BARBELITH underground
 

Subcultural engagement for the 21st Century...
Barbelith is a new kind of community (find out more)...
You can login or register.


Alpha Geek

 
 
Fist Fun
10:57 / 04.05.02
Tim O'Reilly's "Inventing the future":
"So often, signs of the future are all around us, but it isn't until much later that most of the world realizes their significance. Meanwhile, the innovators who are busy inventing that future live in a world of their own. They see and act on premises not yet apparent to others. In the computer industry, these are the folks I affectionately call "the alpha geeks," the hackers who have such mastery of their tools that they "roll their own" when existing products don't give them what they need.

The alpha geeks are often a few years ahead of their time. They see the potential in existing technology, and push the envelope to get a little (or a lot) more out of it than its original creators intended. They are comfortable with new tools, and good at combining them to get unexpected results."


What does Barbelith think of this? Are you an Alpha Geek? Thinking about it, I start to wonder if the Alpha geeks of the future will necessarily be human. Who better to understand the bewildering complexities of technology than thinking machines...then again, the article talks about innovation, which has so far been a human trait.
So will the future ruling class be the Alpha Geek? Will it be entirely human?
 
 
The Knowledge
14:09 / 04.05.02
In answer to your question "are you an Alpha geek?" Yes, I think that in my sense I am. Not technologically but 'philosophically'. The thing about the majority of geniuses is that they don't actually realise they are geniuses, because their 'genius' thoughts are as obvious to them as any other thought process, and, if anything, they are considered not smart/retards because people think they are talking out of their arses - unless they win a Nobel prize or astound critics world-wide with their ideas, which rarely happens in the lifetime of geniuses. Patents, professional jealousy and monetary/legal restraints get in the way see.

But I keep trying
 
 
Tom Coates
08:59 / 05.05.02
Passing swiftly on from that display of humility and self-knowledge, I'd just like to say that a couple of my friends have gone to the Emerging Tech conference and I'm really bloody jealous. I know a few Alpha Geeks, but I think you have to be a programmer to really understand the way this stuff develops. I know enough about the web and related technologies now to be frustrated by the limits of some of the stuff on offer and to have ideas about how they could be improved. But those ideas don't necessarily translate into the ability to make them happen. Which is why I'm profoundly grateful that I know someone like Cal who is prepared to co-implement some of the dumb ideas I have...
 
 
Fist Fun
10:37 / 05.05.02
Why don't you learn what you need, though? I think the point about the "alpha geek" is that they need not just technical skills, nor creative skills but both. Perhaps business skills are needed as well.
How many people do blend these skillsets, though? Perhaps the "alpha geek" is more likely to be a group of people, a collaboration.
 
 
Tom Coates
13:59 / 05.05.02
Phew. I think the chances of me having time to learn programming languages well enough to be able to effectively implement the kind of thing I'm talking about (with me having absolutely no programming experience of any kind) are fairly limited... It's probably best to specialise and work in tiny like-minded teams..
 
 
The Knowledge
14:12 / 05.05.02
I was thinking the same thing - about this place actually...
 
 
Tom Coates
07:08 / 06.05.02
Could you clarify a little, Mumra? I'm not sure I understand you.
 
 
The Knowledge
11:59 / 06.05.02
Think how powerful this place could be if you encouraged small cells all over the shop, doing their own 'revolutionary' things. Independent groups all under one roof. The revolution has gotta start somewhere, and there's no reason why with healthy results it couldn't spread to other boards and parts of the net. For example, attracting even a dozen of the people that are listed in your 'invitation only' thread would be enough to super-charge this little part of the WWW and get things going. I don't think it should be just a good place to discuss stuff. It's time to start taking action, small steps first, but definitely something more than the current conversation merry-go-rounds, which have become sort of stagnant, or less 'magical' after continually recycling themselves through different threads for the last four years. That's obvoiously only my opinion. I've been here on and off for that time, so the most I can realistically offer is an outsiders perspective. Does that sound a little naive? I have this amazing article that I can dig up and I will post it shortly. It's about the new version of Napster which is untracable on the net and hence impossible to legally prosecute. Watch this space.
 
