by greed. The laws under which they operate require it - their shareholders would revolt at anything less. And the politicians they have bought off back them, passing laws giving them the exclusive power to decide who can make copies.
We need to take information, wherever it is stored, make our copies and share them with the world. We need to take stuff that's out of copyright and add it to the archive. We need to buy secret databases and put them on the Web. We need to download scientific journals and upload them to file sharing networks. We need to fight for Guerilla Open Access.
With enough of us, around the world, we'll not just send a strong message opposing the privatization of knowledge - we'll make it a thing of the past. Will you join us? Recently, it is often said that due to the coronavirus pandemic, life will never be the same again. This is probably partly true. But one thing will remain unchanged - the human need for basic rights and especially in the global network, where the main activity is now taking place. This means the inevitability of the emergence of new technologies, and with them - and new attempts by the state machine to crush them under itself.And the emergence of new manifestos outlining the agenda for the future is only a matter of time. However, they already appear.
sources: - http://phrack.org/issues/7/3.html#article - https://activism.net/cypherpunk/crypto-anarchy.html - https://forklog.com/ot-hakerov-i-shifropankov-do-zashhitnikov-svobody-v-onlajne-pyat-programmnyh-manifestov-interneta/ - https://www.activism.net/cypherpunk/manifesto.html - https://www.eff.org/cyberspace-independence - https://manifesto.ai/ - https://openaccessmanifesto.wordpress.com/guerilla-open-access-manifesto/ OriginalAchtung! Google Translate can give slightly, subtly different results on different runs; results are not guaranteed to be stable. Nonetheless, the text that I obtained (including several errors) is, in pertinent part, almost word-for-word identical to Ratimov’s copy. I, nullius, certify that the following text was copied by me from Google Translate, at the link hereby provided. From hackers and cypherpunks to online freedom advocates - the internet's five programming manifestos11/19/2020 • Andrew Asmakov #the Internet#cryptanarchism#hackers#cypherpunks According to a recent report by human rights organization Freedom House, the coronavirus pandemic has negatively impacted global internet freedom. For 10 years in a row, users have faced a general denial of their rights, a phenomenon contributing to the crisis of democracy around the world. Experts have identified three trends that indicate a decrease in the level of freedom on the Internet: - Governments are using the pandemic as an excuse to restrict access to information.
- Under the same pretext , powers are expanding to monitor and implement new technologies aimed at digitizing, collecting and analyzing personal data of people without adequate protection from abuse.
- The race of "cyber sovereignty" - countries introduce their own Internet rules to restrict the flow of information across national borders.
As you know, any action causes opposition. This is especially true for the Internet, for many of whose users the principles of free access to information and free expression are fundamental to the development of civil society and economic prosperity.The history of the world wide web is also the history of the struggle for basic human rights, the possibilities for achieving which have grown immeasurably with the development of technology.We have collected five of the most famous policy documents published on the network, which still remain relevant, including for cryptocurrency supporters.Hacker's manifestoThe first significant attempt to explain the philosophy of hackers was an essay, written in January 1986 and later published in the electronic journal Phrack, entitled " The Conscience of a Hacker." It was written by a Texas hacker named The Mentor, Loyd Blankenship .At the time of writing, often referred to as the "Hacker's Manifesto," Blankenship was only 20 years old and had been arrested by the FBI shortly before that. The reasons for the arrest are not fully known, Blankenship himself claimed that "he did nothing wrong - he just went into the computer, which he should not have entered." The most likely explanation is the participation of the essay author in the cult hacker group Legion of Doom , which is considered one of the most influential organizations of its kind in the history of technology and was most active between 1984 and 1991. Referring to the collective image of the world of adults, including teachers who think in familiar patterns, Blankenship writes:“You, with your three-element psychology and the tech brain of the 50s, have you ever looked a hacker in the eye? Have you ever wondered what makes it move, what forces have shaped it? "
“Today I made a discovery. I opened my computer. Wait a second ... that's great! He does what I want. If he makes a mistake, it's because I screwed up. Not because he doesn't like me ... Or he is intimidated by me ... Or thinks that I am too smart ... Or does not like to study and should not be here ... "
“You’re willing to swear with your ass that we are all the same. At school we were all spoon-fed baby food, while we wanted a steak ... Those pieces of meat that we got were chewed and tasteless. "
“Now this is our world ... The world of electrons and switches, the world of the beauty of baud. We use existing systems without paying for what could be cheaper than dirt if not run by dirty speculators and you call us criminals. We investigate and you call us criminals. We are looking for knowledge ... and you call us criminals. We exist without skin color, without nationality, without religious strife ... and you call us criminals. You build atomic bombs, you unleash wars, you kill, you cheat and lie to us, trying to make us believe that all this is for our own good. "
“Yes, I'm a criminal. My crime is curiosity. My crime is that I judge people not by how they look, but by what they say and think. My crime is that I am much smarter than you. This is something that you will never forgive me.
