Politics

NSA Red Hat Linux 5 Hardening Tips

Download Full Pamphlet (PDF)| Source Notes: These is great to see, this could be woven into as a part of a distribution, that would go through these as a part of the installation or post-installation process in a graphic user

/ Comments Off on NSA Red Hat Linux 5 Hardening Tips

NSA Red Hat Linux 5 Hardening Tips

Download Full Pamphlet (PDF)| Source Notes: These is great to see, this could be woven into as a part of a distribution, that would go through these as a part of the installation or post-installation process in a graphic user

/ Comments Off on NSA Red Hat Linux 5 Hardening Tips

NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5

Download Full Text (PDF)

/ Comments Off on NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5

NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5

Download Full Text (PDF)

/ Comments Off on NSA Guide to the Secure Configuration of Red Hat Enterprise Linux 5

Saving High-Tech Innovators from Egregious Legal Disputes Act of 2013

Notes: This bill aims to make it more expensive for non-practicising parties to file egregious lawsuits by making it more expensive to lose as a plaintiff, and thus would file only ones that they are confident to win. This seems

/ Comments Off on Saving High-Tech Innovators from Egregious Legal Disputes Act of 2013

Saving High-Tech Innovators from Egregious Legal Disputes Act of 2013

Notes: This bill aims to make it more expensive for non-practicising parties to file egregious lawsuits by making it more expensive to lose as a plaintiff, and thus would file only ones that they are confident to win. This seems

/ Comments Off on Saving High-Tech Innovators from Egregious Legal Disputes Act of 2013

Application Privacy, Protection and Security Act of 2013

Notes: This bill makes it a requirement for applications to require consent from users before collecting personal information, and requires developers to delete personal data upon request. The language about securing information from a security breach is vague, “reasonable and

/ Comments Off on Application Privacy, Protection and Security Act of 2013

Application Privacy, Protection and Security Act of 2013

Notes: This bill makes it a requirement for applications to require consent from users before collecting personal information, and requires developers to delete personal data upon request. The language about securing information from a security breach is vague, “reasonable and

/ Comments Off on Application Privacy, Protection and Security Act of 2013

Free The Hackers

remix of freegeek, portland – 5 by detritus / cc-by-nc-sa

/ Comments Off on Free The Hackers

Free The Hackers

remix of freegeek, portland – 5 by detritus / cc-by-nc-sa

/ Comments Off on Free The Hackers

PDX Reporter Source Code

Sources: PDX Reporter app for Android | Source Code: pdxandroidapp

/ Comments Off on PDX Reporter Source Code

PDX Reporter Source Code

Sources: PDX Reporter app for Android | Source Code: pdxandroidapp

/ Comments Off on PDX Reporter Source Code

NSL Ruled Unconstitutional

Source: Operation Privacy Invasion by Braydon.com | Read Ruling

/ Comments Off on NSL Ruled Unconstitutional

NSL Ruled Unconstitutional

Source: Operation Privacy Invasion by Braydon.com | Read Ruling

/ Comments Off on NSL Ruled Unconstitutional

Federal Judge Finds National Security Letters Unconstitutional

130610269-NSL-Order (Download PDF) | Source: Federal Judge Finds National Security Letters Unconstitutional, Bans Them

/ One Comment

Federal Judge Finds National Security Letters Unconstitutional

130610269-NSL-Order (Download PDF) | Source: Federal Judge Finds National Security Letters Unconstitutional, Bans Them

/ One Comment

EFF NSL Challenge

EFF-NSL-challenge (Download PDF) | Source: Wired: Federal Judge Finds National Security Letters Unconstitutional, Bans Them

/ Comments Off on EFF NSL Challenge

EFF NSL Challenge

EFF-NSL-challenge (Download PDF) | Source: Wired: Federal Judge Finds National Security Letters Unconstitutional, Bans Them

/ Comments Off on EFF NSL Challenge

Software Patent Woes

Download “Response to USPTO Silicon Valley Roundtable Event for the Enhancement of Quality of Software-Related Patents on February 12th, 2013 (PDF)”

/ Comments Off on Software Patent Woes

Software Patent Woes

Download “Response to USPTO Silicon Valley Roundtable Event for the Enhancement of Quality of Software-Related Patents on February 12th, 2013 (PDF)”

/ Comments Off on Software Patent Woes

Open PACER Act

View Bill

/ Comments Off on Open PACER Act

Open PACER Act

View Bill

/ Comments Off on Open PACER Act

404 Not Found

Read More

/ Comments Off on 404 Not Found

404 Not Found

Read More

/ Comments Off on 404 Not Found

Kamala D. Harris v. Shared Secret Software at Pratibha

Download Complaint ( PDF – 11 pages ) | View Press Release

/ Comments Off on Kamala D. Harris v. Shared Secret Software at Pratibha

Kamala D. Harris v. Shared Secret Software at Pratibha

Download Complaint ( PDF – 11 pages ) | View Press Release

/ Comments Off on Kamala D. Harris v. Shared Secret Software at Pratibha

Kamala D. Harris v. Shared Secret Software at Ningbo

Download Complaint ( PDF – 11 pages ) | View Press Release

/ Comments Off on Kamala D. Harris v. Shared Secret Software at Ningbo

Kamala D. Harris v. Shared Secret Software at Ningbo

Download Complaint ( PDF – 11 pages ) | View Press Release

/ Comments Off on Kamala D. Harris v. Shared Secret Software at Ningbo

Does the California Public Records Act apply to Corporations that work inside the Government?

Read More

/ Comments Off on Does the California Public Records Act apply to Corporations that work inside the Government?

Does the California Public Records Act apply to Corporations that work inside the Government?

Read More

/ Comments Off on Does the California Public Records Act apply to Corporations that work inside the Government?

