francescomecca.eu/output/categories/pescewanda.xml
2018-11-10 18:19:00 +01:00

639 lines
66 KiB
XML
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="../assets/xml/rss.xsl" media="all"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Caught in the Net (Posts about PesceWanda)</title><link>francescomecca.eu</link><description></description><atom:link href="francescomecca.eu/categories/pescewanda.xml" rel="self" type="application/rss+xml"></atom:link><language>en</language><copyright>Contents © 2018 &lt;a href="mailto:francescomecca.eu"&gt;Francesco Mecca&lt;/a&gt; </copyright><lastBuildDate>Sat, 10 Nov 2018 17:14:02 GMT</lastBuildDate><generator>Nikola (getnikola.com)</generator><docs>http://blogs.law.harvard.edu/tech/rss</docs><item><title>Addio Reddit</title><link>francescomecca.eu/blog/2018/3/27/addio-reddit/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;blockquote&gt;
&lt;p&gt;It is also common ground, however, that the First Amendment does not guarantee the right to communicate one's views at all times and places or in any manner that may be desired.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Tempo fa rimasi colpito nel leggere questo &lt;a href="https://www.courtlistener.com/opinion/110532/heffron-v-international-soc-for-krishna-consciousness-inc/"&gt;orientamento&lt;/a&gt; della corte degli Stati Uniti dal quale ho tratto la precedente citazione.&lt;/p&gt;
&lt;p&gt;La libertà di espressione è un diritto molto potente che ha storicamente molteplici interpretazioni. Benchè ingenuamente potrebbe essere inteso come la possibilità di manifestare qualsiasi idea, ci sono delle situazioni in cui si deve intendere come il diritto di un individuo minoritario nel poter esprimersi liberamente e senza ritorsioni.&lt;/p&gt;
&lt;p&gt;Con questa premessa posso inquadrare più facilmente il motivo per cui ritengo che il &lt;a href="https://www.reddit.com/r/announcements/comments/39bpam/removing_harassing_subreddits/"&gt;ban del 2015&lt;/a&gt; da parte degli amministratori di Reddit nei confronti di /r/FatPeopleHate e altri subreddit di minor dimensioni non sia stata un'azione ipocrita rispetto agli ideali della piattaforma.&lt;/p&gt;
&lt;p&gt;&lt;img alt="reddit policies" src="francescomecca.eu/wp-content/uploads/2018/reddit_freespeech.jpg"&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://nymag.com/selectall/2017/07/angela-nagles-kill-all-normies-the-alt-right-and-4chan.html"&gt;Angela Nagle&lt;/a&gt; ci ricorda che quegli spazi online &lt;a href="https://hackerchick.com/the-unstoppable-power-of-leaderless-organizations/"&gt;senza leader&lt;/a&gt; roccaforte di ideali minoritari di sinistra, hanno permesso di esprimere non un'idea, ma qualsiasi idea, anche di estrema destra.
Diventa quindi inevitabile che una piattaforma delle dimensioni di Reddit, che nello specifico raccoglie una moltitudine di argomenti e discussioni grazie ai quali è stata ritenuta un bastione della eterogeneità, prima o poi debba adottare una linea di moderazione più definita.&lt;/p&gt;
&lt;p&gt;&lt;img alt="1968" src="francescomecca.eu/wp-content/uploads/2018/Situationist.jpg"&gt;&lt;/p&gt;
&lt;p&gt;Il &lt;a href="https://np.reddit.com/r/announcements/comments/863xcj/new_addition_to_sitewide_rules_regarding_the_use/"&gt;recente ban&lt;/a&gt; invece non riguarda la libertà di espressione, e mi colpisce personalmente, nonostante io non abbia mai visitato alcuno dei subreddit recentementi banditi e le mie uniche transazioni si siano limitate agli utenti di r/MechanicalKeyboards.&lt;/p&gt;
&lt;p&gt;Sono approdato a Reddit inizialmente a causa del mio hobby per le tastiere meccaniche. Da lì mi sono mosso verso r/italy e altri subreddit di indirizzo informatico.
Ho interessi di nicchia e Reddit mi permetteva di riunirmi con persone dall'altra parte del globo che mi fornivano informazioni che non avrei potuto ottenere altrimenti.&lt;/p&gt;
&lt;p&gt;Ora questo rimane valido solo per le persone i quali interessi sono allineati con quelle comunità che riflettono una buona immagine per Reddit e gli investitori. Benchè i miei subreddit di riferimento non siano stati banditi, riconosco che nel recente ban ci sono degli intenti politici o misteriosamente economici.&lt;/p&gt;
&lt;p&gt;Con questo post dico addio a Reddit. Da spazio di discussione a spazio di intolleranza e divisione politica, dove delle comunità che non rientrano nei canoni di buona reputazione per delle agenzie pubblicitarie devono essere eliminate.&lt;/p&gt;
&lt;p&gt;Non voglio che ogni mia parola sia pesata oltre i valori della comunità a cui sottoscrivo, non voglio fare esercizi di autocensura nei post che scrivo.&lt;/p&gt;
&lt;p&gt;Aderivo a delle regole ben definite e delle quali gli amministratori si assumevano la responsabilità. Con il ban di marzo 2018 il sito che conoscevo ha cambiato faccia ed il post di un &lt;a href="https://np.reddit.com/user/Reddit-Policy"&gt;utente anonimo&lt;/a&gt; sarà l'ultimo post che downvoterò.&lt;/p&gt;&lt;/div&gt;</description><category>ban</category><category>free speech</category><category>moderation</category><category>PesceWanda</category><category>reddit</category><guid>francescomecca.eu/blog/2018/3/27/addio-reddit/</guid><pubDate>Tue, 27 Mar 2018 00:00:00 GMT</pubDate></item><item><title>Minidox, a guide for the Europeans and the Scrooges</title><link>francescomecca.eu/blog/2017/10/2/minidoxguide/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;This guide is adapted from the &lt;a href="https://github.com/nicinabox/lets-split-guide/blob/master/assembly.md"&gt;Let's split guide&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It is tailored between the Scrooges like me and all the europeans that couldn't find some TRRS jacks.&lt;/p&gt;
&lt;h3&gt;Helpful references&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://imgur.com/a/vImo6#Rfd586V"&gt;/u/that-canadian's original build log&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Parts&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;PCBs - You will need two of them and you should participated in the group buy.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;2&lt;/strong&gt; ATmega32U4 - 5V/16MHz Pro Micros, you can find them easily on ebay or amazon. &lt;/li&gt;
&lt;li&gt;&lt;strong&gt;36&lt;/strong&gt; 1N4148 diodes, easy to source, even real world shops has them. &lt;/li&gt;
&lt;li&gt;&lt;s&gt;2 TRRS or TRS jacks&lt;/s&gt; our source of all problems, this build log will do without.&lt;/li&gt;
&lt;li&gt;Plate, from &lt;a href="https://github.com/dotdash32/Cases/tree/master/Minidox"&gt;u/dotdash32&lt;/a&gt; or &lt;a href="https://github.com/pjones/minidox-case"&gt;pjones&lt;/a&gt;, 3D printable.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;36&lt;/strong&gt; Switches of your choice&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;36&lt;/strong&gt; Keycaps of your choice&lt;/li&gt;
&lt;li&gt;&lt;s&gt; TRRS or TRS cable &lt;/s&gt; No jacks, no cable.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Cost Breakdown&lt;/h3&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th align="left"&gt;Cost&lt;/th&gt;
&lt;th align="left"&gt;Part&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="left"&gt;$8&lt;/td&gt;
&lt;td align="left"&gt;PCB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="left"&gt;€ 12-30&lt;/td&gt;
&lt;td align="left"&gt;Pro Micros&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="left"&gt;€3-8&lt;/td&gt;
&lt;td align="left"&gt;Diodes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="left"&gt;€14-80&lt;/td&gt;
&lt;td align="left"&gt;Switches&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="left"&gt;€14-180&lt;/td&gt;
&lt;td align="left"&gt;Keycaps&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This is a very cheap build, mine was about 30 € given that I already had the keycaps.&lt;/p&gt;
&lt;h3&gt;Mount the Diodes&lt;/h3&gt;
&lt;p&gt;Diodes allow current to flow in one direction only. Mount the diodes with the black (negative, cathode) line facing the thicker line.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/minidox1.jpg"&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Double check your work&lt;/strong&gt;. &lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Tip:&lt;/em&gt; &lt;strong&gt;Lightly&lt;/strong&gt; tack each diode in from the top. This will keep them snug against the surface once we flip it over and do the real soldering from the bottom. You only need a tiny amount of solder here and you should still be able to see through the hole.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Connect Jumpers&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;This part is not really needed, but you may want to do it in case you will mount the TRRS jacks in the future.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;On the &lt;strong&gt;underside&lt;/strong&gt; of the PCB, right below the TRRS jack, you'll see two sets of 3 pads labelled VCC and GND. Jumper them like this:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;VCC [x] [ ] VCC
