A network in a network: Difference between revisions

From Hackers & Designers
No edit summary
No edit summary
Line 1: Line 1:
{{Meetups
{{Events
|Date=Tuesday, 23.6.
|Name=A network in a network
|Year=2015
|Location=Stadsschouwburg Amsterdam, Leidseplein 26, 1017 PT Amsterdam
|Date=2015/06/23
|Time=21:00-01:00
|Time=21:00-01:00
|Location=Stadsschouwburg Amsterdam, Leidseplein 26, 1017 PT Amsterdam
|PeopleOrganisations= Selby Gildemacher, James Bryan Graves, Anja Groten, Vicky de Visser
|Type=Meetup
|Web=Yes
|Print=No
}}
}}
Join Hackers & Designers during the Facebook Farewell Party in Stadsschouwburg Amsterdam and learn how to create an anonymous network in a network.
Join Hackers & Designers during the Facebook Farewell Party in Stadsschouwburg Amsterdam and learn how to create an anonymous network in a network.


We will use the infrastructure of Facebook to workshop around the idea of creating an anonymous network within a network.
We will use the infrastructure of Facebook to workshop around the idea of creating an anonymous network within a network.

Revision as of 12:44, 22 October 2015

Template:Events


Join Hackers & Designers during the Facebook Farewell Party in Stadsschouwburg Amsterdam and learn how to create an anonymous network in a network.

We will use the infrastructure of Facebook to workshop around the idea of creating an anonymous network within a network.

During the Facebook Farewell Party we will first collectively establish the notion of physical anonymity by constructing facial remix masks. Meanwhile we'll discuss why anonymity is a critical component of joining our underground group.

Once physically anonymous you will be approved to enter the anonymous workshop space where we will dive into the moral aspects of Facebook’s data usage, and the moral consequences of “misusing” the platform. We will research the tools to accomplish anonymity including: secure anonymous browsers, temporary emails and telephones, and the importance of non-specific data including non-descriptive naming, ambiguous media, etc.

By the end of the session attendees should be able to create anonymous identities and their own network in the network.

Networked