User:Pedro Sá Couto/Graduate Research Seminar/Thesis Outline 05: Difference between revisions
(7 intermediate revisions by the same user not shown) | |||
Line 6: | Line 6: | ||
==Thesis Statement== | ==Thesis Statement== | ||
<br> | |||
Communities need places to publish anonymously, to feel safe and feel represented. How is censorship influencing who gets to publish? How can publishing bypass surveillance? What are the alternative forms of communication that can be built to subvert surveillance in physical and digital media files? | Communities need places to publish anonymously, to feel safe and feel represented. How is censorship influencing who gets to publish? How can publishing bypass surveillance? What are the alternative forms of communication that can be built to subvert surveillance in physical and digital media files? | ||
Line 15: | Line 14: | ||
=INTRODUCTION= | =INTRODUCTION= | ||
<br> | |||
'''Start – Digital surveillance is increasing accountability''' | '''Start – Digital surveillance is increasing accountability''' | ||
Line 23: | Line 21: | ||
'''Argument 1: Government surveillance demands us to get digital and more liable''' | '''Argument 1: Government surveillance demands us to get digital and more liable''' | ||
:Example 01 : We don't carry an identity card anymore because governments created digital versions of them that may be stored on our smartphones, we give our fingerprints to centralized companies with nothing more than the promise that it will be easier to unlock an everyday device. It is almost mandatory to get digital, from passport checkpoints at the airport to exhaustively detailed residency permit requirements. Without acknowledging it we are becoming more responsible and easily accountable for our imprints. "[P]olicy affecting our everyday life is moved further from our ability to influence, affect or even understand it. At the same time, the increased use of surveillance and monitoring technologies makes the individual more vulnerable to, and accountable to, these very organizations that are themselves becoming less accountable to the surveilled populace." (Mann, 2003 | :'''Example 01 :''' We don't carry an identity card anymore because governments created digital versions of them that may be stored on our smartphones, we give our fingerprints to centralized companies with nothing more than the promise that it will be easier to unlock an everyday device. It is almost mandatory to get digital, from passport checkpoints at the airport to exhaustively detailed residency permit requirements. Without acknowledging it we are becoming more responsible and easily accountable for our imprints. "[P]olicy affecting our everyday life is moved further from our ability to influence, affect or even understand it. At the same time, the increased use of surveillance and monitoring technologies makes the individual more vulnerable to, and accountable to, these very organizations that are themselves becoming less accountable to the surveilled populace." (Mann, 2003) | ||
:'''Example 02 :''' "The second challenge is determining the legal rules for access to these data. As the kinds of electronic data collected by mobile technology grow richer, the number of service providers proliferates, and business models evolve, it becomes more challenging to identify with certainty the legal guidelines governing law enforcement’s ability to lawfully obtain and use such data." (Balkovich et al., 2015) | |||
=BODY= | =BODY= | ||
Line 42: | Line 39: | ||
'''Argument 1: Parallel publishing streams''' | '''Argument 1: Parallel publishing streams''' | ||
:Example 01 : Efforts like the underground press were a strategy to cope with a repressive post-war press. Publications were produced without official approval, illegally or against the wishes of a dominant (governmental, religious, or institutional) group. (Miles, 2016) | :'''Example 01 :''' Efforts like the underground press were a strategy to cope with a repressive post-war press. Publications were produced without official approval, illegally or against the wishes of a dominant (governmental, religious, or institutional) group. (Miles, 2016) | ||
:Example 02 : Overcoming repressive power structures in the press. In Portugal during the Salazar dictatorship from 1933 till 1974. The Lapis Azul stands out as a symbol of censorship during the Estado Novo regime. What media were used to create political discourse within this context? | :'''Example 02 :''' Overcoming repressive power structures in the press. In Portugal during the Salazar dictatorship from 1933 till 1974. The Lapis Azul stands out as a symbol of censorship during the Estado Novo regime. What media were used to create political discourse within this context? | ||
