|
|
(11 intermediate revisions by the same user not shown) |
Line 6: |
Line 6: |
| https://eth.leverburns.blue/p/servpub-2b | | https://eth.leverburns.blue/p/servpub-2b |
|
| |
|
| from local networks to circumvention to intranets
| | === '''STRUCTURE''' === |
|
| |
|
| P2P internet infrastructure: Domain, VPN Server (Tinc VPN), DNS, web server (nginx), and networked configuration; social and network typology, proxy, what are the affordances of the network and operations of protocols?
| | ==== Positionality of feminist servers: ==== |
|
| |
|
| murthaugh and karagianni : <nowiki>https://psaroskalazines.gr/pdf/rosa_beta_25_jan_23.pdf</nowiki>
| | * data infrastructure literacy |
| | * digital solidarity networks |
| | * dependencies - alliancies - affinities |
| | * troubleshooting /debugging vulgar marxism |
|
| |
|
| ezn / updated :: <nowiki>https://etherpad.hackersanddesigners.nl/p/hd_infrastructures-tinc</nowiki>
| | ==== politics of networks ==== |
|
| |
|
| methodology: metaphors, analogy, visualise intersecting/sourcing with diff domains (arts, activism, literature, choreography)
| | * regulatory bodies ICAN-RFC's develop/discuss standards |
| | * differences between local and public/static IP --- scarcity of ipv4, how are they assigned, and ipv6. Politics and economics of IP distribution, how do they impose power structures? see internet governance talk and notes by Vesna during /etc |
| | * companies ( ATT/BELL, Mictosft/...) develop protocols - (udp tc/ip) / encryption protocols |
|
| |
|
| /// -- sociopolitical theory around VPN Federation/ decentralization/ distributed services/ networking politics
| | === history and topology of VPN === |
| | | * what types of networks? origin/evolution of terminology & use |
| // ---- organisational aesthetics, commodity frontiers, debugging, troubleshooting together
| | * break down the differences between mesh VPN, VPN for proxy |
| | | * open vpn - diffie hellman key / cryptodance |
| ====== ''update 2nd novembre 2024'' ======
| |
| Structure
| |
| | |
| ====== Technological context: ======
| |
| ''politics of networks''
| |
| | |
| History and topology of VPN --- what types of networks? origin/evolution of terminology
| |
| | |
| After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider.
| |
| AT&T Bell Laboratories developed an IP Encryption Protocol (SwIPe), an effort that effectively demonstrated the potential of encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.
| |
| | |
| "IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies."
| |
| https://www.paloaltonetworks.com/cyberpedia/history-of-vpn
| |
| By end of 90s Microsoft worked towards implementing a secure tunnel protocol, which encapsulated PPP packets, creating a virtual data tunnel to ensure more secure data transmission over the web.
| |
| The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats.
| |
| Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.
| |
| "L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel."
| |
| https://www.paloaltonetworks.com/cyberpedia/what-is-l2tp
| |
| | |
| A later tunneling protocol is the openVPN, is more flexible as it allows port configuration, and more secure.
| |
| | |
| Tinc protocol follows here...
| |
| | |
| maybe the drawing of encapsulation from tunnel up/down
| |
| | |
| differences between local and public/static IP --- scarcity of ipv4, how are they assigned, and ipv6. Politics and economics of IP distribution, how do they impose power structures? see internet governance talk and notes by Vesna during /etc
| |
| | |
| break down the differences between mesh VPN, VPN for proxy | |
| | |
| ====== Positionality of feminist servers: ======
| |
| ''vulgar feminists''
| |
| | |
| systerserver and allies, centralized IP, contributes to small scale server hosting, generating a cultural current in technical, aesthetical, social and political terms (Goriunova, 2012)
| |
| | |
| by making infrastructures visible with the aid of diagrams, manuals, metaphors, performances, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) our data, and redistribute our networks of machines.
| |
| | |
| "one can read Haraway as making this more, rather than less vulgar. She asks messy questions about how gender and sexuality are caught up in productive and reproductive labor – and even in relations that are not obviously either [...] the cyborg is among other things a kind of counter-myth. Buried within the knotty writing of that text is a nugget of science fiction, drawing in particular on feminist utopian and science fiction writing. A contemporary writer who I think takes this kind of project to the next level is Kim Stanley Robinson. He is unapologetically a science fiction genre writer aiming at a popular – and in that sense ‘vulgar’ – readership [...] The sciences are a source of not only specific forms of knowledge in Robinson but also orientations to working in and against nature. One of the problems he highlights – not unlike Bogdanov – is how different labors and forms of technical knowledge can coordinate and cooperate in the absence of an overarching philosophical master-code. "
| |
| | |
| [https://en.wikipedia.org/wiki/Vulgar_Marxism Vulgar Marxists], McKenzie Wark four cheers of vulgarity
| |
| | |
| '''references'''
| |
| | |
| protocol,control, and networks, Galloway and Thacker 2004
| |
| | |
| Log out_: A glossary of Technological Resistance and Decentralization
| |
| | |
| software studies, a lexicon, editor Matthew Fuller
| |
| | |
| Art Platforms and Cultural Production on the Internet, Olga Goriunova, 2012
| |
| | |
| https://en.wikipedia.org/wiki/Vulgar_Marxism
| |
| test
| |
|
| |
|
| <noinclude> | | <noinclude> |
| [[Category:ServPub]] | | [[index.php?title=Category:ServPub]] |
| </noinclude> | | </noinclude> |