On 30 April 1993, CERN put the World Wide Web software in the public domain. Later, CERN made a release available with an open licence, a more sure way to maximise its dissemination. These actions allowed the web to flourish.
Archiv: invention of the World Wide Web by Tim Berners-Lee at CERN put public domain on 30 April 1993
Electronic colonialism
Electronic colonialism or digital colonialism, sometimes abbreviated to eColonialism, was conceived by Herbert Schiller as documented in his 1976 text Communication and Cultural Domination.[1] In this work, Shiller postulated the advent of a kind of technological colonialism, a system that subjugates Third World and impoverished nations to the will of world powers such as the United States, Japan, and Germany, given the necessary „importation of communication equipment and foreign-produced software“.[2] As scholarship on this phenomenon has evolved, it has come to describe a scenario in which it has become normal for people to be exploited through data and other forms of technology.[3] It draws parallels to colonialism in the historical sense when territories and resources were appropriated by the wealthy and powerful for profit.
ESnet: The 100-gigabit shadow internet that only the US government has access to
(October 20, 2014)
One day, as I surfed the web on my laptop and lamented how long it takes a YouTube video to load, I found myself wondering if employees of the US government — DoD researchers, DoE scientists, CIA spies — are also beholden to the same congestion and shoddy peering that affects everyone else on the internet. Surely, as hundreds of scientists at Fermi Lab near Chicago wait for petabytes of raw data to arrive from the Large Hadron Collider in Europe, they don‘t suffer interminable connection drops and inexplicable lag. And, as it turns out, they don‘t: the US government and its national laboratories all have exclusive access to ESnet — a shadow internet that can sustain 100-gigabits-per-second transfers between any of the major Department of Energy labs. And today, the DoE announced that the 100-gigabit ESnet will be extended across the Atlantic to our Old World comrades, who occasionally manage to dazzle us with their scientific endeavors.
British Government launches secure intranet
(Feb 5 2004)
The Government Secure Intranet (GSi) project means that central and local Government employees will have restricted access to email, internet, remote working and a regularly updated central directory.
Government Secure Intranet
Government Secure Intranet (GSi) was a United Kingdom government wide area network, whose main purpose was to enable connected organisations to communicate electronically and securely at low protective marking levels. It was known for the ‚.gsi.gov.uk‘ family of domains for government email. Migration away from these domains began in 2019[1] and will be completed in 2023.
Electronic colonialism
Electronic colonialism or digital colonialism, sometimes abbreviated to eColonialism, was conceived by Herbert Schiller as documented in his 1976 text Communication and Cultural Domination.[1] In this work, Shiller postulated the advent of a kind of technological colonialism, a system that subjugates Third World and impoverished nations to the will of world powers such as the United States, Japan, and Germany, given the necessary „importation of communication equipment and foreign-produced software“.[2] As scholarship on this phenomenon has evolved, it has come to describe a scenario in which it has become normal for people to be exploited through data and other forms of technology.[3] It draws parallels to colonialism in the historical sense when territories and resources were appropriated by the wealthy and powerful for profit.
The UK Government Knows How Extreme The Online Safety Bill Is
The bill would empower the U.K. government, in certain situations, to demand that online platforms use government-approved software to search through all users’ photos, files, and messages, scanning for illegal content. Online services that don’t comply can be subject to extreme penalties, including criminal penalties.
What‘s happening in Parliament next week?
Main debate: MPs consider Lords amendments to the extensively paused and re-written Online Safety Bill.
(…)
The government now says that the tech regulator, Ofcom, would only require companies to scan their networks for harmful material, like child sexual abuse and exploitation content, when a technology was developed that was capable of doing so – thus kicking the issue into the very long grass.
Signal will leave the UK if the current version of the Online Safety Bill becomes law, says the company’s president
(01.09.2023)
„You know, the long-standing technical consensus, and this goes back before the 90s, but really flared up in the 90s during the first iteration of what we call the crypto wars, where you had the US government wanting backdoors into encryption algorithms. And the vast majority, I would say, of the technical community showing over and over again that technologically, you cannot have it both ways. You cannot have a backdoor that only the good guys can access. Either it’s broken for everyone, or it works to preserve meaningful privacy.“
The birth of the Web
On 30 April 1993, CERN put the World Wide Web software in the public domain. Later, CERN made a release available with an open licence, a more sure way to maximise its dissemination. These actions allowed the web to flourish.
DNS for dummies – a basic understanding
The Domain Name System (DNS) is like a phone book, in that it is a naming system which translates human recognisable domain names into IP addresses to locate devices across the internet.
Remarks on “Chat Control”
(March 23, 2023)
I am a professor of computer science and a researcher in the field of applied cryptography. On a day-to-day basis this means that I work on the design of encryption systems. Most of what I do involves building things: I design new encryption systems and try to make existing encryption technologies more useful.
Sometimes I and my colleagues also break encryption systems. I wish I could tell you this didn’t happen often, but it happens much more frequently than you’d imagine, and often in systems that have billions of users and that are very hard to fix. Encryption is a very exciting area to work in, but it’s also a young area. We don’t know all the ways we can get things wrong, and we’re still learning.