:Example 03 : Factsheet 5 was a periodical featuring brief reviews of zines, along with contact information. Mike Gunderloy founded the publication in 1982 and published 44 issues through 1991 | :'''Example 03 :''' Factsheet 5 was a periodical featuring brief reviews of zines, along with contact information. Mike Gunderloy founded the publication in 1982 and published 44 issues through 1991 | ||
:Example 04 : Zines are self-published media, either with original or appropriated images and texts with small-circulation and a small print run. | :'''Example 04 :''' Zines are self-published media, either with original or appropriated images and texts with small-circulation and a small print run. | ||
::Why are these so important for communities? | ::Why are these so important for communities? | ||
::What roles do they take? | ::What roles do they take? | ||
Line 58: | Line 55: | ||
Memes function as a virus, an easy way to propagate an idea. But they are used by both left and right wings to spread ideas and political agendas “Memes play a distinct role in protest; they seem to be to the resistance of today what “political posters” were to yesterday” (Metahaven, 2014) | Memes function as a virus, an easy way to propagate an idea. But they are used by both left and right wings to spread ideas and political agendas “Memes play a distinct role in protest; they seem to be to the resistance of today what “political posters” were to yesterday” (Metahaven, 2014) | ||
:Example 01 : Lama Meme in China "When pronounced one way, it refers to an innocuous mythical animal that is apparently related to the Bolivian alpaca. However, when pronounced another way, it means ‘fuck your mother’ (肏你妈)" (Wu, 2019) | :'''Example 01 :''' Lama Meme in China "When pronounced one way, it refers to an innocuous mythical animal that is apparently related to the Bolivian alpaca. However, when pronounced another way, it means ‘fuck your mother’ (肏你妈)" (Wu, 2019) | ||
:Example 02 : Left parties are watermarking memes so that they cannot be monetized. | :'''Example 02 :''' Left parties are watermarking memes so that they cannot be monetized. | ||
::How does this impact the meme culture by its self? | ::How does this impact the meme culture by its self? | ||
::Why is this happening? | ::Why is this happening? | ||
Line 71: | Line 68: | ||
'''Argument 1 : Watermarking as an aesthetic enhancement, a mark of quality to a user imprint.''' | '''Argument 1 : Watermarking as an aesthetic enhancement, a mark of quality to a user imprint.''' | ||
:Example 01 : Chemical Watermarks — "Watermarking originally might have been intended as an aesthetic enhancement, a mark of quality, or a proprietary mark for the papermaker or the wealthy donor or client." (Watkins, 1990) | :'''Example 01 :''' Chemical Watermarks — "Watermarking originally might have been intended as an aesthetic enhancement, a mark of quality, or a proprietary mark for the papermaker or the wealthy donor or client." (Watkins, 1990) | ||
:Example 02 : Digital watermarks — Adding traces that relate to the subject, and more precisely with geolocation, IP address, mac addresses, email addresses. Within this, we can also identify the identification tracking dots used for forensic evidence. | :'''Example 02 :''' Digital watermarks — Adding traces that relate to the subject, and more precisely with geolocation, IP address, mac addresses, email addresses. Within this, we can also identify the identification tracking dots used for forensic evidence. | ||
'''Argument 2 : Library stamps providing a body of evidence for determining both the circumstance and date of acquisition, questioning on ownership and acquisition.''' | '''Argument 2 : Library stamps providing a body of evidence for determining both the circumstance and date of acquisition, questioning on ownership and acquisition.''' | ||
:Example 01 : Library stamp — In libraries books were stamped to mark ownership of the book. The relation used to be created between the physical medium and the library also creating provenance to the collection. "While library stamps are a useful aid in determining the history of a collection item, it has been noted that many items were stamped much later than their acquisition date and mistakes are known to have occurred. Library stamps should provide just one piece of a greater body of evidence for determining both the circumstance and date of acquisition. Clues may also be found on bindings, bookplates or inscriptions." (Duffy, 2013) | :'''Example 01 :''' Library stamp — In libraries books were stamped to mark ownership of the book. The relation used to be created between the physical medium and the library also creating provenance to the collection. "While library stamps are a useful aid in determining the history of a collection item, it has been noted that many items were stamped much later than their acquisition date and mistakes are known to have occurred. Library stamps should provide just one piece of a greater body of evidence for determining both the circumstance and date of acquisition. Clues may also be found on bindings, bookplates or inscriptions." (Duffy, 2013) | ||