[x] [x]
GND [ ] [x] GND
&lt;/pre&gt;
&lt;p&gt;Do both PCBs the same.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="https://i.imgur.com/AUT3VUd.png"&gt;&lt;/p&gt;
&lt;h3&gt;Mount Header Pins&lt;/h3&gt;
&lt;p&gt;You should have received header pins with your Pro Micro. Insert the short side into the bottom of PCB and solder them in.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Tip:&lt;/em&gt; To keep them aligned you can slip the Pro Micro over the pins but &lt;strong&gt;do not solder the Pro Micro at this time&lt;/strong&gt;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Tack the pins on the end and inspect. If the pins are not quite aligned with the board, heat one side with your iron and press it in. It should make a satisfactory "click".&lt;/p&gt;
&lt;p&gt;Solder the rest of the pins (it won't take much solder here).&lt;/p&gt;
&lt;p&gt;The long part of the pins should be protruding from the bottom. We'll trim these later after soldering the Pro Micro, but you can leave them be for now.&lt;/p&gt;
&lt;h3&gt;Mount the Pro Micro&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Pay special attention on this step&lt;/strong&gt;. There are several things that need to be done in the right order and orientation.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Tip:&lt;/em&gt; Flash your Pro Micro now before you mount it. You can test it by using a multimeter to measure the voltage between VCC and RAW. It should be around 5V. If it's bad it'll be a lot less headache than desoldering.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;Mount the 2 switches under the Pro Micro&lt;/h4&gt;
&lt;ol&gt;
&lt;li&gt;Grab two of your switches.&lt;/li&gt;
&lt;li&gt;Snap the switches into your plate in the spots that overlay the Pro Micro (on the left side that's column 2, and on the right that's column 5).&lt;/li&gt;
&lt;li&gt;Line up your PCB with the switches and solder them between the header pins&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;Mount the Pro Micro&lt;/h4&gt;
&lt;p&gt;You'll be working from the bottom of the board for this step.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;On the &lt;strong&gt;left PCB&lt;/strong&gt; the Pro Micro should be &lt;strong&gt;smooth side up&lt;/strong&gt; (facing you)&lt;/li&gt;
&lt;li&gt;On the &lt;strong&gt;right PCB&lt;/strong&gt; the Pro Micro should be &lt;strong&gt;component side up&lt;/strong&gt; (facing you)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It gets easier if you notice that on the Pro Micros and the PCBs there is "RAW" printed. The raw pin must go through the hole with the same sign.&lt;/p&gt;
&lt;p&gt;If you made my same mistake, instead of desoldering without the right equipment you can try to just cut the dividers on the Pro Micro and detach it by breaking the header pins.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/promicro2.jpg"&gt;&lt;/p&gt;
&lt;h3&gt;Mount the rest of the switches&lt;/h3&gt;
&lt;p&gt;Home stretch. Gently snap in the rest of the switches and solder them.&lt;/p&gt;
&lt;p&gt;This would have been easier with a plate, I needed the help of a friend in order to have them aligned correctly.&lt;/p&gt;
&lt;h3&gt;Connect the Pro Micro&lt;/h3&gt;
&lt;p&gt;Given that sourcing the trrs jacks (even TRS if you go without leds) is a little bit difficult in Europe (I got mine from aliexpress), we are gonna connect the two Pro Micros directly.&lt;/p&gt;
&lt;p&gt;The Pro Micros just need communication between three of their pins.&lt;/p&gt;
&lt;p&gt;This means that the Minidox works if you connect the correct pins with a simple copper cable.&lt;/p&gt;
&lt;p&gt;The pins are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Data pin on the right (pin 6 in figure)&lt;/li&gt;
&lt;li&gt;VCC pin, left side (21)&lt;/li&gt;
&lt;li&gt;GND pin, just below the RAW pin (23)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/promicropinout.png"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/promicro4.jpg"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/promicro5.jpg"&gt;&lt;/p&gt;
&lt;p&gt;In my case I have used some old molex cable because raw copper wires tend to be very weak and break apart in a few days.&lt;/p&gt;
&lt;h2&gt;Troubleshooting&lt;/h2&gt;
&lt;h4&gt;Column 2 or column 5 doesn't work (under the controller)&lt;/h4&gt;
&lt;p&gt;If you're having trouble with a dead column right over your Pro Micro it could be that you've got a short from the switch pins. Try to get under there and bend them down.&lt;/p&gt;
&lt;h4&gt;One side isn't working&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Double check if the copper wires are in working conditions and if you have connected the right pins.&lt;/li&gt;
&lt;li&gt;Check that the wires are insulated and that they do not touch the other pins.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;End Result&lt;/h2&gt;
&lt;p&gt;Beautiful? &lt;a href="https://en.wikipedia.org/wiki/Don%27t-care_term"&gt;W&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" src="francescomecca.eu/wp-content/uploads/2017/promicro3.jpg"&gt;&lt;/p&gt;&lt;/div&gt;</description><category>DIY</category><category>mechanical keyboard</category><category>Minidox</category><category>PesceWanda</category><guid>francescomecca.eu/blog/2017/10/2/minidoxguide/</guid><pubDate>Mon, 02 Oct 2017 00:00:00 GMT</pubDate></item><item><title>Cyber-utopia and vaporwave</title><link>francescomecca.eu/blog/2017/5/9/vaporwave/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;Recently I decided to change the &lt;a href="https://github.com/jasonlong/cayman-theme"&gt;css&lt;/a&gt; of my blog to reflect a vaporwave-ish aestethic. &lt;/p&gt;
&lt;p&gt;Although I don't listen to a lot of electronic music, 2814 has been my go to music when I am programming and I go through a lot of James Ferraro's works during the day.&lt;/p&gt;
&lt;p&gt;What is the reason for my recent obsession on vaporwave culture?&lt;/p&gt;
&lt;h3&gt;A dream that disappeared&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;The narrative of Western civilization has become a broken record... should we be surprised when a chopped and screwed trip through the cold war period resonates broadly? &lt;/p&gt;
&lt;p&gt;Vaporwave creates a language to reflect on the inability to break free from the chains of an Orwellian culture. &lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Internet gave me a personal space, a community, heck even a lot of fun masked by a sense of purpose for the free software culture.&lt;/p&gt;
&lt;p&gt;But from a higher point of view Internet failed us. The Cyberspace has been dead.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/John_Perry_Barlow"&gt;John Barlow&lt;/a&gt; on the &lt;a href="https://www.eff.org/cyberspace-independence"&gt;Declaration of the Independence of Cyberspace&lt;/a&gt; wrote:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;But at a certain point in time the Cyberspace didn't want to be left alone and with its own feet headed to real world. Cyberspace blended with the Meatspace&lt;/p&gt;
&lt;p&gt;Every manifestation of the Cyberspace into reality is some sort of virus that eats bites of our existences in the Meatspace and translates that to bytes that are stored in virtual treasure chests. &lt;/p&gt;
&lt;p&gt;Real life communication is &lt;a href="https://medium.freecodecamp.com/mark-zuckerberg-is-the-most-powerful-person-on-earth-but-is-he-responsible-5fbcaeb29ee1"&gt;divoured&lt;/a&gt; into digital data by Facebook, Amazon doesn't stop at our doorbells anymore but &lt;a href="https://www.amazon.com/echoshow"&gt;creeps&lt;/a&gt; into our house, and sleeping is no more a function of how much we are offline but some sort of distorted &lt;a href="https://techcrunch.com/2017/05/09/apple-acquires-sleep-tracking-company-beddit/"&gt;self analytics&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;There is no shame when a &lt;a href="https://www.nytimes.com/2014/06/30/technology/facebook-tinkers-with-users-emotions-in-news-feed-experiment-stirring-outcry.html?_r=0"&gt;web giant plays with the emotions of the user of the platforms&lt;/a&gt;, or &lt;a href="http://www.theaustralian.com.au/business/media/digital/facebook-targets-insecure-young-people-to-sell-ads/news-story/a89949ad016eee7d7a61c3c30c909fa6"&gt;sells them&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;All of that was done by drying out the so called Hackerspace and transmuting it into "Dataspace", where experiment are conducted on people by means of data and algorithms.&lt;/p&gt;