“I'm a hacker. And this is my manifesto. You can stop one of us, but you cannot stop us all ... after all, we are all the same. " Blankenship's work is often referred to as the beginning of a story of confrontation between online activists and the real world in general, which later grew into a struggle with governments. She was also noted by the creators of the film "Hackers" with Angelina Jolie in one of the roles, including an excerpt from the revised edition of "Manifesto". [Youtube embed screenshotted by Ratimov for the forum]Loyd Blankenship on the history of the Hackers Manifesto. H2K2 conference in 2002.Blankenship himself later worked for the Austin-based company Steve Jackson Games , which develops tabletop role-playing and card games. He was the author of GURPS Cyberpunk , a set of rules for cyberpunk worlds that the US Secret Service removed from the company's office in 1990 after a raid, calling it "a guide for cybercriminals." In 2014, after working as a programmer, technical writer and game designer at various companies, Blankenship became a private security consultant, and since 2016, according to his LinkedIn profile , he has been working at McAfee, where he leads the department of user interface design for applications and enterprise products. ... Cryptanarchist manifestoIn the 1970s, when the first working prototypes of the Internet appeared, the issue of protecting data in an open environment became relevant.In 1978, American cryptographer David Chaum developed a blind digital signature - a public key encryption model. It allowed the creation of a database of people who could remain anonymous, while guaranteeing the reliability of the information they reported about themselves.Chaum also dreamed of digital voting, the process of which could be verified without revealing the identity of the voter, but primarily digital cash.In the mid-1980s, he was able to create a model in which users made payments while maintaining anonymity and guaranteeing the reality of funds. On the basis of these developments, the movement of cryptographers was born who advocated computer technology as a means of destroying the state.The main ideologist of this movement was the former leading researcher at Intel Timothy May .Timothy MayInspired by Chaum's 1985 paper "Security Without Identity: A Transactional System That Will Make Big Brother Anachronistic," which described a system that cryptographically obscures the customer's identity, May set about exploring public key cryptographic security. He was firmly convinced that, when combined with networked computing, this technology could "destroy the structures of social power."In 1988, May published The Cryptanarchist Manifesto , an essay he wrote based on Karl Marx's Communist Manifesto:"A ghost wanders the modern world, the ghost of cryptanarchy." It says that information technology will allow people to manage their lives without governments, but through cryptography, digital currencies and other decentralized tools. The anonymity these tools bring should be a catalyst for profound social change.“Computer technology has come very close to providing individuals or groups of people with the ability to communicate and interact completely anonymously ... This will completely change the nature of government regulation, the ability to collect taxes and control economic interaction, the ability to keep information secret and even change the nature of trust and reputation. "- wrote Timothy May. According to May, the ideological foundation of the Cryptanarchist Manifesto was anarcho-capitalism, a form of anarchism that emphasizes voluntary transactions and the free market.His essay was partly a source of inspiration for the first prototypes of Bitcoin, and many cryptocurrency proponents consider Timothy May to be one of those people who made a huge contribution to its ideological foundation.However, in 2018, when it was 10 years since the publication of the Bitcoin white paper , May stated that, observing what was happening, he experienced "some interest, a certain surprise and great disappointment", and that "Satoshi would vomit" if he saw all hype and screaming to the heavens and HODL, as well as ever tighter regulation.“I don’t know how Satoshi wanted his creation, but I don’t think his vision included cryptocurrency exchanges with their draconian identity verification and anti-money laundering laws, account freezes and mandatory cooperation with intelligence agencies on the subject of“ suspicious activity ”. It is highly likely that all this chatter about governance, regulation and blockchain will result in the creation of a society of total supervision and control, where everyone will have a personal file, ”Timothy May said then. In his opinion, attempts to "befriend" regulators are likely to kill the key use cases for cryptocurrencies, which should not be variations on PayPal or Visa.Timothy May coined the term "Four Horsemen of the Infocalypse" , which refers to drug trafficking, money laundering, terrorism and pedophilia, used by governments to intimidate and justify restrictions on cryptography and, as a result, restrictions on privacy and anonymity. In December 2018, at the age of 66, Timothy May died of natural causes at his