:Example 02 : Digital Stamps — Questioning ownership and acquisition. Relation to the downloader and not to the collection. The relation is intended to be established to its user. | :'''Example 02 :''' Digital Stamps — Questioning ownership and acquisition. Relation to the downloader and not to the collection. The relation is intended to be established to its user. | ||
:The introduction of the internet changed how we relate among ourselves. I can take an example of how forbidden music used to be smuggled on Soviet Russia. They would write directly onto old X-ray films and make them cross the borders more easily. If we wanted to share a film probably it was recorded with a low-quality camera in a cinema and sold to you already burnt in a CD. We are now able to live share different mediums in a matter of seconds. And these stamps are an attempt to if not target you, at least create some consciousness around the topic. | :The introduction of the internet changed how we relate among ourselves. I can take an example of how forbidden music used to be smuggled on Soviet Russia. They would write directly onto old X-ray films and make them cross the borders more easily. If we wanted to share a film probably it was recorded with a low-quality camera in a cinema and sold to you already burnt in a CD. We are now able to live share different mediums in a matter of seconds. And these stamps are an attempt to if not target you, at least create some consciousness around the topic. | ||
Line 95: | Line 92: | ||
'''Argument 1 : Hiding in plain sight as a strategy.''' | '''Argument 1 : Hiding in plain sight as a strategy.''' | ||
:Example 01 : Using Analog tactics with steganography (A Cookbook of Invisible Writing) from Amy Suo Wu. This cookbook introduces recipes to explore alternative forms of communication. | :'''Example 01 :''' Using Analog tactics with steganography (A Cookbook of Invisible Writing) from Amy Suo Wu. This cookbook introduces recipes to explore alternative forms of communication. | ||
:Example 02 : Researchers in China developed technology to undercover messages making them invisible to the naked eye. These only be read with a UV light over the printed medium. Printing technology developments are acknowledging that even digital communications and data security are becoming more sophisticated there is a need to develop ways to securely send hard copy messages. (Davis, 2019) | :'''Example 02 :''' Researchers in China developed technology to undercover messages making them invisible to the naked eye. These only be read with a UV light over the printed medium. Printing technology developments are acknowledging that even digital communications and data security are becoming more sophisticated there is a need to develop ways to securely send hard copy messages. (Davis, 2019) | ||
'''Argument 2: Developing safe spaces to protect sources allowing them to share information.''' | '''Argument 2: Developing safe spaces to protect sources allowing them to share information.''' | ||
:Example 01 : Lack of effective whistleblower protection raises further concerns on its negative impacts on the freedom of expression and the freedom of the media. (“EU Whistleblower protection,” 2018) | :'''Example 01 :''' Lack of effective whistleblower protection raises further concerns on its negative impacts on the freedom of expression and the freedom of the media. (“EU Whistleblower protection,” 2018) | ||
:Example 02 : The creation of spaces to anonymously publish confidential documents. Projects like SecureDrop which is a platform that allows sources to submit documents and data while avoiding most common forms of online tracking (Ball, 2014) | :'''Example 02 :''' The creation of spaces to anonymously publish confidential documents. Projects like SecureDrop which is a platform that allows sources to submit documents and data while avoiding most common forms of online tracking (Ball, 2014) | ||
:Example 03: Counterargument on whistlblowing | :'''Example 03:''' Counterargument on whistlblowing | ||
'''Point B: | '''Point B: Analyze strategies that enable access.''' | ||
'''Argument 1 : Archives and libraries provide spaces to access media that come from alternative channels''' | '''Argument 1 : Archives and libraries provide spaces to access media that come from alternative channels''' | ||
