Phi Beta Iota: While funded by a cabal front, the Rockefeller Foundation, they are dealing with three important issues: improving transport options including at the micro-level (e.g. shared bicycles); protecting pedestrian access and routes; and protecting privacy (e.g. from Uber sharing).
Charles (Chas) Holloway is an American writer, publisher and public speaker. He is the creator of Open Source Government and is noted for developing fundamental scientific concepts in that field.
Mr. Holloway is the author of two books: The End: The Fall of the Political Class, and Breakout: Blockchain Vs. the Nation State (forthcoming), which are book’s one and two in the Open Source Government series.
Emin Gun Sirer:Good post [by David Rosenthal] on why peer to peer storage projects face an uphill battle, which will likely end downhill, in Amazon's lap.
Full text of post below the line as a safety copy.
The following is a layered description of vTaiwan over four messages: In this, the first post, you’ll find an introduction (a 1 minute read) followed by a 3-minute overview. In the second post I offer you eleven brief “Notes on Aspects of the vTaiwan Phenomenon” (probably a 10-15 minute read). In the third post, I describe two early examples of the work done by vTaiwan and its associated hacktivist community, g0v (gov-zero). In the last post I share some of the best links I’ve worked with (including video conversations I’ve had with vTaiwan’s remarkable calm center, Audrey Tang), on which you can spend 5 minutes or 5 days or more if you wish to delve into the topic in more depth….
The American Chemical Society (ACS) has won a lawsuit it filed in June against Sci-Hub, a website providing illicit free access to millions of paywalled scientific papers.
According to the last Internet Organised Crime Threat Assessment (IOCTA) recently published by EUROPOL – the European Union’s law enforcement agency – there is an increasing convergence between cybercrime and terrorism. Indeed, “Terrorists are becoming increasingly proficient in hiding their traces and activities by using anonymising and encryption tools and services » such as Tor available on the cybercrime market. Another trend highlighted by EUROPOL is the increasing use social media platforms by terrorist groups “to engage in recruitment campaigns, propaganda, incitement of terror acts and for claiming responsibility for attack”. In order to address these challenges, the EU law enforcement agency recommends Member States to “increase their OSINT capacity in order to monitor the development of new technologies that have potential for abuse by terrorists and which have already been adopted, and to proactively monitor social media to detect early patterns of radicalisation”.