Avatar
deniel
1d10fd0cb9b6b2be4d62b43a71e493c5360d3cc6d27b6779dfc658783d9d2b80
Unlicensed Money Transmitter 🧡👃🧡

Backpfeifengesicht n (strong, genitive Backpfeifengesichtes or Backpfeifengesichts, plural Backpfeifengesichter)

(colloquial) a slappable face, a face "in need of a punch"

It's 23:59 in moscow again

Muss den Leuten, die sich zwangsläufig so tief damit beschäftigen müssen, um sowas zu bauen nicht auffallen, dass es komplett sinnlos ist was sie da tun?

Verbraucht nicht mehr Strom als jeder andere Webserver. Bringt aber auch nicht mehr als jeder andere Webserver

I translated the article with DeepL to english:

CENSORSHIP ESCAPE

The battle for control over cyberspace

Nana Felius

p 25 August this year in the European Union, the

Digital Services Act (DSA) came into force,

about which the European Commission (EC) says

that it aims to ensure the security of users online

aims to ensure the security of users online. That goal would be achieved through

maintaining a fair open online plat- form environment, and protection of the

fundamental fundamental rights of users. The European Commission believes that

online services are being line services are being abused by manipulative

algorithms to increase the spread of disinformation, as well as for for other

harmful purposes.

Such propagandistic language, among other things, reminds us reminder that our

lives are increasingly taking place in cyberspace. The Internet was initially a

decentralized sanctuary for the exchange of reporting and interpretations and

theories about facts. That original freedom has gone- supplanted by increasing

control on behalf of political aspirations. The applications built on the

Internet that serve as search engines for topics and themes are all

centralized. These search engines and social media enterprises- ments use a

central server, where, among other things, the data coming from us are stored.

among other things, the data coming from us are stored. Network effects that are

very difficult to break, reinforcing the oli- gopoly of these "Big Tech"

companies. Our data and algorithms are used to manipulate and direct users'

attention. and control. For example, the company Cambridge Analytica could

influence citizens to vote for the party that Cambridge Analy- tica paid. Free

users with a sound of their own were transformed formed into no longer

individual data sets, which were increasingly manipulated and dehumanized.

increasingly manipulated and dehumanized.

The Big Tech companies of Silicon Valley acquired a monopoly in terms of the

Internet's search function. The EU's Digital Services Act and similar

initiatives by governments elsewhere in the world, enable political authorities

able to take over this monopoly position. The possible end result of the further

development of this centralization- tie of power, is the transformation of the

entire Internet into a dystopian institution, within which there is no room left

for dissidents who wish to disseminate messages that deviate what political

authorities have prescribed about what we should/must all think and believe.

Worldwide, however, a counter-movement of freedom technology developers has

emerged, who are working hard on

'16 COMMON SENSE 75

decentralized solutions and technological breakthroughs to protect our rights in

cyberspace. A good example is Bitcoin, a decentralized open source protocol that

provides virtually per- fect protection of property rights. After many mis-

successful previous attempts, in the late 2020s these developers have found a

way to protect our intellectual property online protect against deletion and

data theft. The decentralized open source protocol Nostr represents a

technological breakthrough- breakthrough that protects against destruction and

theft of our intellectual property in cyberspace.

Previously, the traditional media of daily newspapers, time- scriptures and TV

programs served as gatekeepers, determining which voices were or were not

allowed to participate in the pu- Dlicke debate. Until shortly before the last

turn of the century There was still much freedom to debate alternative

explanations of what governments we wanted to be told. When that freedom was

severely curtailed by the power grab of 9/t1 greatly diminished, and political

taboos emerged various sites appeared on the internet which exposed the

deceptions of governments. of governments. This encouraged other social media

with much greater reach to dissident interpretations and activism. This

decentralization brought about a significant degree of democratic press freedom,

which played a role, for example, in Brexit and the election of Donald Trump.

Remarkably, it has been journalists in particular, originally the so-called

guardians of democracy, who opted for censorship. They beat the journalistic

drum for its expansion, while censorship goes against the once prevailing

journalistic ethics. Ten years ago, the cen- suring of content by third parties

was still unmentionable, while now it seems to have become normal. Journalists

have been have already been labeled "stenographers of power" at the beginning of

this century. received. The goal of journalists working for the established

media journalists has long ceased to be providing accurate information about

important issues, but to propagate the orthodoxy of the incumbent. This

profession has been able to put aside ethical concerns. Censorship fits also

with their often ideologically shaped presuppositions. It provides them with

favorable career prospects. Centers- lization of the search function of the

Internet is helped facilitated by this increasingly intense collaboration

between government, Big Tech and mainstream media.