:Example 01 : Different organizing structures allow different things, from shadow libraries to .onion libraries | :'''Example 01 :''' Different organizing structures allow different things, from shadow libraries to .onion libraries | ||
::01: Library Genesis: Within their context, they seem to distance themselves from the idea of bringing academic research for people without access "If you are from India, Pakistan or Iran, you may have difficulties with finances and be tempted to place such requests, then this answer is for you. There may exist some sites on the net that can help you find certain books upon request, but we simply cannot do this. If you need the book urgently and it's missing in LG, please, do not rely on us and try to get it from some other place." (Library Genesis: Miner’s Hut / Барак старателей • View topic - Sitemap: downloads, services, manuals, FAQ, n.d.) | ::01: Library Genesis: Within their context, they seem to distance themselves from the idea of bringing academic research for people without access "If you are from India, Pakistan or Iran, you may have difficulties with finances and be tempted to place such requests, then this answer is for you. There may exist some sites on the net that can help you find certain books upon request, but we simply cannot do this. If you need the book urgently and it's missing in LG, please, do not rely on us and try to get it from some other place." (Library Genesis: Miner’s Hut / Барак старателей • View topic - Sitemap: downloads, services, manuals, FAQ, n.d.) | ||
Line 123: | Line 120: | ||
:Example 02 : Archives that document and organize perishable sensitive information preserving its' digital memory | :'''Example 02 :''' Archives that document and organize perishable sensitive information preserving its' digital memory | ||
::01: Archives like Cryptome allow publications that are prohibited by governments worldwide | ::01: Archives like Cryptome allow publications that are prohibited by governments worldwide | ||
Line 129: | Line 126: | ||
::02: Syrian Archive is responsible for collecting, verifying, preserving, and investigating visual documentation of human rights violations in Syria, the Syrian Archive establishes a verified database of human rights violations, and to act as an evidence tool for legally implementing justice and accountability as concept and practice in Syria. (About | Syrian Archive, n.d.) | ::02: Syrian Archive is responsible for collecting, verifying, preserving, and investigating visual documentation of human rights violations in Syria, the Syrian Archive establishes a verified database of human rights violations, and to act as an evidence tool for legally implementing justice and accountability as concept and practice in Syria. (About | Syrian Archive, n.d.) | ||
::03: leftove.rs is a project that seeks to create a shared online archive of radical, anti-oppressive, and working-class movements, and the material traces they have left. | ::03: leftove.rs is a project that seeks to create a shared online archive of radical, anti-oppressive, and working-class movements, and the material traces they have left. | ||
::04: MayDay Rooms is an educational charity founded as a safe haven for historical material linked to social movements, experimental culture and the radical expression of marginalized figures and groups. It was set up to safeguard historical material and connect it with contemporary struggle. (MayDay Rooms, n.d.) | ::04: MayDay Rooms is an educational charity founded as a safe haven for historical material linked to social movements, experimental culture and the radical expression of marginalized figures and groups. It was set up to safeguard historical material and connect it with contemporary struggle. (MayDay Rooms, n.d.) | ||
=Conclusion= | =Conclusion= | ||
<br> | |||
Print continues to play its role in publishing. The relation between analog and digital formats demands for tools able to archive perishable material preserving its' digital memory. Print media has had an integral place in modern movements of art and politics (Thoburn, 2016) and still, now we find communities depending on it. | Print continues to play its role in publishing. The relation between analog and digital formats demands for tools able to archive perishable material preserving its' digital memory. Print media has had an integral place in modern movements of art and politics (Thoburn, 2016) and still, now we find communities depending on it. | ||
How are we adapting when more strategies are put in place to surveil published material? | How are we adapting when more strategies are put in place to surveil published material? | ||
