Stefan Marsiske - What would hackers use? part1

Post on 21-Jun-2015

887 views 0 download

Tags:

transcript

what would hackers use

stef

September 5, 2010

cleanternet.�v1

1cleanternet.�v

Links

I http://wikileaks.org/

I http://www.laquadrature.net/wiki/

I http://euwiki.org/index.php?title=ACTA%2Fdiffs%

2FChapter2%2FSection4&diff=3707&oldid=3706

I http://en.swpat.org/wiki/Software_patents_wiki:

_home_page

I http://werebuild.eu/wiki/index.php/

I http://pad.telecomix.org/bridgecamp2

I http://gplv3.fsf.org/comments/gplv3-draft-2.html

I https://lqdn.co-ment.com/text/ZUEwpvJ9mmd/view/

Links cont'd

I http://www.status.net / http://identi.ca/stf

I http://www.public-software-group.org/liquid_

feedback_testing/issue/show/37.html

I http://www.europarl.europa.eu/activities/

introduction/home.do?language=en

I http://euwiki.org/Tratten/oeil/Stage_reached_in_

procedure

I http://politicalmemory.eu/

I http://littlesis.org/person/19856/Kira_Alvarez

I http://longstrings.soup.io/

Credits

I Gutenberg & His Printing Press / CCBYNC by camelot2302

I Open 19 / CCBYND by loop_oh

I INSULAR Technologies / CCBYSANC by pablosanz

I Cisco 7936 IP Conference Station / CCBY by Andres Rueda

I guckes.soup.io/post/19675231/Have-you-read-my-blog-yet

I Irssi IRC client with a Userlist and Highlight Window / CCBYby nixternal

I Live video streaming / CCBYSANC by Pigsaw