terminal ImageMagick GIF 03-02-16


Task: produce a GIF, make a post on this blog, post your GIF.

Today we will exercise to produce GIF’s on the command line.

We follow the following documents:

Exercises with the command line:
http://ustensile.be/index.php/Toolbending:Ligne_de_commande,_Commande_de_ligne

Basic shortcuts (sous 7.3)
http://www.unixguide.net/linux/linuxshortcuts.shtml

To make animations with ImageMagick:
http://ustensile.be/index.php/%C3%89crire_le_design:Bitmap

Installing ImageMagick on the Mac:
http://ustensile.be/index.php/Cultures_Numeriques::Archives
(sous Outils)

links 17-12

Copyright vs droits d’auteur ?

https://fr.wikipedia.org/wiki/Droit_d’auteur

En Belgique:
http://economie.fgov.be/fr/entreprises/propriete_intellectuelle/droit_d_auteur/#.VnJfNnpVK1G

Domaine Public
https://fr.wikipedia.org/wiki/Domaine_public

Public domain day
http://www.publicdomainday.org/

http://www.laquadrature.net/fr

Resources:

gutenberg.org
https://www.gutenberg.org/wiki/FR_Principal

freemusic archive

jamendo

https://github.com/processing

https://processing.org/examples/distance2d.html

https://pixabay.com/

archive.org

https://commons.wikimedia.org/

http://aaaaarg.fail/

https://library.memoryoftheworld.org/#property=authors

Remix

http://net.art-generator.com/index.html
Death of the authors
http://publicdomainday.constantvzw.org/

Evenement à venir:

Journée de Domaine Public 2016, 16 janvier, KBR _ Nova
http://constantvzw.org/site/Journee-Domaine-Public-2016.html?lang=fr

notes 10-12-15: IP with Martino Morandi

6e1fad6b56add265a624bb7ce99a94f2

Martino Morandi visited us today.

Together we have installed a local network. With the help of an old switch, ethernet cables and some instructions on the command line.

The idea was to show that a network can be built between computers, you do not need a big company or an internet-provider for that.

We then discovered that any computer can be a server.
As Martino said: “Any computer that runs a service for other computers to access, is in fact a server.”

We walked through the notes that Martino keeps on this etherpad:
http://stuff2233.club:9001/p/internet

Firstly to connect to each others machine and be able in the browser to navigate and download stuff from someone elses machine.

And then to set a folder that you share within the network, where access to the rest of the machine stays limited.

As a last exercise, we looked at the logic of Domain Name Servers; DNS.
How can we detour the DNS server of our internet provider and reach websites that seem to be blocked, but in reality the domain name is rerouted to another ip address.
How can we connect names to ip addresses on our own computers?

thank you Martino !

Notes from 12/11/2015

Little Brothers are watching you

Little Brother (Doctorow)
http://craphound.com/littlebrother/about/

We jump back in time from data control and network surveillance (previous classes) back to camera surveillance

The All-seeing eye, devine perspective

Panopticum
https://en.wikipedia.org/wiki/Panopticon

Benthem (18th century sociollogist)
centrally controlled prison space, can be overseen from one point

Ducpetiaux is the first general inspector of the new state of Belgium in 1830. Introducing the panoptic prison model in Belgium (Forest / Saint Gilles) And also remodels areas in the city where transparancy and patronage can be executed.
(garden cities, cité jardins: La Roue, Scheut (Anderlecht) )

“En matière pénitentiaire, Ducpétiaux pensait que la prison devait régénérer les détenus, régénération passant par l’expiation, l’amendement, l’organisation du travail, l’éducation, l’enseignement religieux élémentaire et l’enseignement industriel et enfin l’isolement continuel des prisonniers2. En complément de l’action des prisons, il voyait dans le patronage des prisonniers libérés un moyen de réinsertion sociale.”

https://fr.wikipedia.org/wiki/%C3%89douard_Ducp%C3%A9tiaux

From this point of view controlling citizens is a logic step.
https://en.wikipedia.org/wiki/Surveillance

Countersurveillance
—————
** David Brin:
The chief thing accomplished by Privacy Laws is to make the (spy) bugs smaller: “A law guaranteeing privacy simply insures that bugs — microphones and lenses and so forth — are that much harder to spot.”

control the controller
surveill the surveiller
→ sousveillance /

Option 1: a perfect Orwellian hegemony, empowered by universal elite omniscience…

Option 2: a wide open citizen-driven society, empowered by sousveillance and universal omniscience.