Tools for archiving may play a key role in documenting safe spaces. How can we rethink the process of creating links between different formats? | Tools for archiving may play a key role in documenting safe spaces. How can we rethink the process of creating links between different formats? | ||
=References= | =References= | ||
<br> | |||
About | Syrian Archive (n.d.). Available at: https://syrianarchive.org/en/about/ (Accessed: 12 November 2019).<br> | About | Syrian Archive (n.d.). Available at: https://syrianarchive.org/en/about/ (Accessed: 12 November 2019).<br> | ||
Balkovich, E., Prosnitz, D., Boustead, A., et al. (2015) “The Electronic Surveillance Challenge.” In Electronic Surveillance of Mobile Devices. Understanding the Mobile Ecosystem and Applicable Surveillance Law. RAND Corporation. pp. 1–8. Available at: https://www.jstor.org/stable/10.7249/j.ctt19rmdgw.7 (Downloaded: 25 October 2019).<br> | Balkovich, E., Prosnitz, D., Boustead, A., et al. (2015) “The Electronic Surveillance Challenge.” In Electronic Surveillance of Mobile Devices. Understanding the Mobile Ecosystem and Applicable Surveillance Law. RAND Corporation. pp. 1–8. Available at: https://www.jstor.org/stable/10.7249/j.ctt19rmdgw.7 (Downloaded: 25 October 2019).<br> |
Latest revision as of 12:13, 14 November 2019
From the XPUB PAD
https://pad.xpub.nl/p/thesis_outline_05_pedrosaclout
Thesis Outline
Thesis Statement
Communities need places to publish anonymously, to feel safe and feel represented. How is censorship influencing who gets to publish? How can publishing bypass surveillance? What are the alternative forms of communication that can be built to subvert surveillance in physical and digital media files?
The human being always felt the need to extend itself. From wearing clothes to protect us, to developing agriculture tools to become more productive, and the use of medicine to increase our immunity system. We have created the web, originally it was conceived and developed to meet the demand for automated information-sharing between scientists in universities and institutes around the world (“The birth of the Web | CERN,” n.d.) and now being a part of it is a demand for being public, to create an audience and to have a bigger reach. What started as being a way to connect us, spread knowledge easily and globally also contributed to mass surveillance. It arose the opportunity to start creating more precise data on the subject and this also impacted how academic publishing and book publishers started to be able to use strategies that used to provide provenance to media within archives and shaped them to create accountability on the subject.
Parallel systems are put in place to create forensic evidence on the ones who prints and share a publication. The case of the printers Machine Identification Code (MIC) which is a format of physical watermarking provides proof to the originator of printed material for example. This made me rethink what does print means and how do we see it as being a secure medium.
INTRODUCTION
Start – Digital surveillance is increasing accountability
We are expanding our online footprints
Argument 1: Government surveillance demands us to get digital and more liable
- Example 01 : We don't carry an identity card anymore because governments created digital versions of them that may be stored on our smartphones, we give our fingerprints to centralized companies with nothing more than the promise that it will be easier to unlock an everyday device. It is almost mandatory to get digital, from passport checkpoints at the airport to exhaustively detailed residency permit requirements. Without acknowledging it we are becoming more responsible and easily accountable for our imprints. "[P]olicy affecting our everyday life is moved further from our ability to influence, affect or even understand it. At the same time, the increased use of surveillance and monitoring technologies makes the individual more vulnerable to, and accountable to, these very organizations that are themselves becoming less accountable to the surveilled populace." (Mann, 2003)
- Example 02 : "The second challenge is determining the legal rules for access to these data. As the kinds of electronic data collected by mobile technology grow richer, the number of service providers proliferates, and business models evolve, it becomes more challenging to identify with certainty the legal guidelines governing law enforcement’s ability to lawfully obtain and use such data." (Balkovich et al., 2015)
BODY
PART 1 – Bridging between Surveillance and Publishing
Historically print was used to bypass censorship. What strategies can we find that are related to techniques already used in the past? What deprecated publishing channels can we find that have been reused? What modes of communication were developed to circumvent surveillance?