&lt;p&gt;Data on which platforms are built and people are chained to.&lt;/p&gt;
&lt;p&gt;&lt;img alt="vaporwave aesthetic" src="francescomecca.eu/wp-content/uploads/2017/oc_starw.png"&gt;&lt;/p&gt;
&lt;h3&gt;Corporate smooth Jazz&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Floral Shoppe traces the outlines of the mental prison in which we now live, it gives us hope of one day transcending it. It reminds us what real freedom, the freedom of the heart, tastes like.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In the novel &lt;a href="https://en.wikipedia.org/wiki/Neuromancer"&gt;Neuromance&lt;/a&gt; by cyberpunk father William Gibson the Internet is conceived as some sort of "consensual allucination". In the world where that book was written Internet is just a collective delusion.&lt;/p&gt;
&lt;p&gt;Vaporwave forces us to recognize our helplessness with the Dataspace and for me it is a remembrace of a cyber-utopia that never got off the ground.&lt;/p&gt;&lt;/div&gt;</description><category>blog</category><category>cyberpunk</category><category>cyberspace</category><category>music</category><category>PesceWanda</category><category>utopia</category><category>vaporwave</category><guid>francescomecca.eu/blog/2017/5/9/vaporwave/</guid><pubDate>Tue, 09 May 2017 00:00:00 GMT</pubDate></item><item><title>Late Stage Capitalism meets FOSS</title><link>francescomecca.eu/blog/2017/5/7/latestage_handbrake/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;&lt;img alt="brainwashing" src="francescomecca.eu/wp-content/uploads/2017/hn_handbrake_hack.jpg"&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://archive.is/XA3rj"&gt;source&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;</description><category>apple</category><category>hacker news</category><category>handbrake</category><category>PesceWanda</category><category>propaganda</category><category>vendor lockin</category><guid>francescomecca.eu/blog/2017/5/7/latestage_handbrake/</guid><pubDate>Sun, 07 May 2017 00:00:00 GMT</pubDate></item><item><title>Some shallow thoughts from my tiny virtual space</title><link>francescomecca.eu/blog/2017/3/20/spazio-digitale-rant-facebook__eng/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;I am not the kind of guy who goes to concerts. Ever.&lt;/p&gt;
&lt;p&gt;I prefer studio recordings because in these, the logical thoughts of the artist emerge as the track comes to life and reaches our ears. I have always been attracted by that, much more than to the sprinkle of emotions that come from venues and theaters.&lt;/p&gt;
&lt;p&gt;In my case the exceptions are the live performances of Dale Crover (from The Melvins) and Jeff Mangum. Both of which were some kind of unshaped epiphanic experiences for me. &lt;/p&gt;
&lt;p&gt;Milan, December 2015, The Melvins were at the end of their most recent European tour when Jeff Pinkus drops the bass guitar, tunes the effects pedal and kicks the bass with his bare foot until the right repetition of sounds comes out of the speakers. Slowly, each one of the members leaves the stage, sounds are still coming from
the earlier kicks to the speakers up to my ears.&lt;/p&gt;
&lt;p&gt;Once home, the performance by The Melvins made me recognize the different stages of communication. &lt;/p&gt;
&lt;p&gt;We can think of three stages. The first one is &lt;strong&gt;trial&lt;/strong&gt;, or
experimentation, field test. This first phase is as obvious as it is accidental.&lt;/p&gt;
&lt;p&gt;The second stage is about &lt;strong&gt;excess&lt;/strong&gt;. Excess is to acknowledge that what was played today will be different to what will be played tomorrow. A draft becomes a singular work that may not come to an end.&lt;/p&gt;
&lt;p&gt;The last one is the most important one if we want to understand the dynamics of the Internet: &lt;strong&gt;dissipation&lt;/strong&gt;. With the act of dissipation, the work of the artist that reached its own way on a tiny and crucial fraction of time, that is the moment, folds on itself, and it is forever lost by an act of absence, the absence of objective memory.&lt;/p&gt;
&lt;h3&gt;Internet dynamics&lt;/h3&gt;
&lt;p&gt;On the internet &lt;strong&gt;hounding&lt;/strong&gt; supersedes &lt;em&gt;dissipation&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Hounding is the reason why thousands of men from different backgrounds congregate in small Facebook groups and share photos of their friends, wives and relevant others.&lt;/p&gt;
&lt;p&gt;On the original Italian &lt;a href="http://francescomecca.eu/pescewanda/2017/03/07/spazio-digitale-rant-facebook/"&gt;blog post&lt;/a&gt; I reported some Italian references on this phenomenon that dont have much cultural significance for the English readers. Therefore,
I want to explain the phenomenon in other words. &lt;/p&gt;
&lt;p&gt;The discussion about these Facebook groups in Italy consist of an online phenomenon regarding group of males playing what they call the game of "What would you do"
with sexually or less explicit photos of friends and wives.&lt;/p&gt;
&lt;p&gt;The game is as far as ever from an online &lt;a href="https://en.wikipedia.org/wiki/Role-playing_game"&gt;rpg&lt;/a&gt; or creative. It degrades every time in vulgar and extremist comments about the body of the girls depicted.&lt;/p&gt;
&lt;p&gt;I do believe that one of the many reasons to explain the inception of these online groups is the impossibility to overcome the absence of dissipation in online
communication.&lt;/p&gt;
&lt;p&gt;Machines do not remember but they never make us forget, they cross our space online with a continuous stream of photos and other people's moments.
Algorithms do not follow our placid flow of continuous time online and they snap it in collages of instants.&lt;/p&gt;
&lt;h3&gt;Recollection&lt;/h3&gt;
&lt;p&gt;In my first online experience, the interactions I had did not have the quality of recollection.
I divided my time between irc and mailing lists. I felt the obligation to archive every tiny succession of words that gave some light to me.&lt;/p&gt;
&lt;p&gt;(I still do).&lt;/p&gt;
&lt;p&gt;Then web caches arrived, the &lt;a href="francescomecca.eu/blog/2017/3/20/spazio-digitale-rant-facebook__eng/archive.org"&gt;Wayback Machine&lt;/a&gt;, Reddit, social networks. Nowdata can hardly ever disappear.&lt;/p&gt;
&lt;p&gt;It seems to me that it is just a worthy form of tenacity, not remembrance in any form.&lt;/p&gt;
&lt;p&gt;For the joy of archivists and the ones with a wistful gaze. And still unpleasant for someone.&lt;/p&gt;
&lt;p&gt;(This translation is for Madeline, thank you for still taking the time to read my blog)&lt;/p&gt;&lt;/div&gt;</description><category>community</category><category>Facebook</category><category>feudalesimo</category><category>feudalism</category><category>PesceWanda</category><category>Rivoluzione Digitale</category><guid>francescomecca.eu/blog/2017/3/20/spazio-digitale-rant-facebook__eng/</guid><pubDate>Mon, 20 Mar 2017 00:00:00 GMT</pubDate></item><item><title>Breve riflessione dal mio piccolo mondo virtuale</title><link>francescomecca.eu/blog/2017/3/7/spazio-digitale-rant-facebook/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;Non sono una persona che va ai concerti. &lt;/p&gt;
&lt;p&gt;La registrazione in studio esplicita i processi logici che l'artista segue per arrivare al processo di consegna e questo mi ha sempre affascinato, in maniera assai maggiore della carica emotiva sprigionata da un concerto di notte.&lt;/p&gt;
&lt;p&gt;Ma ci sono due artisti, Dale Crover dei Melvins e Jeff Mangum le cui performance live sono state per me, come spettatore, in qualche modo epifaniche.&lt;/p&gt;
&lt;p&gt;Milano, dicembre del 2015, i Melvins stanno concludendo il loro più recente tour in Europa quando Jeff Pinkus lascia cadere il basso sul pavimento, regola gli effetti sulla pedaliera e lo prende a calci finché non produce la giusta ripetizione di suoni. Lentamente ciascun musicista si allontana dal palco, il basso insistente, ancora a terra.&lt;/p&gt;
&lt;p&gt;Quell'esecuzione mi fece riflettere sui processi di produzione che dominano la nostra comunicazione.
Possiamo immaginarci delle fasi. La prima é quella di &lt;strong&gt;sperimentazione&lt;/strong&gt; che é tanto più ovvia quanto immediata e involontaria.&lt;/p&gt;
&lt;p&gt;La seconda é quella del &lt;strong&gt;superamento&lt;/strong&gt;. Superamento é la consapevolezza che il brano composto oggi verrà suonato diversamente domani, é la ragion d'essere delle bozze, anche quando infinite.&lt;/p&gt;
&lt;p&gt;La terza e quella più importante per comprendere le dinamiche di rete é la &lt;strong&gt;dissipazione&lt;/strong&gt;.