California home. Cypherpunk ManifestoTimothy May also pioneered the cypherpunk movement, which he founded in 1992 with John Gilmore and Eric Hughes to champion the ideals of privacy and technology openness. It is believed that the movement was born in one of the informal meetings with close friends organized by May, Hughes and Gilmore.Such meetings began to be held regularly, and in order to attract other people who shared the interests and core values of the movement, an electronic mailing list called "Cypherpunk" was created. In a short time, she gained hundreds of subscribers who tested ciphers, exchanged ideas and discussed new developments. The correspondence was conducted using the latest encryption methods such as PGP.The group members had heated discussions on topics of politics and philosophy, which, combined with the study of computer science, cryptography and mathematics, led to the emergence of the Cypherpunk Manifesto . A document containing the main ideological provisions of this movement was published in 1993 by the aforementioned Eric Hughes .“Cypherpunks write code. We know that someone has to keep writing code to protect information, and since we see no other way to protect our data, we keep writing code. […] Our code is available to anyone on earth. We don't care too much that some people don't like what we do. We know that our programs cannot be destroyed, and the growing network cannot be stopped. "
“Confidentiality is essential for an open society in the digital age. […] Confidentiality in an open society requires the use of cryptography. […] We cypherpunks are called to create anonymous systems. We protect our privacy with cryptography, anonymous email forwarding systems, digital signatures, and electronic money. [...] Cryptography will inevitably spread throughout the world, and with it the systems of anonymous transactions that it makes possible. " The manifesto emphasized that privacy and secrecy are not the same thing.“A private matter is something that, in the opinion of a person, the whole world does not need to know, and no one should know about a secret matter at all. Privacy is the ability to choose what information about yourself to reveal to the world. " Eric Hughes The ideas of cypherpunks were subsequently implemented to one degree or another in cryptocurrencies. The mailing list included the creator of the Proof-of-Work algorithm Adam Back , the authors of the b-money proposals Wei Dai and Bitgold Nick Szabo , the movement had a significant impact on the creator of Zcash Zuko Wilcox .And it was in the cypherpunk mailing list in October 2008 that someone under the pseudonym Satoshi Nakamoto published the famous white paper "Bitcoin: A Digital Peer-to-Peer Cash System."Cyberspace Declaration of IndependenceIn February 1996, the founder of social organization Electronic Frontier Foundation (EFF) , John Perry Barlow published a cult document entitled "Declaration of Independence of Cyberspace» (A Declaration of the Independence of Cyberspace), and today is considered a classic of Internet libertarianism.The document consisted of harsh and unprincipled statements addressed to world governments and became a response to the Telecommunications Decency Act, signed before this US President Bill Clinton, with the help of which the authorities tried to censor the Internet.Barlow's goal was to show that if states are still able to set limits on the dissemination of seditious ideas in traditional media, then on the World Wide Web they are powerless and such attempts are doomed to failure. He did not set the task of "freeing the Internet" because the Internet was and remains free, and cyberspace has an innate immunity to supreme power.<<<vimeo video>>>
“Governments of the Industrial World, you are weary giants of flesh and steel; my Motherland is Cyberspace, the new home of Consciousness. On behalf of the future, I ask you, who have everything in the past, - leave us alone. You are superfluous among us. You do not have supreme authority where we are gathered. "
“We did not choose a government, and it is unlikely that we will ever have one, so I appeal to you, having a power not greater than the one with which freedom itself speaks. I declare that the global public space we are building is by nature independent of the tyranny you seek to impose on us. You have neither a moral right to rule over us, nor methods of coercion that could really frighten us. "
“Governments are truly empowered by the consent of those they rule. […] You declare that we have problems for you to solve. […] Many of these problems do not exist. Where there are real conflicts and shortcomings, we will identify and eliminate them by our own means. We establish our own Social Contract. This mode of government will arise according to the conditions of our world, not yours. Our world is different. "
“You are terrified of your own children, because they feel at home in a world in which you will always be immigrants. Because you are afraid of them, you cowardly shift your parenting responsibilities to the bureaucratic apparatus. […] Your increasingly obsolete information industry would like to perpetuate its dominance by pushing laws - both in America and elsewhere - requiring ownership of speech itself around the world. "