How memes became a form of expression of shared ideas in a community and what led to a need to start watermarking them?
I will be comparing how traces used to be applied in analog libraries where the main intention was to attribute provenance to a medium with the contemporary overview of imprints as a way to create liability for the users.
Point A: Alternative publishing channels became fundamental to engage locally, spread information and freely publish thoughts
Argument 1: Parallel publishing streams
- Example 01 : Efforts like the underground press were a strategy to cope with a repressive post-war press. Publications were produced without official approval, illegally or against the wishes of a dominant (governmental, religious, or institutional) group. (Miles, 2016)
- Example 02 : Overcoming repressive power structures in the press. In Portugal during the Salazar dictatorship from 1933 till 1974. The Lapis Azul stands out as a symbol of censorship during the Estado Novo regime. What media were used to create political discourse within this context?
- Example 03 : Factsheet 5 was a periodical featuring brief reviews of zines, along with contact information. Mike Gunderloy founded the publication in 1982 and published 44 issues through 1991
- Example 04 : Zines are self-published media, either with original or appropriated images and texts with small-circulation and a small print run.
- Why are these so important for communities?
- What roles do they take?
- Why do we need to preserve the opportunity for them to be created?
Argument 2: Memes as a tool to free speech
Memes function as a virus, an easy way to propagate an idea. But they are used by both left and right wings to spread ideas and political agendas “Memes play a distinct role in protest; they seem to be to the resistance of today what “political posters” were to yesterday” (Metahaven, 2014)
- Example 01 : Lama Meme in China "When pronounced one way, it refers to an innocuous mythical animal that is apparently related to the Bolivian alpaca. However, when pronounced another way, it means ‘fuck your mother’ (肏你妈)" (Wu, 2019)
- Example 02 : Left parties are watermarking memes so that they cannot be monetized.
- How does this impact the meme culture by its self?
- Why is this happening?
- What is the right-wing approach to the situation?
Point B: Appropriation of techniques that were historically used to append imprints able to grant marks of quality and acknowledgment are now readjusted.
Argument 1 : Watermarking as an aesthetic enhancement, a mark of quality to a user imprint.
- Example 01 : Chemical Watermarks — "Watermarking originally might have been intended as an aesthetic enhancement, a mark of quality, or a proprietary mark for the papermaker or the wealthy donor or client." (Watkins, 1990)
- Example 02 : Digital watermarks — Adding traces that relate to the subject, and more precisely with geolocation, IP address, mac addresses, email addresses. Within this, we can also identify the identification tracking dots used for forensic evidence.
Argument 2 : Library stamps providing a body of evidence for determining both the circumstance and date of acquisition, questioning on ownership and acquisition.
- Example 01 : Library stamp — In libraries books were stamped to mark ownership of the book. The relation used to be created between the physical medium and the library also creating provenance to the collection. "While library stamps are a useful aid in determining the history of a collection item, it has been noted that many items were stamped much later than their acquisition date and mistakes are known to have occurred. Library stamps should provide just one piece of a greater body of evidence for determining both the circumstance and date of acquisition. Clues may also be found on bindings, bookplates or inscriptions." (Duffy, 2013)
- Example 02 : Digital Stamps — Questioning ownership and acquisition. Relation to the downloader and not to the collection. The relation is intended to be established to its user.
