Free Skool:Summer 2013

From Anarchy In Action
Note: When editing, please sign entries with ~~~~ or click Toolbar-signature.png in the WikiEditor. This will add your username and the time/date.

Free Skool, Free Software: Beyond Open Source

  • The focus of this class will be empowerment through free software.
  • We'll need a quick overview of wiki editing as well, so that we can use this wiki for collaboration.
  • The facilitators will hammer home the importance of freedom, openness, and the role of FOSS (free/open-source software) in building and maintaining a free Web.

Class Description

Free software (commonly called “open source”) is in most of our pockets, in the mutant forms of Android and iOS. The conflict between human freedom and software surveillance is more real than ever. The dual nature of this technology, and technology in general, presents a challenge for activists, educators, and everyone. Learn about free (as in freedom) software, its history, and what you can do to empower and protect yourself with it.

Time and Location

Classes take place Wednesdays 5:00pm to 6:00pm EST, July 17 thru August 28 at The People's Arts Collective of New Haven:

212 College St, New Haven, CT 06511

Optionally, after class sessions can be scheduled, preferably somewhere with beer and the Internet.

Signing Up

There are a few ways to do this, there's a signup sheet at the Free Skool website, but it requires giving your information to Google via Google Docs. You can also just contact the facilitators (listed below) directly, or just show up. Classes are typically 13-16 people, but we have room for (maybe) 20 people and will try to make computers available for participants upon request.

Facilitator

Sean "Diggity" O'Brien

me@seandiggity.com or sean@webio.me

Participants

  • List will go here, if you want your name published!
  • Please consider joining Foojbook, which will make communication much smoother.
Cyberwar?

Class Outline

Session 1

July 17, 2013

FOSS Overview

Video

Readings

Freedom Tips

  1. Block ads and browse the Web more securely.
  2. Take a look at all the FOSS operations systems out there.

Session 2

July 24, 2013

Readings

Videos

Freedom Tips

  1. Take a few minutes and browse these browser addons to stop tracking.
  2. Make sure you check out PRISM Break and try the FOSS alternatives there, or see our list

Session 3

July 31, 2013

  • Loose discussion about XKeyscore, another deeply troubling NSA program revealed today.
  • XKeyscore queries, in real time, "strong selectors" such as email, or "soft selectors" such as content. It can look for "anomalies", without any specific person attached, such as a person speaking a foreign language, using encryption, or unidentified protocols/software.
  • NSA hearing cancelled

Readings

Videos

Freedom Tips

  1. Don't forget how close the links are between "hacktivism" and movements like Occupy.
  2. Does Linux = Anarchy? It's been called "practical anarchism".

Session 4

Aug 7, 2013

  • More discussion about the latest NSA/Snowden news.
  • Business report says NSA spying could cost billion dollar losses to U.S. "cloud" industry.
  • "Cloud computing" pushes most of what you would normally do on your own machine (e.g. computer, phone) to another machine (server). Web browsers and "thin apps" (software "wrappers" that run mostly on another machine somewhere on the Internet) are quickly removing our options for running our own software (app stores!).
  • Although this diagram uses some complex terms, it clearly shows the role of our computers in the Brave New Cloud World: running a Web browser, as a thin client, etc. (and therefore losing control to whoever owns the servers).
  • The Cloud is a trap. We need to ask, Who does that server really serve?

Readings

Videos

Freedom Tips

  1. Take a minute to learn how the Internet works, or at least the way most of it has for the past 10-20 years.
  2. Now take three minutes to learn how cloud computing is changing all that.

Session 5

Aug 14, 2013

Videos

Readings

Freedom Tips

Session 6

Aug 21, 2013

Readings

  • Linux in 2013: Zemlin said that each day some 10,519 lines of code are added to the Linux kernel, while another 6,782 lines are subtracted from it. All told, the kernel averages around 7.38 changes per hour – a phenomenal rate for any code base.
Zemlin went on to liken Linux to a multi-million dollar R&D project, on which over 400 companies collaborate – some of which, at the same time, are fierce competitors. "This incredible platform is now more than just an operating system. Linux is really now becoming a fundamental part of society – one of the greatest shared technology resources known to man," Zemlin said. He added, "I mean, it runs all of our stock markets, most of our air-traffic control systems, internet, phones, you name it ... most of the world's telecommunications systems ... this is really now beyond a movement and an operating system, this is now this real, shared, societal, important piece of work.

Video

Freedom Tips

  1. We're not the only ones doing free community classes. Check out Skillshares and Trainings from NEanarchists on Crabgrass
  2. Take a look at one of these LiveCD/USB images to achieve real communications privacy. Learn how to use a Live image here.

Session 7

Aug 28, 2013

Readings

"Safe privacy is an important component of autonomy, freedom, and thus psychological well-being, in any society that values individuals. ... But if we describe a standard for treating people humanely, why does stripping privacy violate it? And what is privacy? In his landmark book, Privacy and Freedom, Alan Westin names four states of privacy: solitude, anonymity, reserve, and intimacy. The reasons for valuing privacy become more apparent as we explore these states. ...
The essence of solitude, and all privacy, is a sense of choice and control. You control who watches or learns about you. You choose to leave and return. ... Intimacy is a private state because in it people relax their public front either physically or emotionally or, occasionally, both. They tell personal stories, exchange looks, or touch privately. They may ignore each other without offending. They may have sex. They may speak frankly using words they would not use in front of others, expressing ideas and feelings -- positive or negative -- that are unacceptable in public. (I don't think I ever got over his death. She seems unable to stop lying to her mother. He looks flabby in those running shorts. I feel horny. In spite of everything, I still long to see them. I am so angry at you I could scream. That joke is disgusting, but it's really funny.) Shielded from forced exposure, a person often feels more able to expose himself."

Freedom Tips

  1. Terms of Service; Didn't Read is a solution to the problem of long, tedious, ridiculous ToS text. Install the addon and get instant info about the terms and privacy policies of websites you browse!
  2. Still not sure what Bittorrent is? Familiarize yourself with it through this great paper, Why My Printer Received a DMCA Takedown Notice.

Class Materials

Did you know you can "roll your own" PDF from any page(s) of this site by clicking Print/export > Download as PDF in the sidebar?

More Resources

  • Links to all kinds of cool (and helpful!) stuff.

Libre Recommendations

Videos

Readings

Wiki Editing Help

Tips on editing this wiki.