Attraverso la dissipazione l'opera, che fissata nel momento aveva acquisito una propria dimensione di senso, é costretta a ripiegarsi su se stessa, vana si perde a causa dell'assenza di memoria.&lt;/p&gt;
&lt;h3&gt;Le dinamiche della Rete&lt;/h3&gt;
&lt;p&gt;In rete l' &lt;strong&gt;accanimento&lt;/strong&gt; si sostituisce alla &lt;em&gt;dissipazione&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;L' accanimento é il motivo per cui qualche migliaio di uomini di qualsiasi fattura sociale si riuniscono in &lt;a href="http://archive.is/g6wDr#selection-989.483-989.484"&gt;gruppi&lt;/a&gt; e condividono foto delle loro mogli, fidanzate e qualche amica. Non c'é nessuno scandalo nella foto in sé, sono scatti quotidiani spesso "rubati" dagli stessi profili delle donne riprese.&lt;/p&gt;
&lt;p&gt;Ne ha parlato &lt;a href="http://espresso.repubblica.it/inchieste/2017/01/17/news/stupro-su-facebook-ecco-cosa-si-dicono-gli-uomini-che-umiliano-le-donne-1.293546"&gt;Repubblica&lt;/a&gt;, se ne é parlato su &lt;a href="https://www.reddit.com/r/italy/comments/5nqtgt/una_ragazza_su_facebook_ha_denunciato_lesistenza/"&gt;reddit&lt;/a&gt;, perfino &lt;a href="http://i.imgur.com/Of41aQ0.jpg"&gt;Mentana&lt;/a&gt; nella sua ridicola posizione da cavaliere bianco di Facebook ha urlato contro questo fenomeno.&lt;/p&gt;
&lt;p&gt;Fenomeno che dal mio punto di vista nasce da una difficoltà di alcuni abitanti della rete ad affrontare l'assenza di dissipazione nella comunicazione online.&lt;/p&gt;
&lt;p&gt;Le macchine non ricordano eppure non smettono di ricordarci, anzi invadono il nostro spazio in rete con un continuo susseguirsi di foto e momenti di vita delle altre persone.&lt;/p&gt;
&lt;p&gt;Gli algoritmi non seguono il pacato moto del nostro tempo online e anzi lo spezzano, lo frammentano in attimi che hanno il ritmo di un giro della rotella del mouse, lo scorrere di un pollice.&lt;/p&gt;
&lt;h3&gt;Memoria&lt;/h3&gt;
&lt;p&gt;Nei miei primi anni le mie fugaci interazioni virtuali non avevano la qualità della memoria.&lt;/p&gt;
&lt;p&gt;Bulimico degli ascii, passavo da lunghe e sostenute conversazioni su irc al lurking di qualche mailing list, saltuariamente 4chan. Mi sentivo (e mi sento tutt'ora) obbligato ad archiviare qualsiasi riga che suscitasse un minimo di interesse o potesse avere qualche valore futuro.&lt;/p&gt;
&lt;p&gt;Poi sono arrivate le cache, &lt;a href="francescomecca.eu/blog/2017/3/7/spazio-digitale-rant-facebook/archive.org"&gt;Wayback Machine&lt;/a&gt;, Reddit, e sembra che i contenuti non scompaiano più.&lt;/p&gt;
&lt;p&gt;Eppure mi ci é voluto un po' per capire che questa non é memoria, solo una forma nobile di accanimento.&lt;/p&gt;
&lt;p&gt;Piace ai nostalgici, agli archivisti. &lt;/p&gt;
&lt;p&gt;Spaventa a chi di Internet non vuole farsene una ragione.&lt;/p&gt;&lt;/div&gt;</description><category>community</category><category>Facebook</category><category>feudalesimo</category><category>PesceWanda</category><category>Rivoluzione Digitale</category><guid>francescomecca.eu/blog/2017/3/7/spazio-digitale-rant-facebook/</guid><pubDate>Tue, 07 Mar 2017 00:00:00 GMT</pubDate></item><item><title>Capire il Machine Learning (parte 3)</title><link>francescomecca.eu/blog/2016/11/15/machine-learning-parte3/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;h3&gt;Riconoscimento delle immagini&lt;/h3&gt;
&lt;p&gt;Il machine learning viene utilizzato anche per il riconoscimento delle immagini.
La tipologia di rete neurale utilizzata per questa applicazione è chiamata rete neural a convoluzione ( &lt;strong&gt;convolutional neural networks&lt;/strong&gt;), abbreviata CNN.&lt;/p&gt;
&lt;p&gt;Innanzitutto consideriamo che ogni immagine può essere codificata come una matrice di valori&lt;/p&gt;
&lt;p&gt;&lt;img alt="pixel" src="francescomecca.eu/wp-content/uploads/2016/8.jpg"&gt;&lt;/p&gt;
&lt;p&gt;Vediamo ora quali sono le operazioni compiute da una &lt;strong&gt;CNN&lt;/strong&gt; per riconoscere delle immagini.&lt;/p&gt;
&lt;h5&gt;Convoluzione&lt;/h5&gt;
&lt;p&gt;Durante la fase di apprendimento, la rete neurale analizza moltissime immagini (categorizzate) utilizzando dei "filtri", ovvero delle funzioni che mescolate all'input originale permettono di evidenziare dei pattern nell'immagine.
Questi pattern corrispondono alle caratteristiche proprie di un oggetto (quali possono essere ad esempio per un uccello il becco, le piume, le ali) e nel caso queste sono presenti, possiamo riconoscere l'immagine.&lt;/p&gt;
&lt;p&gt;In questo esempio l'immagine di Wally é mescolata (l'operazione si chiama &lt;strong&gt;convoluzione&lt;/strong&gt;) con un filtro "a cerchio" che risponde molto bene a caratteristiche come quella di possedere degli occhi.&lt;/p&gt;
&lt;p&gt;&lt;img alt="waldoblue" src="francescomecca.eu/wp-content/uploads/2016/bluefilter.png"&gt;&lt;/p&gt;
&lt;p&gt;La &lt;strong&gt;convoluzione&lt;/strong&gt; é un'operazione che ha la proprietà di essere indipendente dalla posizione. Non importa la posizione degli occhi, quando applichiamo la &lt;strong&gt;convoluzione&lt;/strong&gt; su un'immagine con un filtro "a cerchio" notiamo che gli occhi sono presenti.&lt;/p&gt;
&lt;h5&gt;Subsampling&lt;/h5&gt;
&lt;p&gt;Ogni segnale contiene del "rumore", ovvero degli elementi che la allontanano dal comportamento ideale. &lt;/p&gt;
&lt;p&gt;&lt;img alt="ideal" src="francescomecca.eu/wp-content/uploads/2016/ideal.jpg"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img alt="real" src="francescomecca.eu/wp-content/uploads/2016/real.jpg"&gt;&lt;/p&gt;
&lt;p&gt;Attraverso il subsampling possiamo ridurre il rumore e rendere il nostro algoritmo meno suscettibile a queste piccole variazioni; benché l'immagine abbia una risoluzione minore, i pattern rimangono.&lt;/p&gt;
&lt;p&gt;&lt;img alt="waldosub" src="francescomecca.eu/wp-content/uploads/2016/sub.png"&gt;&lt;/p&gt;
&lt;h5&gt;Connessione completa&lt;/h5&gt;
&lt;p&gt;Alla fine dell'analisi tutte le caratteristiche estrapolate vengono considerate nell'insieme e in questo modo possiamo capire a quale categoria appartiene l'immagine.&lt;/p&gt;
&lt;p&gt;Questo procedimento a livello algoritmo si esplicita con una connessione completa fra tutti i nodi della rete neurale che possono poi restituire l'output (probabilità che l'immagine appartenga ad una determinata categoria).&lt;/p&gt;
&lt;h5&gt;Fase di rinforzo&lt;/h5&gt;
&lt;p&gt;Durante il training é presente un'ultima fase (o strato), chiamato più propriamente &lt;strong&gt;loss layer&lt;/strong&gt;. Questo strato provvede a dare un &lt;strong&gt;feedback&lt;/strong&gt; alla rete neurale analizzando l'output in relazione ai dati di partenza (ovvero le immagini già categorizzate).&lt;/p&gt;&lt;/div&gt;</description><category>AI</category><category>algoritmi genetici</category><category>Genetic algorithm</category><category>Neural networks</category><category>PesceWanda</category><category>programming</category><category>reti neurali</category><guid>francescomecca.eu/blog/2016/11/15/machine-learning-parte3/</guid><pubDate>Tue, 15 Nov 2016 00:00:00 GMT</pubDate></item><item><title>Capire il Machine Learning (parte 2)</title><link>francescomecca.eu/blog/2016/11/11/machine-learning-parte2/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;Nel precedente &lt;a href="francescomecca.eu/pescewanda/2016/11/10/machine-learning-intro/"&gt;post&lt;/a&gt; abbiamo preso in considerazione una rete neurale molto basica.
