Website youbroketheinternet.org
Contact Tom Twiddlebit, Wau Holland Foundation
Description This summer somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.
Members Bart, Codethief, Grothoff, Hellekin, Infinity0, Jriede, Kaie, LynX, Nana, SonOfRa, Stalex, Tg
Projects GNUnet, Lounge, Secushare, Tox
Self-organized Sessions Detector.io, YBTI Crypto Names, YBTI Cryptographic Routing, YBTI Hardware, YBTI Introduction, YBTI Meshnet Works, YBTI Operating System, YBTI Political Attack Vectors, YBTI Results, YBTI Scalability, YBTI Strategic Choices, YBTI TNG Apps, YBTI Usability
Registered on 12 November 2013 21:33:12
Location for self-organized sessions yes
Other assemblies...
Orga contact thiswikihasnospamprotection@example.org
Brings
Seats needed 23
Extra seats 42
Assembly specification
Planning notes [[Has planning notes::Seat numbers are crazy inaccurate as yet. Feedback will help us improve the guess.

Neighborhood or invite/merge I2P.]]

About #youbroketheinternet

This summer somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.

#youbroketheinternet is a campaign that evolved out of the social swarm and GNU consensus, no longer focused only on social tools but instead oriented at assessing the harms done to our infrastructure and the ways to replace them.

Follow us on PRISM if you have nothing to hide... @youbrokethenet

Contact us on ircs://psyced.org:6667/youbroketheinternet

Or join our #youbroketheinternet working group on RetroShare

Planned sessions

See the actual YBTI sessions linked above. We may be re-organizing some later if the affluence suggests so. This was the original list of sessions:

Political Attack Vectors

How much damage can and should be limited by appropriate legislation? Is it okay for example to declare unencrypted private conversation technology illegal?

Usability and Adoption Threshold

How can we appeal to a large audience? How can we make the technologies developed grandparent compatible? How do we make the exchange of cryptographic keys and shared secrets a natural everyday transaction?

Scalability and Architecture

How can we build systems that are capable of scaling to, hundreds of millions of users? How can we leverage the distributed computing power and refuse to be thrown back into the cloud?

Crypto Routing Backends

How can we achieve confidential transmission of information? How can we protect our social graph, as we know now how valueable it is to know who is talking to whom? How much anonymity is possible and what are the tradeoffs?

(Wireless) Mesh Networks

We need more infrastructure that is run independently of nation states or for-profit corporations. Who owns all the wi-fi routers in our homes. Is it them or us? How can we as a society operate networks for the common good?

Free & Open Hardware

If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. What is required on the lowest levels to get reasonable endpoint security?

Financing and Dissemination

Operating networks and developing software that do not, by design, allow the aggregation, marketing, and eavesdropping of user data is a technical challenge. This creates its own challenges when it comes to financing. How can we get done what we think is right and still afford a living? Is a business model for privacy even possible?