|Contact||Tom Twiddlebit, Wau Holland Foundation|
|Description||This summer somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.|
|Members||Bart, Codethief, Grothoff, Hellekin, Infinity0, Jriede, Kaie, LynX, Nana, SonOfRa, Stalex, Tg|
|Projects||GNUnet, Lounge, Secushare, Tox|
|Self-organized Sessions||Detector.io, YBTI Crypto Names, YBTI Cryptographic Routing, YBTI Hardware, YBTI Introduction, YBTI Meshnet Works, YBTI Operating System, YBTI Political Attack Vectors, YBTI Results, YBTI Scalability, YBTI Strategic Choices, YBTI TNG Apps, YBTI Usability|
|Registered on||12 November 2013 21:33:12|
|Location for self-organized sessions||yes|
|Planning notes|| [[Has planning notes::Seat numbers are crazy inaccurate as yet. Feedback will help us improve the guess.
Neighborhood or invite/merge I2P.]]
This summer somebody broke the Internet. We are inviting all projects that are providing a piece of the puzzle to create a GNU Internet stack that cuts out the man in the middle. Maybe your project is already on our map.
#youbroketheinternet is a campaign that evolved out of the social swarm and GNU consensus, no longer focused only on social tools but instead oriented at assessing the harms done to our infrastructure and the ways to replace them.
Follow us on PRISM if you have nothing to hide... @youbrokethenet
Contact us on ircs://psyced.org:6667/youbroketheinternet
Or join our #youbroketheinternet working group on RetroShare
See the actual YBTI sessions linked above. We may be re-organizing some later if the affluence suggests so. This was the original list of sessions:
Political Attack Vectors
How much damage can and should be limited by appropriate legislation? Is it okay for example to declare unencrypted private conversation technology illegal?
Usability and Adoption Threshold
How can we appeal to a large audience? How can we make the technologies developed grandparent compatible? How do we make the exchange of cryptographic keys and shared secrets a natural everyday transaction?
Scalability and Architecture
How can we build systems that are capable of scaling to, hundreds of millions of users? How can we leverage the distributed computing power and refuse to be thrown back into the cloud?
Crypto Routing Backends
How can we achieve confidential transmission of information? How can we protect our social graph, as we know now how valueable it is to know who is talking to whom? How much anonymity is possible and what are the tradeoffs?
(Wireless) Mesh Networks
We need more infrastructure that is run independently of nation states or for-profit corporations. Who owns all the wi-fi routers in our homes. Is it them or us? How can we as a society operate networks for the common good?
Free & Open Hardware
If the hardware we are running our systems on is intrinsically insecure, we may be building a fortress on top of a house of cards. What is required on the lowest levels to get reasonable endpoint security?
Financing and Dissemination
Operating networks and developing software that do not, by design, allow the aggregation, marketing, and eavesdropping of user data is a technical challenge. This creates its own challenges when it comes to financing. How can we get done what we think is right and still afford a living? Is a business model for privacy even possible?