Proviamo ora ad approfondire il concetto aggiungendo una proprietà fondamentale, la memoria.&lt;/p&gt;
&lt;h3&gt;Memoria e Stati&lt;/h3&gt;
&lt;p&gt;La rete neurale che abbiamo modellato non ha alcun tipo di memoria. con gli stessi dati di input, l'output è (quasi certamente) lo stesso.
Possiamo ampliare il nostro modello introducendo il concetto di &lt;em&gt;stato&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Poniamo il problema della vendita delle auto in questo modo:
immaginiamo di avere un algoritmo di machine learning che valuti le auto e faccia delle offerte di vendita che conseguentemente vengono valutate da delle persone e accettate oppure rifiutate.
Ogni volta che una proposta viene accettata la teniamo in memoria e nell'aggiustare i pesi per la seguente offerta, teniamo in considerazione la validità dei pesi usati in precedenza.
In altre parloe, in ogni operazione di valutazione dell'auto salviamo lo stato dell'offerta precedente (rifiutata o accettata) e la consideriamo quando vogliamo proporre l'offerta successiva.
Abbiamo in questo modo una &lt;em&gt;recurrent neural network&lt;/em&gt; (RNN) dove ogni stato precedente viene utilizzato per modificare l'output dell'algoritmo.&lt;/p&gt;
&lt;h5&gt;Generazione di testo attraverso le RNN&lt;/h5&gt;
&lt;p&gt;Immaginiamo di voler creare un algoritmo che utilizzando una RNN possa generare del testo o prevedere quale sarà il prossimo carattere inserito (come nel caso del T9).&lt;/p&gt;
&lt;p&gt;Inizialmente dobbiamo permettere alla RNN di analizzare almeno qualche sample del nostro testo.
La RNN analizza carattere dopo carattere e costruisce un grande grafo dove collega ogni carattere al suo successivo.
Inizialmente l'output della nostra RNN non ha alcun valore:
in questo esempio, abbiamo l'output di una RNN allenata attraverso Guerra e Pace:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;tyntd-iafhatawiaoihrdemot lytdws e ,tfti, astai f ogoh eoase rrranbyne 'nhthnee e
plia tklrgd t o idoe ns,smtt h ne etie h,hregtrs nigtike,aoaenns lngty
&lt;/pre&gt;
&lt;p&gt;L'output prodotto dalla RNN, benchè non abbia nessun valore per un umano, viene analizzato dalla RNN per arricchire il grafo costituito inizialmente dai caratteri (e le loro relazioni) di Guerra e Pace.
Questo procedimento continua all'infinito.
Ogni volta che la RNN produce dell'output lo salva e lo riutilizza come input in maniera ricorsiva per generare nuovo output.&lt;/p&gt;
&lt;p&gt;Dopo 300 iterazioni abbiamo un output di questo tipo:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;"Tmont thithey" fomesscerliund
Keushey. Thom here
sheulke, anmerenith ol sivh I lalterthend Bleipile shuwy fil on aseterlome
coaniogennc Phe lism thond hon at. MeiDimorotion in ther thize."
&lt;/pre&gt;
&lt;p&gt;Dopo quasi mille:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;Aftair fall unsuch that the hall for Prince Velzonski's that me of
her hearly, and behs to so arwage fiving were to it beloge, pavu say falling misfort
how, and Gogition is so overelical and ofter.
&lt;/pre&gt;
&lt;p&gt;Duemila:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;"Why do what that day," replied Natasha, and wishing to himself the fact the
princess, Princess Mary was easier, fed in had oftened him.
Pierre aking his soul came to the packs and drove up his father-in-law women.
&lt;/pre&gt;
&lt;p&gt;Possiamo notare come l'output migliori visibilmente.&lt;/p&gt;
&lt;p&gt;Nel prossimo post tratterò una variante di rete neurale utilizzata per classificare e riconoscere immagini.&lt;/p&gt;&lt;/div&gt;</description><category>AI</category><category>algoritmi genetici</category><category>Genetic algorithm</category><category>Neural networks</category><category>PesceWanda</category><category>programming</category><category>reti neurali</category><guid>francescomecca.eu/blog/2016/11/11/machine-learning-parte2/</guid><pubDate>Fri, 11 Nov 2016 00:00:00 GMT</pubDate></item><item><title>Capire il Machine Learning (parte 1)</title><link>francescomecca.eu/blog/2016/11/10/machine-learning-intro/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;Questo è il primo di una serie di post che hanno l'obbiettivo di fornire una breve e generale introduzione al mondo del machine learning e delle intelligenze artificiali più in generale.
Mi auguro che questa breve introduzione al mondo dell'apprendimento automatico sia una sorta di vaccino contro il sensazionalismo mediatico e la disinformazione che negli ultimi anni fanno da contorno al progresso in questo settore.&lt;/p&gt;
&lt;h3&gt;Non c'è risultato senza algoritmo&lt;/h3&gt;
&lt;p&gt;Nelle scienze informatiche un algoritmo è un insieme di istruzioni che partendo da uno stato iniziale (input) permette di arrivare ad uno stato finale (output) attraverso una serie di step logici.
Ogni algoritmo utilizza una logica propria e specifica per il problema di cui si occupa.
Nel caso del machine learning l'algoritmo non viene progettato in base al tipo di problema bensì vengono utilizzati algoritmi generici adattabili attraverso dei parametri.
L'algoritmo di machine learning analizza i vari parametri e i dati che riceve "in pasto" al fine di raggiungere lo stato di output ottimale.
L'output ottimale è la migliore approssimazione di un risultato teorico che si raggiunge nella fase di "training".&lt;/p&gt;
&lt;h3&gt;La macchina impara&lt;/h3&gt;
&lt;p&gt;Nella fase di allenamento o di apprendimento, il "training", si possono adottare due tecniche differenti: apprendimento con supervisione ( &lt;strong&gt;supervised learning&lt;/strong&gt; ) e apprendimento senza supervisione ( &lt;strong&gt;unsupervised learning&lt;/strong&gt; ).&lt;/p&gt;
&lt;h5&gt;Supervised Learning&lt;/h5&gt;
&lt;p&gt;Immaginiamo di dover valutare il prezzo di un'automobile usata senza essere esperti in materia.
Noi abbiamo questi dati:&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;PREZZO ORIGINALE&lt;/th&gt;
&lt;th align="center"&gt;Km percorsi&lt;/th&gt;
&lt;th align="center"&gt;stato di usura&lt;/th&gt;
&lt;th align="right"&gt;PREZZO FINALE&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;50 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="center"&gt;lieve&lt;/td&gt;
&lt;td align="right"&gt;40 000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30 000&lt;/td&gt;
&lt;td align="center"&gt;150 000&lt;/td&gt;
&lt;td align="center"&gt;notevole&lt;/td&gt;
&lt;td align="right"&gt;8 000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;80 000&lt;/td&gt;
&lt;td align="center"&gt;lieve&lt;/td&gt;
&lt;td align="right"&gt;15 000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="center"&gt;notevole&lt;/td&gt;
&lt;td align="right"&gt;...&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Dalla tabella possiamo dedurre la caratteristica fondamentale del &lt;strong&gt;supervised learning&lt;/strong&gt;: abbiamo due vettori (serie di dati) di input (prezzo originale) e di output (prezzo finale) che hanno una correlazione certa e valida.&lt;/p&gt;
&lt;p&gt;Possiamo dedurre intuitivamente quale sarà il prezzo dell'ultima auto se analizziamo i dati precedenti.
Questo è quello che succede nel caso del &lt;strong&gt;supervised learning&lt;/strong&gt;.
Un algoritmo di machine learning che utilizza il &lt;strong&gt;supervised learning&lt;/strong&gt; estrapolerà la relazione fra i vari dati e in questo modo potrà ottenere un determinato output partendo dai dati di input.