The Digital Services Act now allows the EU to allow social media companies and

online platforms in a draconian way to force censorship. The Twitter files and

WOO requests have revealed that behind the scenes have been put under enormous

pressure by governments to censor unwelcome opinions. Until August 25 social

media companies and online platforms still had the leeway not to implement the

imposed censorship. But the DSA makes it possible to block websites at the IP

level. reverse. Algorithms determine, based on keywords, which accounts will be

shadowbanned or deleted. Wan- If social media companies and online platforms

violate the DSA provisions, they face a fine equal to 6% of their global annual

sales. This ensures that dis- sidents in the tock future may no longer be able

to use an online platform be able to use an online platform to spread their

thoughts.

with the digital service act WE FINALLY HAVE TOTAL CONTROL OVER OUR SECURITY AND

THE FUNDAMENTAL RIGHTS OF THE USERS. NOW TO FIND A WAY TO STOP THOSE

MANIPULATIVE AND DISINFORMATION SPREADING ALGORITHMS. 'BESTRISVEN.

VE VEMOCRACY IS SERIOUSLY ENDANGERED BY THESE VRIS ROAMING PROTOCOWEN. The

government REALLY GO INGRISPENL

Worldwide we see an increase of censorship and a call for even more extensive

interventions in the freedom of knowledge transfer by media transmission by

media, politics and part of the population. This is usually wrapped up in

innocent-sounding euphemisms such as "content moderation," which serve to

prohibit the freedom- ard of these measures. Thus, the public space to express

opinions contrary to prescribed reality and existing orthodoxy, is getting

smaller.

Centralization of control over content is also reinforced by the network

effect. The network effect is a phenomenon whereby as more people or users

participate in a platform, the value of the service provided by that platform

offered goes up for those who subsequently join- join. Take the case of a

platform like LinkedIn. For each additional user, participation, which also

makes the online resume enriches, makes the platform more valuable to recruiters

because they can can more easily find qualified candidates. Network effects are

incredibly powerful and can only be broken by initiatives that are ten times

better.

Possibly a now four-year-old initiative can achieve such a breakthrough in the-

breakthrough in the longer term. Nostr (Notes and Other Stuff, Transmitted by

Relays) is an open source protocol that solves the above problems of

centralizing the in- ternet. Developers can run censorship-resistant

applications such as email, social media and search engines. The Nostr

manifesto was first published in Novem- ber 2019 by an anonymous developer using

the nom de guerre Fiatjaf. It works by using so-called relays. These are the

critical components in the Nostr pro- cess. tocol. They are backend servers

that allow different social media platforms can send messages to each other.

Relays can store messages from users, enabling seamless interaction between

platforms. Nostr also makes italso allows you to own your own data and content

andmigrate it to other applications. Algorithms can be be rejected by users or

self-selected. zen, eliminating unwanted manipulationof users' attention. Any

banning of theNostr protocol by governments cannot be effected.Nostr has no

owner and headquarters and therefore cannot bebe pressured to censor. Also,

there is noquestion of a single server that can be disabled.

The first application built using the Nostr protocol,is a variant of Twitter,

which went live in late 2020. Thisalready has more than 18 million users and is

growing exponentially. tially. Nostr is the best-funded open source protocol in

theworld, thanks to generous donations from Jack Dorsey, the billionairewho once

founded Twitter. Dorsey says he was inspired by Satoshi Nakamoto, the creator of

Bitcoin, who was tempted by the tempt- thing to own and control Bitcoin itself,

who has resisted and walked away from money, rem and power. He indicates, decen-

tralization of search functions on the Internet as the only solutionto see

against censorship and says he wants to dedicate his wealth and time for the

development of decentralized technologies. 'Because decentralization protects

the right to freedom of me- expression and property rights in cyberspace. It

basically gives basically this power and control back to all of us as

indi-vidual users of this global electronic network. =

COMMON SENSE 75 = 17

Vick Debergh

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