“These increasingly hostile colonial measures put us in a position in which the adherents of freedom and self-determination found themselves in their time, forced to reject the authority of a remote uniform power. We must declare the freedom of our virtual selves from your dominion, even if we agree that you continue to dominate our bodies. We will spread our "I" throughout the planet so that no one can arrest our thoughts. "
“We will create a civilization of Consciousness in Cyberspace. Let it be more humane and honest than the world that your governments have created before. " Despite the fact that the act signed by Bill Clinton later in the same 1996 by a federal court decision was declared unconstitutional, the struggle of supporters and opponents of freedom on the Internet continues, and Barlow's "Declaration" will remain relevant for a long time.Governments continue to practice blocking resources, seizing servers, and even physical arrests to this day, but cyberspace has resisted that too. New encryption tools, anonymization and blocking bypass tools appear.“I’m completely free to talk to Edward Snowden anytime I want, even though the NSA guys would like to know when and what we’re talking about,” John Barlow told Wired in 2016 , calling it further proof that governments from the physical world have no real power on the internet. On February 7, 2018, John Barlow, who also wrote the lyrics for the legendary rock band Grateful Dead, died at the age of 70 at his San Francisco home. As Wired tech reporter Stephen Levy wrote in an obituary, the "bard of the internet" is gone. The guerrilla manifesto on open accessTime is like water - it flows and changes. The history of the struggle for fundamental rights on the Internet confirmed this when in 2008 the world saw Aaron Schwartz's “Guerrilla Manifesto on Open Information” .[Youtube embed screenshotted by Ratimov for the forum]According to Schwartz's manifesto:“Information is power. But, as is usually the case with power, there are those who want to have it alone. The entire world scientific and cultural heritage, published over the centuries in various books and magazines, is rapidly being digitized and hidden from prying eyes by a handful of private corporations. "
“I agree,” many say, “but what can we do? The companies own the copyrights and make a lot of money. And this is completely legal. There is no way we can stop them. "
“But all of this is happening in a dark underground. This is called theft or piracy. […] But sharing information is not immoral. This is a moral imperative. Only those blinded by greed do not agree with this. "
“Big corporations are undoubtedly blinded by greed. This is required by the laws according to which they function. Their shareholders will rise up if profits are missing. And politicians bought by corporations cover them up, inventing the laws they need. "
“We need to take information, wherever it is stored, make copies of ourselves and share them with the world. We need to take materials that are not copyrighted and add them to the archive. We need to buy secret databases and make them freely available. We need to download scientific journals and upload them to file-sharing networks. We must fight for Guerrilla Open Access.
"With enough of us around the world, we will not only send a compelling message against the privatization of knowledge, we will leave this system in the past." Born in 1986 in Chicago, Schwartz lived a short but extremely vibrant life, bursting, like Jim Morrison in the 1960s, on the other side of the information space. Already at the age of 14, he became a co-author of the RSS 1.0 specification, after which he worked under the guidance of the creator of the Internet Tim Berners-Lee at W3C. Schwartz got into the first program at Y Combinator with startup Infogami, which later merged with the popular site Reddit and later worked on projects such as Open Library, Creative Commons, and watchdog.net. Another contribution of the Internet legend is the creation of Deaddrop, later renamed SecureDrop , a platform for anonymous information leakage , which is used by the world's largest media. The list of projects to which Schwartz had a hand is endless. On January 11, 2013, at the age of 26, Aaron Schwartz committed suicide. Shortly before that, he was charged with hacking into the computer network of the Massachusetts Institute of Technology (MIT), on the aggregate of which he could face up to 35 years in prison. ***** Recently, it is often said that due to the coronavirus pandemic, life will never be the same. This is probably partly true. But one thing will remain unchanged - the human need for basic rights, and especially in the global network, where the main activity is now taking place.This means the inevitability of the emergence of new technologies, and with them - and new attempts by the state machine to crush them under itself.And the emergence of new manifestos outlining the agenda for the future is only a matter of time. However, they are already appearing .Subscribe to ForkLog news in Telegram: ForkLog FEED - the entire news feed, ForkLog - the most important news and polls. #the Internet #cryptanarchism #hackers #cypherpunks
|