Sublime
An inspiration engine for ideas
The acceptable way to react when someone you know is arrested for not wearing a mask. Never forget how bold these tyrants became in 2020 https://t.co/Fb4COv4iZs
Washingtons ghostx.comThis behaviorist ascendancy launched a process by which we in the United States changed nearly every aspect of how we manage human affairs and, as a result, we became modern. We transformed ourselves from producers to consumers, from citizens to taxpayers, and from self-reliance to a dependence on external, verifiable authority.
Carol Sanford • No More Gold Stars: Regenerating Capacity to Think for Ourselves
MMCCM is the most extreme and literal form of audience capture.7 You don’t just become creatively trapped by the expectations of your followers, you lend them your body. You trade micro-gestures for micro-payments. This gives the voyeuristic audience an unsettling degree of control. Unlike American Idol, where the fate of the Idol is determined... See more
Michael Dean • Thank you for the roses
Net neutrality is being threatened by internet service providers (ISPs), governments are cracking down on online content, and social media platforms are censoring users more than ever before.
Daniel Saito • Fighting back: Web3 as the ultimate catalyst of censorship resistance
"The evolution of our work is also driven by the accelerating trend of decentralization and disintermediation, which could potentially make precautionary regulation too costly to undertake. When governments want to control information, they invariably head for the choke points, like payment processors or ISP-run DNS servers. This fact has created a... See more
Technology Policy: A Look Ahead
The Cypherpunks were united by a belief that people should be able to live free from state interference in private matters, and a conviction that this freedom could be achieved through the use of digital encryption technology that allowed people to communicate without being surveilled.
Friends with Benefits (FWB) • A Political History of DAOs
Such concerns made it a norm for sysops to verify even pseudonymous users with phone calls or mailed documents, ensuring that their control over the virtual system could extend to users’ offline identities.