Possiamo capire già da ora che nel caso ci fossero dati che "inquinano" il nostro data set, come ad esempio il colore dell'auto, l'algoritmo non sarà capace di fare un'analisi corretta.&lt;/p&gt;
&lt;p&gt;La precisione della soluzione dipende dalla quantità di dati e dall'influenza che questi hanno nella situazione reale.&lt;/p&gt;
&lt;h2&gt;Unsupervised Learning&lt;/h2&gt;
&lt;p&gt;Nel caso di unsupervised learning ci troviamo di fronte agli stessi dati ma senza la possibilità di conoscere il prezzo finale.&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;PREZZO ORIGINALE&lt;/th&gt;
&lt;th align="center"&gt;Km percorsi&lt;/th&gt;
&lt;th align="right"&gt;stato di usura&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;50 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="right"&gt;lieve&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30 000&lt;/td&gt;
&lt;td align="center"&gt;150 000&lt;/td&gt;
&lt;td align="right"&gt;notevole&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;80 000&lt;/td&gt;
&lt;td align="right"&gt;lieve&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="right"&gt;notevole&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Non siamo capaci di stabilire il prezzo finale attraverso l'unsupervised learning, ma possiamo stabilire dei pattern fra i vari dati.
Non c'è nessun tipo di feedback (il prezzo finale) che possa aiutarci a capire se il risultato sia giusto ma possiamo analizzare le notevoli relazioni fra i dati.&lt;/p&gt;
&lt;h2&gt;Machine Learning e intelligenza&lt;/h2&gt;
&lt;p&gt;Concentriamoci sul &lt;strong&gt;supervised learning&lt;/strong&gt;.
Nel caso della vendita dell'automobile, abbiamo un semplice problema con una soluzione lineare di questo tipo:
&lt;em&gt;prezzo finale&lt;/em&gt; = &lt;em&gt;prezzo originale&lt;/em&gt; + &lt;em&gt;km percorsi&lt;/em&gt; + stato di usura&lt;/p&gt;
&lt;p&gt;Ovviamente ogni incognita nella nostra equazione influisce diversamente sul prezzo finale e quindi possiamo riscriverla come:
&lt;em&gt;prezzo finale&lt;/em&gt; = A &lt;em&gt;&lt;em&gt;prezzo originale&lt;/em&gt; + B &lt;/em&gt;&lt;em&gt;km percorsi&lt;/em&gt; + C * stato di usura&lt;/p&gt;
&lt;p&gt;Se pensiamo ad un algoritmo possiamo ragionare in questo modo:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;&lt;span class="n"&gt;funzione&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="n"&gt;calcola_prezzo_auto&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="n"&gt;parametri&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="n"&gt;prezzo_originale&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="n"&gt;km_percorsi&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="n"&gt;stato_usura&lt;/span&gt;
&lt;span class="n"&gt;variabili&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="n"&gt;prezzo_finale&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;
&lt;span class="n"&gt;prezzo&lt;/span&gt; &lt;span class="n"&gt;finale&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;prezzo_originale&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="mf"&gt;0.804246&lt;/span&gt;
&lt;span class="n"&gt;prezzo&lt;/span&gt; &lt;span class="n"&gt;finale&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;prezzo_finale&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;km_percorsi&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mf"&gt;0.000125&lt;/span&gt;
&lt;span class="n"&gt;prezzo&lt;/span&gt; &lt;span class="n"&gt;finale&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="n"&gt;prezzo_finale&lt;/span&gt; &lt;span class="o"&gt;+&lt;/span&gt; &lt;span class="n"&gt;stato_usura&lt;/span&gt; &lt;span class="o"&gt;*&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;2500&lt;/span&gt;
&lt;/pre&gt;
&lt;p&gt;I valori di quelle costanti, stabilite casualmente nell'esempio, sono chiamate &lt;em&gt;pesi&lt;/em&gt; e servono a stimare il prezzo finale.
Una volta stabiliti i pesi, il nostro algoritmo di supervised learning applica questi pesi ai dati originali e ne valuta l'errore:&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;PREZZO ORIGINALE&lt;/th&gt;
&lt;th align="center"&gt;Km percorsi&lt;/th&gt;
&lt;th align="center"&gt;stato di usura&lt;/th&gt;
&lt;th align="center"&gt;PREZZO FINALE&lt;/th&gt;
&lt;th align="right"&gt;PREZZO STIMATO&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;50 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="center"&gt;lieve&lt;/td&gt;
&lt;td align="center"&gt;40 000&lt;/td&gt;
&lt;td align="right"&gt;374888&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;30 000&lt;/td&gt;
&lt;td align="center"&gt;150 000&lt;/td&gt;
&lt;td align="center"&gt;notevole&lt;/td&gt;
&lt;td align="center"&gt;8 000&lt;/td&gt;
&lt;td align="right"&gt;16000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;80 000&lt;/td&gt;
&lt;td align="center"&gt;lieve&lt;/td&gt;
&lt;td align="center"&gt;15 000&lt;/td&gt;
&lt;td align="right"&gt;13492&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;20 000&lt;/td&gt;
&lt;td align="center"&gt;120 000&lt;/td&gt;
&lt;td align="center"&gt;notevole&lt;/td&gt;
&lt;td align="center"&gt;...&lt;/td&gt;
&lt;td align="right"&gt;10988&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Una volta valutato l'errore e la distanza dal prezzo finale, l'algoritmo di machine learning modifica i pesi di conseguenza e ripete la procedura fino ad arrivare al risultato che più si avvicina ai dati iniziali.
&lt;img alt="rete1" src="francescomecca.eu/wp-content/uploads/2016/reteneurale1.jpg"&gt;
Ci sono varie funzioni che stimano l'errore e permettono di correggere i pesi o metodi che restringono lo spazio di ricerca fino a convergere alla soluzione, ovvero i pesi cercati.&lt;/p&gt;
&lt;h3&gt;Reti Neurali&lt;/h3&gt;
&lt;p&gt;Ora, come possiamo immaginare, il prezzo di un'auto ha molti fattori che si aggiungono a quelli elencati nell'esempio.
Non solo, ma molti problemi non hanno una soluzione lineare, ovvero una soluzione che si può semplicemente esprimere attraverso una funzione che aggiunge e moltiplica i valori una sola volta.&lt;/p&gt;
&lt;p&gt;Possiamo arricchire l'esempio dell'automobile immaginando di avere più set di pesi e di ripetere il procedimento più volte:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;|---------------------------------------------------|
| PREZZO_ORIG * peso A1 -----&amp;gt; |
| KM_PERCORSI * peso B1 -----&amp;gt; |
| STATO_USURA * peso C1 -----&amp;gt; |
| PREZZO FINALE STIMATO 1|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A2 -----&amp;gt; |
| KM_PERCORSI * peso B2 -----&amp;gt; |
| STATO_USURA * peso C2 -----&amp;gt; |
| PREZZO FINALE STIMATO 2|
|---------------------------------------------------|
| --------------------------------------------------|
| PREZZO_ORIG * peso A3 -----&amp;gt; |
| KM_PERCORSI * peso B3 -----&amp;gt; |
| STATO_USURA * peso C3 -----&amp;gt; |
| PREZZO FINALE STIMATO 3|
|---------------------------------------------------|
&lt;/pre&gt;
&lt;p&gt;E ora immaginiamo di combinare ogni PREZZO FINALE STIMATO in un'ultimo risultato:&lt;/p&gt;
&lt;pre class="code literal-block"&gt;&lt;span&gt;&lt;/span&gt;| --------------------------------------------------|
| PREZZO_1 * peso X -----&amp;gt; |
| PREZZO_2 * peso Y -----&amp;gt; |
| PREZZO_3 * peso Z -----&amp;gt; |
| PREZZO FINALE DEF |
|---------------------------------------------------|
&lt;/pre&gt;
&lt;p&gt;Questa é, seppur molto basica, una rete neurale.
