US Indymedia Global Indymedia Publish About us
Printed from Boston IMC : http://boston.indymedia.org/
Boston.Indymedia
IVAW Winter Soldier

Winter Soldier
Testimonies
Brad Presente

Other Local News

Spare Change News
Open Media Boston
Somerville Voices
Cradle of Liberty
The Sword and Shield

Local Radio Shows

WMBR 88.1 FM
What's Left
WEDS at 8:00 pm
Local Edition
FRI (alt) at 5:30 pm

WMFO 91.5 FM
Socialist Alternative
SUN 11:00 am

WZBC 90.3 FM
Sounds of Dissent
SAT at 11:00 am
Truth and Justice Radio
SUN at 6:00 am

Create account Log in
Comment on this article | View comments | Email this article | Printer-friendly version
Hidden with code "Policy Violation"
News ::
A new alternative to the Boston IMC
22 Dec 2003
Announcing: The White Rose Journal IMC
This site will replace the White Rose Journal blog


We intend to either replace IndyMedia or provoke IndyMedia to evolve in such a direction as to protect its writers and members of the resistance from brownshirt harassment.
We intend to either replace IndyMedia or provoke IndyMedia to evolve in such a direction as to protect its writers and members of the resistance from brownshirt harassment.

[Copyright © 2003, Stephen DeVoy. All rights reserved. Publishing this article on IndyMedia is strictly forbidden.]


This project currently employs simple blog technology. We will use this simple blog technology for a period of one year. During that year, we will develop a software package intended to compete with IndyMedia’s open publishing software. Our new software will not be derived from IndyMedia’s software. It will be developed from scratch. The reason for making this choice is security. Cyber thugs have learned the ins-and-outs of IndyMedia’s software. Since IndyMedia’s software is open source, we suspect that it has been modified, over time, to include several backdoors that are exploited by those targeting dissidents. Our software will contain no backdoors. It will be secure and it will address the security needs of dissidents.



The new technology will allow publishing under complete anonymity. However, it will also include a mechanism to prevent abuse, ever from anonymous parties. Like IndyMedia’s software, it will be viewable using any common HTML based browser. Unlike IndyMedia’s software, one will not be able to publish using a browser. A Java based client will be made available for downloading to anyone that wishes to publish on the medium. Each copy of the client will contain a unique code distributed across a very large code space for which only a small percentage of the codes will be determined to be valid. In order to download a publishing client, one will need to provide proof of identity. A tally will be kept on the number of downloads to a specific person and the location of the downloads. A limit on the number of downloads over a chosen time interval will be determined. Publisher codes (a form of licensing) will be randomly generated and no association between identity and publisher code will be maintained. This will ensure anonymity. However, any publishing tool found to be put to unethical use will be disabled by the server. The unethical party will be forced to download a new copy of the publisher. Since there will be a limit on the number of downloads within a chosen time period, the individual will run out of download privileges and will be unable to publish until the interval passes.



Ethical free speech will be completely open. There will be absolutely no constraints on political content. The only rules will govern the ethics of publishing. For example, one will not be permitted to publish in some else’s name. One will not be permitted to use the tool for smear campaigns. One will not be permitted to use the tool for cyber stalking.



All communications between the publishing tool and the server will be encrypted. The size of the article, as an encrypted entity, will be randomly inflated in size so as to disrupt attempts to correlate size of transmission with viewable articles. A random time delay between publishing and display will be employed to break temporal associations between the act of publishing and the act of displaying the article. This should thwart government and brownshirt attempts to detect authorship.



An encrypted messaging service will be employed allowed users to communicate with one another anonymously and in code. This will thwart government attempts to monitor communications between users.



Other tools will be provided over time. We will include a tools that performs textual analysis. It will be used to track cyber stalkers. The tools will employ a neural network and will train itself on the language use of stalkers and brownshirts. Once a good profile of a stalker’s language use has been learned, an additional layer of security will be employed to analyze publications automatically and flag for inspection any article determined to conform to the language use of known cyber stalkers.

- Update -

I've had some more time to think about this today. I think it would be better for the publishing tool to have a built in browser. Anyone with the publishing tool, provided it has not been disabled, will be able to browse articles and add comments. The browser built into the publishing tool will interpret an extension of HTML that allows various features to be included within comments. Links for posting comments in response to publications will be embedded within these special HTML comments. This will allow both standard browsers and the publishing browser to interpret the same HTML differently. Non publishing browsers will have a read-only relationship with the website.
See also:
http://whiterosejournal.beachcitiesimc.org

This work is in the public domain

Comments

Photo of Veritas
23 Dec 2003

Veritas shows up in Harvard Square pretending to be a supporter, only to join KOBE on IMC and trash the activists showing up in Harvard Square. Veritas derided one activst for being a Christian, another for be unkempt, and a homeless person for having a chest cold.