- The introduction of the internet changed how we relate among ourselves. I can take an example of how forbidden music used to be smuggled on Soviet Russia. They would write directly onto old X-ray films and make them cross the borders more easily. If we wanted to share a film probably it was recorded with a low-quality camera in a cinema and sold to you already burnt in a CD. We are now able to live share different mediums in a matter of seconds. And these stamps are an attempt to if not target you, at least create some consciousness around the topic.
PART 2 – Designing tools to publish and read anonymously
Strategies are put together to publish online anonymously.
But to do it consistently demands a place to access this material. When we publish material either in a library or an archive we expect that someone will be able to access it. How online spaces are structured plays a key role in who gets to access them. When thinking about extra-legal publishing streams we have to consider how it will shape how others get to this material
During this chapter, I will explore strategies as extra-legal libraries and unindexed archives. These resources are able to open gates to access walls. How are they structured and how do they protect themselves and their users?
Point A: Spotting approaches to subvert surveillance.
Argument 1 : Hiding in plain sight as a strategy.
- Example 01 : Using Analog tactics with steganography (A Cookbook of Invisible Writing) from Amy Suo Wu. This cookbook introduces recipes to explore alternative forms of communication.
- Example 02 : Researchers in China developed technology to undercover messages making them invisible to the naked eye. These only be read with a UV light over the printed medium. Printing technology developments are acknowledging that even digital communications and data security are becoming more sophisticated there is a need to develop ways to securely send hard copy messages. (Davis, 2019)
Argument 2: Developing safe spaces to protect sources allowing them to share information.
- Example 01 : Lack of effective whistleblower protection raises further concerns on its negative impacts on the freedom of expression and the freedom of the media. (“EU Whistleblower protection,” 2018)
- Example 02 : The creation of spaces to anonymously publish confidential documents. Projects like SecureDrop which is a platform that allows sources to submit documents and data while avoiding most common forms of online tracking (Ball, 2014)
- Example 03: Counterargument on whistlblowing
Point B: Analyze strategies that enable access.
Argument 1 : Archives and libraries provide spaces to access media that come from alternative channels
- Example 01 : Different organizing structures allow different things, from shadow libraries to .onion libraries
- 01: Library Genesis: Within their context, they seem to distance themselves from the idea of bringing academic research for people without access "If you are from India, Pakistan or Iran, you may have difficulties with finances and be tempted to place such requests, then this answer is for you. There may exist some sites on the net that can help you find certain books upon request, but we simply cannot do this. If you need the book urgently and it's missing in LG, please, do not rely on us and try to get it from some other place." (Library Genesis: Miner’s Hut / Барак старателей • View topic - Sitemap: downloads, services, manuals, FAQ, n.d.)
- 02: aaaaarg.fail is used by researchers, academics, students, people interested in theory. You can only become a member by invitation. As a member, you not only can upload and download but also request new titles through a messageboard.
- 03: Libraries like "The library" http://www.libraryqtlpitkix.onion/ and "Clockwise libraries" https://clockwise3rldkgu.onion operate within the invisible web, or hidden web are parts of the World Wide Web. Their content is not indexed by standard web engines, instead, these libraries are indexed in specific web pages just as "http://mx7rwxcountermqh.onion/". In this index, you can find an annotated list of URLs, with a small description of what each of these links is focused on.
- Example 02 : Archives that document and organize perishable sensitive information preserving its' digital memory
- 01: Archives like Cryptome allow publications that are prohibited by governments worldwide
- 02: Syrian Archive is responsible for collecting, verifying, preserving, and investigating visual documentation of human rights violations in Syria, the Syrian Archive establishes a verified database of human rights violations, and to act as an evidence tool for legally implementing justice and accountability as concept and practice in Syria. (About | Syrian Archive, n.d.)
- 03: leftove.rs is a project that seeks to create a shared online archive of radical, anti-oppressive, and working-class movements, and the material traces they have left.
- 04: MayDay Rooms is an educational charity founded as a safe haven for historical material linked to social movements, experimental culture and the radical expression of marginalized figures and groups. It was set up to safeguard historical material and connect it with contemporary struggle. (MayDay Rooms, n.d.)