Proviamo a visualizzarla in un'immagine dove i box arancioni sono i nodi di input e i rossi sono i nodi "nascosti" e temporanei.&lt;/p&gt;
&lt;p&gt;&lt;img alt="rete2" src="francescomecca.eu/wp-content/uploads/2016/reteneurale2.jpg"&gt;&lt;/p&gt;
&lt;p&gt;In una rete neurale (&lt;em&gt;neural networks&lt;/em&gt;) abbiamo:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;i neuroni: la funzione di stima e i set di pesi;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;le catene: i collegamenti fra neuroni che permettono di valutare il prezzo più volte.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Nel prossimo &lt;a href="francescomecca.eu/pescewanda/2016/11/11/machine-learning-PARTE2"&gt;post&lt;/a&gt; cercherò di approfondire il concetto di rete neurale con degli esempi di applicazioni concrete.&lt;/p&gt;&lt;/div&gt;</description><category>AI</category><category>algoritmi genetici</category><category>Genetic algorithm</category><category>Neural networks</category><category>PesceWanda</category><category>programming</category><category>reti neurali</category><guid>francescomecca.eu/blog/2016/11/10/machine-learning-intro/</guid><pubDate>Thu, 10 Nov 2016 00:00:00 GMT</pubDate></item><item><title>A short talk about cryptography at the Berkman Klein Center</title><link>francescomecca.eu/blog/2016/7/7/pres-berk/</link><dc:creator>Francesco Mecca</dc:creator><description>&lt;div&gt;&lt;p&gt;The 7th of July me and &lt;a href="http://studentprivacy.ca"&gt;Aaron&lt;/a&gt;, as interns at the &lt;a href="http://cyber.law.harvard.edu"&gt;Berkman Klein for Internet and Society&lt;/a&gt;, gave a presentation on the basics of cryptography and a quick overview on the essential tools.&lt;/p&gt;
&lt;p&gt;What follows is a short summary of that presentation. The slides are available &lt;a href="francescomecca.eu/wp-content/uploads/2016/fwneas.pptx"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Whose Security?&lt;/h4&gt;
&lt;p&gt;Let's define what security is. Security is the possibility to being set free from structural costraints, and as that we can distinguish various levels of security depending on who we are.&lt;/p&gt;
&lt;p&gt;Also, if we want to investigate security we should also define our threats: security, as being set free, from intelligence surveillance can be our target. Our concerns as different if we consider instead security from censorship or corporation data mining.&lt;/p&gt;
&lt;p&gt;&lt;img alt="uber god view" src="francescomecca.eu/wp-content/uploads/2016/godmode.png"&gt;
&lt;img alt="facebook law enforcement form" src="francescomecca.eu/wp-content/uploads/2016/fb.png"&gt;&lt;/p&gt;
&lt;p&gt;What is shown above is the &lt;a href="http://www.theverge.com/2016/1/6/10726004/uber-god-mode-settlement-fine"&gt;Uber God View&lt;/a&gt;, a tool Uber used to track a Buzzfeed's journalist locations, and the Facebook standard form that is given to law enforcement when requested.&lt;/p&gt;
&lt;h4&gt;Security is a state of mind&lt;/h4&gt;
&lt;p&gt;Security is hard. It is really rare to reach a state of complete security and even in that case, it depends on our target.&lt;/p&gt;
&lt;p&gt;What is important is to train ourselves to security. Security is a state of mind and there are no tools that automatically protect us without our active partecipation.&lt;/p&gt;
&lt;p&gt;Let's explore that in details.&lt;/p&gt;
&lt;h4&gt;The layers of security&lt;/h4&gt;
&lt;p&gt;We can distinguish four layers of security:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Device Security&lt;/li&gt;
&lt;li&gt;Network Security&lt;/li&gt;
&lt;li&gt;Message Security&lt;/li&gt;
&lt;li&gt;Human Security&lt;/li&gt;
&lt;/ul&gt;
&lt;h6&gt;Device Security, where everything happens&lt;/h6&gt;
&lt;p&gt;Device security is related to the "physical host".&lt;/p&gt;
&lt;p&gt;If the computer we use is tampered, at the hardware level, or the phone is bugged, there is no way to escape using higher level tools.&lt;/p&gt;
&lt;p&gt;In other words, it doesn't matter if we use a super secure password if our computer is registering all our keystrokes and send them to a third party.&lt;/p&gt;
&lt;p&gt;Also, device security is useful if we consider that our device can fall into the hands of attackers that may be able to traceback all the activities.&lt;/p&gt;
&lt;p&gt;Some precautions for this purpose:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;full disk encryption&lt;/li&gt;
&lt;li&gt;minimal set of application installed&lt;/li&gt;
&lt;li&gt;open source operating systems&lt;/li&gt;
&lt;/ul&gt;
&lt;h6&gt;Network Security&lt;/h6&gt;
&lt;p&gt;The network is the infrastructures that our device is attached to. In most of the case, when we consider our computer is the internet (and the GSM network in case of mobile phones).&lt;/p&gt;
&lt;p&gt;Network security is essential to evade censorship, behavioural tracking and identity theft.&lt;/p&gt;
&lt;p&gt;Some tools that may help in this case:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;vpn&lt;/li&gt;
&lt;li&gt;tor&lt;/li&gt;
&lt;li&gt;p2p networks&lt;/li&gt;
&lt;li&gt;mesh networks&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;And for the web:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;opensource web browsers (such as firefox)&lt;/li&gt;
&lt;li&gt;no google apps on android phones&lt;/li&gt;
&lt;li&gt;https&lt;/li&gt;
&lt;/ul&gt;
&lt;h6&gt;Message Security&lt;/h6&gt;
&lt;p&gt;Message security is the level of protection regarding the content that you want to send or receive.&lt;/p&gt;
&lt;p&gt;Message security is essential if you want to avoid any third party snooping and the confidentiality of your messages.&lt;/p&gt;
&lt;p&gt;The tools we can use in this context:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OTR&lt;/li&gt;
&lt;li&gt;opensource messaging protocols (XMPP, matrix)&lt;/li&gt;
&lt;li&gt;Signal&lt;/li&gt;
&lt;li&gt;PGP&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Also, always remember that encrypting the content of the message doesn't guarantee that your identity and the metadata are hidden.&lt;/p&gt;
&lt;h6&gt;Human Security, the weakest link&lt;/h6&gt;
&lt;p&gt;Everything comes down to the human level at a certain point.&lt;/p&gt;
&lt;p&gt;This is way it is important to train ourselves in security.&lt;/p&gt;
&lt;p&gt;If we consider &lt;a href="https://en.wikipedia.org/wiki/Kevin_Mitnick"&gt;Kevin Mitnick's history&lt;/a&gt;, or the recent &lt;a href="http://thehackernews.com/2015/11/fbi-cia-director-hack.html"&gt;FBI deputy director hack&lt;/a&gt; we see that social engineering plays a big role when we want to undermine the security of an individual of interest.&lt;/p&gt;
&lt;p&gt;But security matters even if we are not target of interest.&lt;/p&gt;
&lt;p&gt;For example let's consider our password. If we use the same password on every site and one cracker manages to gain access to just one of them, our whole activities online can be exposed and our identity stolen. &lt;a href="http://www.nydailynews.com/news/national/mark-zuckerberg-twitter-account-hacked-password-dadada-article-1.2662351"&gt;This is relevant&lt;/a&gt;. Myspace had its database breached and the password of Zuckerberg (even a simple one) was exposed. Given that he used the same password on twitter and other sites, his multiple accounts were compromised.&lt;/p&gt;
&lt;h4&gt;What is TOR and how it works&lt;/h4&gt;
&lt;p&gt;When you visit a website with your mobile phone or a browser on your computer lots of things go on under the hoods.&lt;/p&gt;
&lt;p&gt;Your computer, as a client, makes what is called an &lt;a href="https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment"&gt;handshake&lt;/a&gt; with the server.&lt;/p&gt;
&lt;p&gt;After telling the server that the client is interested in its content, a series of packets containing data is exchanged.&lt;/p&gt;
&lt;p&gt;That is the content of a connection. Inside this packets there are a multitude of information of two kinds:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the web page or the content we are trying to visualize&lt;/li&gt;
&lt;li&gt;information on the status of both the server and the client&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The informations contained in every packet can be analized to understand the "identity" of the client that is requesting the content on the server, first of all the IP that is a sort of web address that every computer on the net has.&lt;/p&gt;
&lt;p&gt;Not only, during the transmission of this packets, various entity on the communication channel can analize the content and mine our data.&lt;/p&gt;
&lt;p&gt;&lt;img alt="Cute infographic" src="francescomecca.eu/wp-content/uploads/2016/tor-https-0.png"&gt;&lt;/p&gt;
&lt;p&gt;TOR still uses this kind of routine to gather the content of a web page, but instead of connecting directly to the destination server it goes through a series of other servers called relay: instead of going directly from A to B, it goes from A to C to D to E to F to B.&lt;/p&gt;
&lt;p&gt;If the web was a kindergarden Alice instead of telling directly her phrase to Bob, she would tell the word to a friend that in turn would tell the word to a friend and so on, until Bob heards the word, without knowing that Alice said that at the beginning.&lt;/p&gt;
&lt;p&gt;At this point you should ask yourself: are the data more protected if it goes through a network of relays? It actually is given that every time you send a packet through the TOR network, it gets encrypted so that no one knows it's content.&lt;/p&gt;
&lt;p&gt;To tell the truth, actually the relay (called exit node) that will send the packet to the destination server, knows the content of the packet but does not know the origin.&lt;/p&gt;
&lt;p&gt;Ultimately a website can be entirely hosted on the TOR network, called the onion network, so that the packets never exit from the relays and the relay don't know the phisycal location of the server, so every entity on the network reach a perfect level of anonimacy.&lt;/p&gt;
&lt;h4&gt;Who owns the relays?&lt;/h4&gt;
&lt;p&gt;Actually every one can host and own a relay if they are willing to do so.
