Your Consent Is Not Being Violated By Accident

unquietpirate: When you start looking for examples of nonconsensual culture in technology, you find them absolutely everywhere. – Deb Chachra, Age of Non-Consent About a month ago, someone sent me this lovely rant and asked me to publish it anonymously. I’ve been sitting on it mostly because I got wrapped up in other things. But …

“Bitcoin can’t lead on its own to a disintermediated society,” and other uncomfortable truths about BitCoin

We live in an epoch of techno-utopianism with a strong drive for techno-cracy. The former means that many believe that technology alone determines certain outcomes, while the latter believes it is a good thing that flawed human processes are replaced by ‘clean’ technological processes. Both attitudes are very dangerous. First, distributed technologies do not necessarily …

Turn your Android phone into a full fledged programming environment

These days, mobile phones are basically computers. And not just any computer. If you have a smartphone, then it’s the same kind of computer as a regular ol’ laptop. Sure, the two look different, but once you get “under the hood” they look and feel remarkably similar.

My mission, which I chose to accept, was to see if I could turn my Android phone into a fully fledged web development console. Lo and behold, I could. And it’s not even that hard, but I did have to do some digging.

That’s because searching the ‘net for phrases like “web development on Android” mostly returns information on how to code and debug websites for mobile browsers, rather than how to use mobile phones as your environment for developing websites. Once I figured out which tools were suited for the task (and my personal tastes), though, everything else fell into place.

Read the full post.

How to: Securely configure Mac OS X for network packet sniffing with Wireshark

If you’re anything like me, you often run into a computer problem or five that could be diagnosed more quickly by taking a peek at activity on the network. The best general purpose tool for inspecting network activity has gotta be Wireshark. It’s an industry-standard, open source packet sniffer that you can use for fun and profit. But on many Mac OS X builds, the default configuration for packet capturing is less secure than it ought to be. Here’s how to fix that on your Mac.

Predator Alert Tools for OkCupid, Facebook, and Twitter featured by LifeHacker.com

The Predator Alert Tool for OkCupid was featured on LifeHacker’s “After Hours” sex and dating themed site: Predator Alert is a userscript, which means you’ll first need to install Tampermonkey for Chrome, or Greasemonnkey for Firefox, and then install Predator Alert. Once installed, the add-on will prompt you to log in to your profile, and …

Why a “Predator Alert Tool” for Twitter?

Despite many “anti-bullying” campaigns, online harassment and cyberbullying are prevalent behaviors. Most anti-abuse efforts fail because they tend to focus on appeals to authority. The now-ubiquitous “Report Abuse” buttons on social networking websites like Twitter are one such example, yet their ubiquity have not curbed the behaviors or harm they purport to address or mitigate. …

The real reason people are starving is because we think they deserve to.

My friend Ethan made an amazingly awesome online food map and I got quoted in this article about it: Considered an anti-consumerism movement, dumpster diving, bin raiding or “skipping” as it’s known in England, where dumpsters are called skips, is said to have its originated with the Diggers, a group of 1960s artists and activists …

Predator Alert Tool for Twitter is here.

I released the code for my proof-of-concept and first functional prototype of the Predator Alert Tool for Twitter to the public domain. If you want to try it out yourself, you can use the public Predator Alert Tool for Twitter facilitator at https://pat-twitter.herokuapp.com. I’ve seeded it with a demonstration warnlist called “Reputation-addicted putzes” onto which …

Unlike Twitter itself, Predator Alert Tool for Twitter is a private-by-default, public-by-effort application.

I’m still hacking away on Predator Alert Tool for Twitter, but I’ve just finished putting some final wax and polish on the user interface for warnlist privacy options. What’s really exciting about this is that, unlike Twitter itself, in Predator Alert Tool for Twitter, “private” actually means what it says on the tin. When you …

Artist devises face mask of his own face, makes many copies, sells them at cost, all to protect the residents of his home city of Chicago from surveillance

When you wear these [“URME Surveillance”] devices the cameras will track me instead of you and your actions in public space will be attributed as mine because it will be me the cameras see. All URME devices have been tested for facial recognition and each properly identifies the wearer of me on facebook, which has …