Response to United States Senator Dianne Feinstein: Facebook & Twitter

Read More | Download PDF ( 15 Pages )

/ Comments Off on Response to United States Senator Dianne Feinstein: Facebook & Twitter

Response to United States Senator Dianne Feinstein: Facebook & Twitter

Read More | Download PDF ( 15 Pages )

/ Comments Off on Response to United States Senator Dianne Feinstein: Facebook & Twitter

Los Angeles Feasibility Study Completed by LA WiFi Working Group from 2009

Download: Los Angeles City Report on WiFi (pdf) Via: LaCity.org  

/ Comments Off on Los Angeles Feasibility Study Completed by LA WiFi Working Group from 2009

Los Angeles Feasibility Study Completed by LA WiFi Working Group from 2009

Download: Los Angeles City Report on WiFi (pdf) Via: LaCity.org  

/ Comments Off on Los Angeles Feasibility Study Completed by LA WiFi Working Group from 2009

Software Patent Roundtable

Source: Request for Comments and Notice of Roundtable Events for Partnership for Enhancement of Quality of Software-Related Patents

/ 3 Comments

Software Patent Roundtable

Source: Request for Comments and Notice of Roundtable Events for Partnership for Enhancement of Quality of Software-Related Patents

/ 3 Comments

A Revolution Online

Source: Braydon Fuller: Software and Governments: Portland City Hall

/ Comments Off on A Revolution Online

A Revolution Online

Source: Braydon Fuller: Software and Governments: Portland City Hall

/ Comments Off on A Revolution Online

Aaron Swartz

Aaron’s funeral will be held on Tuesday, January 15 at Central Avenue Synagogue, 874 Central Avenue, Highland Park, Illinois 60035 rememberaaronsw.com

/ Comments Off on Aaron Swartz

Aaron Swartz

Aaron’s funeral will be held on Tuesday, January 15 at Central Avenue Synagogue, 874 Central Avenue, Highland Park, Illinois 60035 rememberaaronsw.com

/ Comments Off on Aaron Swartz

overlap of software and governments; public versus private ownership

location: portland city hall / video directed by mary eng transcript: hello my name is braydon fuller, aka braydon.com, and i am here today as a representative of postsoftware.org to talk about the intersection between software and government, the internet video

/ Comments Off on overlap of software and governments; public versus private ownership

overlap of software and governments; public versus private ownership

location: portland city hall / video directed by mary eng transcript: hello my name is braydon fuller, aka braydon.com, and i am here today as a representative of postsoftware.org to talk about the intersection between software and government, the internet video

/ Comments Off on overlap of software and governments; public versus private ownership

overlap of software and governments; public versus private ownership

Source: Portland Council Agenda / Sampled image is by Cacophony

/ Comments Off on overlap of software and governments; public versus private ownership

overlap of software and governments; public versus private ownership

Source: Portland Council Agenda / Sampled image is by Cacophony

/ Comments Off on overlap of software and governments; public versus private ownership

Free Culture: Purity and Diversity of Language

Artwork by Braydon.com / Sampled image is public domain.

/ One Comment

Free Culture: Purity and Diversity of Language

Artwork by Braydon.com / Sampled image is public domain.

/ One Comment

Reauthorization

Source of News: EFF / Artwork is Copyleft by Braydon.com / Photography by Product Etcetera

/ Comments Off on Reauthorization

Reauthorization

Source of News: EFF / Artwork is Copyleft by Braydon.com / Photography by Product Etcetera

/ Comments Off on Reauthorization

The Intersection of the 4th Amendment and Computing

Sources: Senator Rand Paul Discusses FISA Amendment / Rand Paul: Sen. Paul Introduces Fourth Amendment Protection Act I rise today in support of the Fourth Amendment Protection Act. The Fourth Amendment guarantees the right of the people to be secure in

/ Comments Off on The Intersection of the 4th Amendment and Computing

The Intersection of the 4th Amendment and Computing

Sources: Senator Rand Paul Discusses FISA Amendment / Rand Paul: Sen. Paul Introduces Fourth Amendment Protection Act I rise today in support of the Fourth Amendment Protection Act. The Fourth Amendment guarantees the right of the people to be secure in

/ Comments Off on The Intersection of the 4th Amendment and Computing

Letter to Anakata

Thank you very much for this! It is not this kind of news available at TV here… Gottfrid/through Kristina (He is fine but kept in solitary confinement until yesterday, Dec 7th. No electronic devices at all, just pencil & paper.

/ Comments Off on Letter to Anakata

Letter to Anakata

Thank you very much for this! It is not this kind of news available at TV here… Gottfrid/through Kristina (He is fine but kept in solitary confinement until yesterday, Dec 7th. No electronic devices at all, just pencil & paper.

/ Comments Off on Letter to Anakata

byzantium

byzantium / artwork by braydon.com / cc-by-sa / original

/ 4 Comments

byzantium

byzantium / artwork by braydon.com / cc-by-sa / original

/ 4 Comments

free the internet

article via theguardian / artwork by braydon.com / cc-by-sa / original

/ Comments Off on free the internet

free the internet

article via theguardian / artwork by braydon.com / cc-by-sa / original

/ Comments Off on free the internet

anti-facebook

Recently Found Posts: Life of Frank: Facebook = Why Bother? Daina’s Book: Anti-facebook

/ 3 Comments

anti-facebook

Recently Found Posts: Life of Frank: Facebook = Why Bother? Daina’s Book: Anti-facebook

/ 3 Comments

city hall projection opera

Via: the occupied zone – episode 9 “collateral murder opera”

/ Comments Off on city hall projection opera

city hall projection opera

Via: the occupied zone – episode 9 “collateral murder opera”

/ Comments Off on city hall projection opera