I personally host one right now and there are many others that share a little fraction of their network connection.&lt;/p&gt;
&lt;p&gt;&lt;img alt="My little raspi is moving some packets right now" src="francescomecca.eu/wp-content/uploads/2016/screenraspy.png"&gt;&lt;/p&gt;
&lt;p&gt;Running a relay node is very easy and everybody should do so. Running an exit node instead is more troublesome and I don't suggest it if you are not a big entity that can handle some sorts of occasional trouble.&lt;/p&gt;
&lt;h4&gt;Don't play the fool on the TOR network&lt;/h4&gt;
&lt;p&gt;Of course TOR doesn't guarantee you perfect anonimacy. At the end it all comes to the human layer.&lt;/p&gt;
&lt;p&gt;It's no use to surf the web through TOR if we then log in to our personal blog or our personal facebook page.&lt;/p&gt;
&lt;p&gt;But there are other subtle factors that can be exploited by web companies to gather info and track their users.A&lt;/p&gt;
&lt;p&gt;Such factors are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the size of the screen and the colors supported by it&lt;/li&gt;
&lt;li&gt;the timezone&lt;/li&gt;
&lt;li&gt;canvas and images that the server asks your computer to generate&lt;/li&gt;
&lt;li&gt;information about your OS that are sent through packets&lt;/li&gt;
&lt;li&gt;the fonts available on your system&lt;/li&gt;
&lt;li&gt;touch support&lt;/li&gt;
&lt;li&gt;cookies&lt;/li&gt;
&lt;li&gt;ads and cross site requests&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In particular, most of these are exploitable using a web programming language, javascript, that lots of web pages uses to render content. TOR users should avoid the use of javascript.&lt;/p&gt;
&lt;h4&gt;Public Private Key Encryption&lt;/h4&gt;
&lt;p&gt;While TOR is recent technology, public key encryption is a concept way older.&lt;/p&gt;
&lt;p&gt;What happens when we use public / private key encryption tools is conceptually similar to what happens with our physical correspondence.&lt;/p&gt;
&lt;p&gt;A public key is similar to our mailbox.&lt;/p&gt;
&lt;p&gt;Everyone that knows the location of a person's mailbox can write a message and put it inside but only the owner of that mailbox, using is own key can open the mailbox and read the various messages.&lt;/p&gt;
&lt;p&gt;When we use PGP or GPG (an implementation of the public key encription concept) we generate a pair of key.&lt;/p&gt;
&lt;p&gt;A public one that we should broadcast or at least share with our social circle, and a private key that must remain secret at any cost.&lt;/p&gt;
&lt;p&gt;Everyone can encrypt every kind of digital content using our public key (that is just a really long string) and only the owner of the private key can proceed to decryption of the content.&lt;/p&gt;
&lt;p&gt;This also means that we know who is gonna read the message if encrypted using this kind of technologies.&lt;/p&gt;
&lt;p&gt;One easy tool for GPG encryption is &lt;a href="https://www.gnupg.org/%28en%29/related_software/gpa/index.html"&gt;GPA&lt;/a&gt;&lt;/p&gt;
&lt;h4&gt;Metadata&lt;/h4&gt;
&lt;p&gt;What would you do if you were asked to put under surveillance one person?&lt;/p&gt;
&lt;p&gt;For sure placing a bug with microphone and recording capabilities would be the best option.&lt;/p&gt;
&lt;p&gt;But what if, instead of recording every thing the subject does, we just take a note of all his actions, without taking care of the content. For example, if the subject speaks to someone, we record the time, the place, the duration of the conversation and all the info of the person he is talking with.
What if, when the person walks into a mall, we record the time, the location, the shops he entered, the money he spent, the number of things bought, but not the things he bought, in detail.&lt;/p&gt;
&lt;p&gt;You can see that you can have a fairly precise idea of the habits of the person under your surveillance.&lt;/p&gt;
&lt;p&gt;Actually from metadata is easy to grab all kinds of personal information. Also, if a tiny portions of the information we have on the subject are more detailed (for example social network photos) we have a picture as clear as never.&lt;/p&gt;
&lt;p&gt;This is not just one of the biggest concern that should pop into your mind when you are talking about nation wide mass surveillance, it is also the core of the business of corporations like Facebook and Google.&lt;/p&gt;
&lt;p&gt;Whatsapp does not read the content of your messages but it stores every single bit of metadata that comes with it.&lt;/p&gt;
&lt;p&gt;Metadatas are enought to build a complete profile of the users and they are even more dangerous in the hands of an evil state agency.&lt;/p&gt;
&lt;h4&gt;Nothing to hide&lt;/h4&gt;
&lt;p&gt;Even if we have nothing to hide, we have much to fear.&lt;/p&gt;
&lt;p&gt;The "nothing to hide" argument is something that everyone of us in this room has heard, at least one time.&lt;/p&gt;
&lt;p&gt;We should fear this sentence because it is the ultimate ammision of a big misunderstanding on the whole debate.&lt;/p&gt;
&lt;p&gt;Privacy, first of all, is &lt;strong&gt;control&lt;/strong&gt; over our data, not only the right to secrecy.&lt;/p&gt;
&lt;h6&gt;Transparency should be for everyone&lt;/h6&gt;
&lt;p&gt;There is a big incoherence when asking to your citizens to handle over their data. &lt;/p&gt;
&lt;p&gt;Transparency should be a two way thing, while at the current state big three letter agencies, but high level people as well, cover their tracks and are not transparent on their reports. &lt;/p&gt;
&lt;p&gt;This enhance a situation of big inequality between the people and the State.&lt;/p&gt;
&lt;p&gt;Even worse, it is not the citizen by himself that can choose if he has something to hide, but the autority.&lt;/p&gt;
&lt;p&gt;This may seem a little naive to say, but with Bruce words:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is true even without considering social discrimination and mass media manipolation.&lt;/p&gt;
&lt;h6&gt;The fundamental of society&lt;/h6&gt;
&lt;p&gt;Every action can be seen as either legal or illegal. When we take a decision this is one of the first, implicit concern.&lt;/p&gt;
&lt;p&gt;This is not true in a surveillance system: when you are doing something your concern is all about the possibility of raising suspicion.&lt;/p&gt;
&lt;p&gt;An idea not an action is what is needed in such a dystopic condition to prove a citizen guilty.&lt;/p&gt;
&lt;h6&gt;Sometimes two wrongs make a right&lt;/h6&gt;
&lt;p&gt;In America we are now discussing weed legalization.&lt;/p&gt;
&lt;p&gt;Do you think that such debate would have been possible if no one could had the possibility, even if against the law, to try that substance and show other citizen the real implications of their actions?&lt;/p&gt;
&lt;p&gt;The same goes for gay marriages, that we are discussing in Italy. Challenging the law, breaking it if needed, is a way to improve the current system.&lt;/p&gt;
&lt;p&gt;Inside the panopticon every &lt;strong&gt;potential&lt;/strong&gt; criminal would be persecuted and this kind of advancement would not be possible.&lt;/p&gt;
&lt;h4&gt;To hide is to care&lt;/h4&gt;
&lt;p&gt;A simple truth is that we don't close the windows to cover up our crimes. &lt;/p&gt;
&lt;p&gt;Our innermost experiences become in our intimacy, which is the most sacred place.&lt;/p&gt;&lt;/div&gt;</description><category>Berkman Center internet and society</category><category>Berkman Klein internship</category><category>cryptography</category><category>encription</category><category>nothing to hide</category><category>PesceWanda</category><category>public key private key</category><category>TOR</category><guid>francescomecca.eu/blog/2016/7/7/pres-berk/</guid><pubDate>Thu, 07 Jul 2016 00:00:00 GMT</pubDate></item></channel></rss>