Artists using surveillance camera’s

Surveillance Camera Players
https://www.youtube.com/watch?v=9BtntSJc0a4
https://www.youtube.com/watch?v=Dg950YgmN6k

Ambient TV,

Manifesto for CCTV filmmakers
http://www.ambienttv.net/content/?q=faceless

Faceless by Manu Luksch
(trailer) https://www.youtube.com/watch?v=yLzJCeGYgbg
https://www.youtube.com/watch?v=RW2ZLGQli00

Essay over surveillance camera cinema:
https://www.youtube.com/watch?v=132N4kMBUPk

Bitnik
Trail of images
https://wwwwwwwwwwwwwwwwwwwwww.bitnik.org/c/
Surveillance chess:
https://wwwwwwwwwwwwwwwwwwwwww.bitnik.org/s/

Robin Hewlett and Ben Kinsley
Street with a view
http://benkinsley.com/street-with-a-view/

Stare / Ballades sous surveillance video
Peter Westenberg, Denis Devos, Julien Pierret, Franck Dumortier

lieu ouvert
lieu fermé accessible au public
lieu fermé

http://www.videomagazijn.org/info/archives/462#more-462

Sousveillance project
https://bruxelles.sous-surveillance.net/
https://www.sous-surveillance.net/

Speak out with …

Speak-Out-With-Snowden-Assange-and-Manning-Outside

People take pictures with the installation "Anything to Say?", a bronze sculpture representing whistleblowers Edward Snowden, Julian Assange and Chelsea Manning on the Place des Nations in front of the United Nations European headquarters in Geneva, Switzerland September 14, 2015. According to a press release the work, which weighs more than a ton, is a testimony in favour of freedom of expression and information, without any political controversy. REUTERS/Pierre Albouy

People take pictures with the installation “Anything to Say?”, a bronze sculpture representing whistleblowers Edward Snowden, Julian Assange and Chelsea Manning on the Place des Nations in front of the United Nations European headquarters in Geneva, Switzerland September 14, 2015. According to a press release the work, which weighs more than a ton, is a testimony in favour of freedom of expression and information, without any political controversy. REUTERS/Pierre Albouy

http://www.telesurtv.net/english/news/Speak-Out-With-Snowden-Assange-and-Manning-Outside-UN-20150914-0009.html

Nettime

http://nettime.org/

Discussion on Nettime, see the Nettime-l archives, sept. 2015, thread ‘Speak out with”

Wikileaks links 08 oct

Right to privacy ?

https://en.wikipedia.org/wiki/Right_to_privacy

“Right to be left alone”

“Under liberal democratic systems, privacy creates a space separate from political life, and allows personal autonomy, while ensuring democratic freedoms of association and expression.”

Article 7 droits fundamentals Union Europeen :
http://www.europarl.europa.eu/charter/pdf/text_fr.pdf

Déclarations universelle des droits de l’homme:
http://www.un.org/fr/documents/udhr/#a12

Who Should Own the Internet?
Julian Assange on Living in a Surveillance Society

“Destruction of privacy widens the existence power imbalance between the ruling factions and everyone else.“

Edward Snowden on relation state and companies in data surveillance:
http://www.networkedsocial.constantvzw.org/?p=1112

Cryptation

IMG_3219

Pour cet exercice, nous avons fait une expérience physique d’un transfère de message crypté.
Il s’agissait de faire passer un message d’un émetteur à un récepteur sans que l’intermédiaire ne l’intercepte. Le message étant crypté, il fallait également faire passer une clé au récepteur, pour le déchiffrer, mais en passant par un autre canal.
Voici le message:

MESSAGE

Pour le faire passer aux récepteur, nous avons choisi de le cacher derrière la porte. Nous avons ensuite invité le récepteur à fermer la porte afin qu’il y trouve le message. La technique consistait à exclure l’intermédiaire du dialogue et à s’adresser au récepteur comme si de rien n’était.

Malheureusement, le récepteur n’a pas vu le message derrière la porte au moment où nous lui avons demandé de la fermer. Nous nous sommes donc trouvées obligées d’improviser et de lui demander de sortir pour qu’il voit le papier, mais en ouvrant la porte, il l’a fait tomber. Là l’intermédiaire l’a vu, et nous avons donc perdu.

Voici la clé pour déchiffrer le message:

CLE

Chaque lettre comporte deux chiffres: le premier correspond au groupe de trois auquel la lettre appartient. Le deuxième correspond à la place de la lettre dans le groupe, ce ne peut être que 1,2 ou 3.

Le message décrypté signifie “Bienvenue à toi”.