Conclusion
Print continues to play its role in publishing. The relation between analog and digital formats demands for tools able to archive perishable material preserving its' digital memory. Print media has had an integral place in modern movements of art and politics (Thoburn, 2016) and still, now we find communities depending on it.
How are we adapting when more strategies are put in place to surveil published material? Tools for archiving may play a key role in documenting safe spaces. How can we rethink the process of creating links between different formats?
References
About | Syrian Archive (n.d.). Available at: https://syrianarchive.org/en/about/ (Accessed: 12 November 2019).
Balkovich, E., Prosnitz, D., Boustead, A., et al. (2015) “The Electronic Surveillance Challenge.” In Electronic Surveillance of Mobile Devices. Understanding the Mobile Ecosystem and Applicable Surveillance Law. RAND Corporation. pp. 1–8. Available at: https://www.jstor.org/stable/10.7249/j.ctt19rmdgw.7 (Downloaded: 25 October 2019).
Ball, J. (2014) Guardian launches SecureDrop system for whistleblowers to share files. The Guardian, 5 June. Available at: https://www.theguardian.com/technology/2014/jun/05/guardian-launches-securedrop-whistleblowers-documents (Accessed: 24 October 2019).
Davis, N. (2019) Scientists invent new technology to print invisible messages. The Guardian, 25 September. Available at: https://www.theguardian.com/science/2019/sep/25/scientists-invent-new-technology-to-print-invisible-messages (Accessed: 30 October 2019).
Duffy, C. (2013) A Guide to British Library Book Stamps - Collection Care blog. Available at: https://blogs.bl.uk/collectioncare/2013/09/a-guide-to-british-library-book-stamps.html (Accessed: 12 October 2019).
Duncombe, S. (2017) Notes from underground zines and the politics of alternative culture ; with a new afterword: Do zines still matter? Portland, Or.: Microcosm Publishing.
EU Whistleblower protection (2018). Available at: https://ec.europa.eu/info/law/better-regulation/initiatives/com-2018-218_en (Accessed: 28 October 2019).
Library Genesis: Miner’s Hut / Барак старателей • View topic - Sitemap: downloads, services, manuals, FAQ (n.d.). Available at: https://forum.mhut.org/viewtopic.php?p=9000 (Accessed: 12 November 2019).
MayDay Rooms (n.d.). Available at: https://stuff.maydayrooms.org/ (Accessed: 13 November 2019).
MayDay Rooms » leftove.rs (n.d.). Available at: https://maydayrooms.org/leftovers/ (Accessed: 13 November 2019).
Metahaven (2014) Can Jokes Bring Down Governments?: Memes, Design and Politics. Moscow: Strelka Press.
Miles, B. (2016) The Underground Press. Available at: https://www.bl.uk/20th-century-literature/articles/the-underground-press (Accessed: 31 October 2019).
Snowden, E. (2019) Permanent Record. S.I.: Henry Holt and Co. Available at: https://api.overdrive.com/v1/collections/v1L2BaQAAAJcBAAA1M/products/f31cb89a-bf1f-4f56-9b29-57e4a2a0bfe4 (Downloaded: 30 October 2019).
The birth of the Web | CERN (n.d.). Available at: https://home.cern/science/computing/birth-web (Accessed: 8 October 2019).
Thoburn, N. (2016) Anti-Book: On the Art and Politics of Radical Publishing. University of Minnesota Press. Available at: www.jstor.org/stable/10.5749/j.ctt1j7x9vm (Downloaded: 13 November 2019).
Watkins, S. (1990) Chemical Watermarking of Paper. Journal of the American Institute for Conservation, 29 (2): 117–131. doi:10.2307/3179578.
Wu, A.S. and Edwards, C. (2019) A cookbook of invisible writing. Eindhoven: Onomatopee.