 
The Knowledge
13:56 / 06.05.02
HOW CAN WE USE THIS???

********************************************

Free speech, Liberty, Pornography (NEW SCIENTIST: 10 Mar 01)
--------------------------------------------
Cyber-revolutionaries are abandoning the Web to build an anarchic, censorship-free alternative. Kurt Kleiner reports
--------------------------------------------

NAPSTER's vision of free music for the masses may be dead and buried, but its spirit lives on, and not just in copycat song swapping services. When the dust settles, Napster will likely be remembered not so much for enabling music piracy as for starting a revolution that changed the way the Internet worked.

Napster is the pioneer of a technology known as peer-to-peer networking, or P2P for short. The core idea of P2P is to allow individual computers to communicate directly over the Internet. By bypassing central servers, the technology promises to transform the way people use the Net. In the process, it could destroy the ability of anyone-including corporations and governments-to control what happens in cyberspace.

"The only reason the Internet until now has been relatively censorship-free is that people who would censor the Internet haven't considered it worthwhile," says Ian Clarke, the inventor of a P2P system called Freenet. He and a group of like-minded programmers envision networks that are totally decentralised, impossible to censor and completely anonymous. In other words, cyber-anarchies.

In technical terms, P2P networks are nothing new. The Internet itself started life as a peer-to-peer system in which university and government mainframes swapped information as equals. Only when the masses began to demand access did the P2P ethos crumble. Private companies started hooking in their big computers and offering connections and online services to modest little PCs. Thus was born the client-server model. Big servers with fast connections and lots of memory hosted the information. Little computers accessed it.

Napster's winning idea was to give P2P to the masses. It figured out that it didn't have to store everything itself. Instead, it acted like a dating agency, bringing music fans-and their MP3 collections-together. Napster provided members with an index of all the music stored on other members' computers, and software that enabled them to hook into each other's hard drives. Members could then swap files without the direct involvement of Napster.

Napster was thus able to give its members access to massive amounts of music without having to store a single note itself. That turned out to be hugely popular-at the last count Napster had 61 million users-and was also a big legal advantage. It's clear that most of the recordings were being distributed in violation of copyright laws. If Napster had been storing pirated music on its site, it would have been shut down in days. The reason it lasted so long was that it could quite credibly argue that it was an innocent intermediary. If users happened to be trading pirated music it was no more Napster's fault than it's the fault of the postal service if people mail home-taped cassettes to one another.

Napster hadn't just found a way of dodging the copyright lawyers, it had solved a problem plaguing many large networks, especially the Internet. The client-server models they are built on are hierarchies, and like all hierarchies they're great as long as you are near the top. But most small-time users are near the bottom, shackled to an Internet service provider and its rules.

Achilles' heel
--------------

Among the most irksome are those rules imposed by third parties, often backed by lawsuits. Consider the successful campaign the Church of Scientology has waged against its online critics. The tactic is to accuse critics' ISPs of hosting materials copyrighted by the Church. Scientologists have taken ISPs to court and managed to have many of the critical websites removed.

Napster's Achilles' heel was that it retained a trace of the client-server model. Because members were dependent on Napster for software and indexes, record companies had a target to go after. And go after it they did. In December 1999, EMI, BMG, Sony, Warner, Universal and the Recording Industry Association of America sued Napster for copyright infringement. Although the suit is not yet settled, Napster suffered a terminal blow last month when a US court of appeal ordered it to stop enabling the exchange of copyrighted material. Napster has effectively thrown in the towel and is now trying to find a way of charging for its services so it can pay royalties.

But the P2P pirates aren't about to go away. Napster's success has inspired others, and they're determined to learn from its mistakes.

One such system is Gnutella. Originally developed by a company called Nullsoft, the software was released in March 2000 only to be withdrawn the same day under pressure from Nullsoft's parent, America Online, which was in the process of merging with music and media giant Time Warner. But the cat was out of the bag. Enthusiastic hackers unpicked Nullsoft's code and used it to write versions of their own. Within weeks there were several different but mutually compatible Gnutella knock-offs on the Web. The Gnutella commonwealth was born.

Unlike Napster, Gnutella has no central authority. No one keeps track of users and nobody indexes the files they exchange. Anyone can write software to access the network, and most of what has been written is open source, so anyone can add to it and improve on it. There are now more than a dozen versions available for free, with names like Gnotella, Newtella, Gnut, LimeWire and ToadNode.

To join the network, you simply download one of these software packages from the Web. This turns your computer into a "servent"-both a client and a server. Once you've done that you're ready to find some other servents-their locations are widely publicised on websites and chat rooms-and make contact with them. The connections are made over the Internet, and all the computers are identified by their Internet Protocol (IP) addresses, the basic numeric addresses that identify computers on the Internet. But Gnutella is not the World Wide Web. Your computer communicates directly with the servents it knows about, and those servents pass messages back and forth to yet more servents, which do the same in an ever-expanding net.

To search for a file, you type in keywords and send them to your immediate neighbours. They search the contents of their hard drives, return the hits to you and forward your request to yet more servents, which repeat the process. A single request can quickly reach thousands of computers.

Gnutella is designed to share any kind of file: images, text and software, as well as MP3s. Each user decides which files to make available. A lot of pirated material gets passed around, but the decentralised nature of the network means that there's no obvious legal target.

In any case, Gnutella's difficulties right now aren't legal, they're technical. Napster's courtroom problems sent a wave of new file sharers onto the Gnutella network-suddenly upping the number of people logging on each day by 50,000, according to some estimates-and the surge in traffic brought the whole thing grinding to a halt. It turned out the network simply didn't "scale" well. The number of requests increased exponentially until it exceeded the capacity of a standard 56K modem. Suddenly, thousands of servents turned into dead ends. The network fragmented into dozens of small, disconnected networks, none of them bigger than about 1200 computers.

True to its roots, Gnutella is dealing with the problem in a decentralised way. Each group of programmers has its own favoured solution. Some push the slowest servents to the edge of the network. Others abandon ideological purity and revive the client-server model, making slow servents connect via a faster node. Whichever fix works best will out.

But even for Gnutella, legal problems are looming. It's true that the system is less centralised than Napster, but that doesn't mean there's nobody to go after. About half of all Gnutella files are provided by just 1 per cent of users, and that 1 per cent present a big, fat target to anyone who wants to start suing for copyright infringement.

See you in court
----------------

The organisation most likely to start filing lawsuits is the Recording Industry Association of America. "We have not done any enforcement against Gnutella at this point. But that's not going to last long," says Frank Creighton, director of the RIAA's anti-piracy initiative. When the RIAA decides to move, he says, it will probably target that active 1 per cent. Finding out who they are shouldn't be hard because Gnutella servents need to know one another's IP addresses to communicate. Anyone can find out which ISP hosts a particular IP address, and after that a threatening letter or writ can have the user kicked off or force the ISP to reveal a name that can be pursued through the courts.

But there is a P2P network that looks capable of evading the lawyers. Called Freenet, it's a radical system created from the ground up to be anonymous and censorship-proof. Its creator, Ian Clarke, is a free-speech absolutist who feels that today's Internet, despite its freewheeling image, is vulnerable to censorship. And that's dangerous, he says. "If we look back through history we can see repeated examples where censorship and propaganda have been used to manipulate people into permitting, and even participating in, the most terrible acts of barbarism."

Like Gnutella, Freenet uses the Internet as a backbone to send and receive information, and identifies each computer by its IP address. But unlike Gnutella, it covers its tracks whenever information is transferred.

Hooking your computer up to Freenet is similar to joining Gnutella. First you download the software from the Web. Then you contact other Freenet computers, whereupon your computer becomes a Freenet "node". Freenet is made up of thousands of these nodes, and each one can make files available. When you "insert" a file-say an MP3-into Freenet it is encrypted and then copied to several other nodes. Each node knows which documents it holds and also has information about documents stored on a few other nodes. Neighbouring nodes communicate routinely, updating one another on additions to the network. But no single node knows about more than a fraction of the entire network.

How do you get information out of a system like this? As Clarke explains it, the strategy is similar to the way people navigated before maps. Starting out, a group of travellers might have known only to go north. But the closer they got to their goal, the more detailed was the information they got from people they asked, until finally they found someone able to tell them that yes, the minstrel they were looking for lived right around the corner, second hovel on the right.

Before you start a Freenet search, you must know the title of the document you're looking for. How users will do this is still up in the air. One obvious possibility is an index within Freenet itself-though that raises the question of how to find the index in the first place. Another idea is to post it on the Web, though this may create a juicy legal target. Each document also has a numeric key that is cryptographically linked to the title, and it's this you're actually looking for during a Freenet search.

Let's say you know the key is 123-though of course real keys will be a lot more complex than that. Each node, including yours, knows what documents it holds, and also has a list of documents held by a few other nodes. Your computer will look to see if it has document 123. If not, it will look up to see if it knows a node that has document 123. If it doesn't, it contacts the node with the document that comes closest-maybe document 135. That node might not know where 123 is either, but it knows which node has document 119, so it sends the request there. The idea is that with each request you get closer to the document you really want. When the document is found, it's returned along the request chain (see Diagram). As the document is returned, each node along the chain makes a copy of it and stores it.


How peer-to-peer (P2P) networking works


One consequence of this is that the more requests come in for a piece of information, the more copies there will be on the network, and the easier it will be to find. It also means there's no way of telling where the document originally came from. All you know is that you asked a neighbouring node for it, and it fetched the document from somewhere. Conversely, if you receive a request for a file, you have no idea who made it.

The result is a censorship-proof network. If the powers that be request a file from a node they'll get a copy. If they seize that node they'll definitely find a copy. But it would be impossible for them to prove that the file was there before they requested it, so the exercise amounts to entrapment, Clarke says. And because documents are stored in encrypted form, the node's owners can argue truthfully that they had no idea any particular document is held there. What's more, as the act of requesting a document generates new copies, censorship is self-defeating.

Freenet's developers insist that their network won't suffer the same scaling problems as Gnutella. Although they're not sure how many users there are-the network, after all, is designed not to give away too much about itself-about 20,000 people have downloaded the software. Simulations show that Freenet won't grind to a halt as it grows bigger.

Not everyone accepts that Freenet is as censorship-proof as Clarke thinks. Creighton reckons he can bring it down by getting the IP addresses of individual nodes, sending letters to ISPs, and taking some users to court, just as he wants to do with Gnutella.

But if Clarke turns out to be correct, Freenet will usher in a different world. No one will be able to stop you downloading free music files from the Internet. You'll be able to criticise the rich and powerful without fear of being silenced or punished. And you'll be able to read whichever spy memoir your government is trying to suppress at the moment.

By the same token, you'll be powerless to stop people from plagiarising your copyrighted work or telling lies about you. Nobody will be able to take down child pornography or stolen nuclear secrets.

Napster set out to give us free music, but it seems to have put us on the road to absolute freedom of speech. If so, the real challenge hasn't even begun.

Further reading:

Peer-to-Peer: Harnessing the power of disruptive technologies edited by Andy Oram (O'Reilly and Associates, 2001)

For a Flash animation of Gnutella at work running ToadNode software, see www.toadnode.com/HowItWorks.htm

************************************

WHAT I'M THINKING IS: THIS IS A WAY FOR THESE CELLS TO EFFECTIVELY COMMUNICATE AND GET AWAY WITH IT.
 
 
Lionheart
19:35 / 06.05.02
It's quite simple actually. Wireless internet. Bluetooth and the 8.11 thingies. Basically people put up antennaes on their roofs and allow people to have access to their computer and a bunch of other people do that. So now we have an internet with no backbones but an actual web of computers joined together. It's free cuz it's like a radio, accesible to everybody.
 
  
Add Your Reply