Browse Source

sharing the workflow

master
manetta 2 years ago
commit
43e845ed71
  1. 28
      README.md
  2. 6
      post-script.sh
  3. 122
      post-script.template.html
  4. BIN
      snapshots/cover-making.png
  5. BIN
      snapshots/post-script-printing-at-uneasy-repro-04.jpeg
  6. BIN
      snapshots/post-script-printing-at-uneasy-repro-08.jpeg
  7. BIN
      snapshots/post-script-printing-at-uneasy-repro-09.jpeg
  8. BIN
      snapshots/post-script-printing-at-uneasy-repro-10.jpeg
  9. BIN
      snapshots/post-script-printing-at-uneasy-repro-14.jpeg

28
README.md

@ -0,0 +1,28 @@
# Post-Script
pad-to-print workflow to make the post-script of the 3rd Obfuscation Workshop
<http://www.obfuscationworkshop.org>
<https://3rd.obfuscationworkshop.org>
## About this Post-Script
This publication was made using a custom tool that allows for collaborative design, based on Flask, Pandoc, Etherpad, Etherdump and Weasyprint. The publication was written on one shared Etherpad and turned into a PDF using web-to-print techniques. This way of working allows for the writing, editing, copy-editing and design could happen within the same space.
Throughout the publication 9 *text pattern separators* appear that were generated partially in the last Study Group session by Cristina Cochior, Ero Balsa, Manetta Berends, and Pieter Delobelle. We performed a form of "slow computing" on the transcripts and chats from the sessions by looking for markers which traverse the multiple topics and registers that had been discussed during the Obfuscation Workshop. The last three separators come from the editing work of Amy Pickles who shared through email some of the words that reappeared often but were spelled differently each time.
## Generate the Post-Script
`$ sh post-script.sh`
- (input) downloads `post-script.md` from an etherpad
- (input) downloads `post-script.css` from another etherpad
- (processing) uses `post-script.template.html` with Pandoc to generate the PDF
- (output) generates `post-script.html` (for debugging) and `post-script.pdf`

6
post-script.sh

@ -0,0 +1,6 @@
etherpump gettext post-script.md > post-script.md
etherpump gettext post-script.css > css/post-script.css
pandoc -f markdown -t html -c css/post-script.css --toc --toc-depth=1 --standalone --template post-script.template.html post-script.md -o post-script.html
pandoc -f markdown --pdf-engine=weasyprint -c css/post-script.css --toc --toc-depth=1 --standalone --template post-script.template.html --reference-location=section post-script.md -o post-script.pdf

122
post-script.template.html

@ -0,0 +1,122 @@
<!doctype html>
<html lang="$language$">
<head>
<meta charset="utf-8">
<link href="css/post-script.css" rel="stylesheet" type="text/css" media="print">
<title>$title$</title>
</head>
<body>
<section id="cover">
<h1 class="title">$title$</h1>
<pre id="cover-pattern">
Ranciere's the ignorant master ?
I just said "testing, testing, testing"
— did you hear it ?
And so, if this is a limited case use, just for
missing children, "how do we know that it's working ?
Is privacy sandbox an effort to turn the web into its own Facebook ?
Eliminate behavioral tracking completely and shift to another economic mode ?
Do we want more control over devices? If we do, who should control them ?
This is about those few rowdy elements or suspicious
people who we want to catch, and so, the form of resistance of
the form of obfuscation if you will, is to say, "how do you know that it works" ?
You really had to look for evidence of these kinds of
technologies' use, so the only kind of resistance we had was, "is this accurate?", and "does it work" ?
If it's a repressive government that then can siphon
information off, is it the appropriate level of governance for this and how do you ensure… ?
And when it became a sorting tool, the question or the form of resistance
became, "how are you doing this? Under what authority of law are you doing this?", right ?
What if, instead of trying to fly under the enemy’s radar,
we let that radar help us find allies with whom we can fly in formation ?
The ad side has extensive ad fraud such as fraudulent clicks.
What do you now know, what is real and what isn't real, in terms of what we can measure ?
How does that impact whether the whole complicated
exercise is even something worthwhile for us to
resist or engage with, or do we really need to overturn the whole thing ?
Tools like AdNauseam are still primarily focussed on an individual.
Sally, is it perhaps that we cannot take such an individual approach ?
We thought that without these technologies
we did a really good job, is the necessity of this really proportionate to our legal rights ?
Can you comment on the ethics of intentional/unintentional negative impact
of obfuscation / subversive AI on the *non-users* of obfuscation / subversive AI ?
Talking about how we can flip the script to talking about the fact
that these technologies are not inevitable, getting into the resistance,
getting into the advocacy game before the use become ubiquitous is a big challenge now, right ?
So how can we know for sure whether AdNauseam clicks work or not ?
Are the clicks that we successfully introduced experimental
click fraud, or can the clicks that we introduced be considered as fraud ?
With that in mind,
is browser-based obfuscation something that is still possible and meaningful ?
So now, from the side of publishers, it's an interesting question
as to whether the publishers would be interested in obfuscation
and what degree of obfuscation, and who would be obfuscated to who ?
So how well does this work ?
</pre>
</section>
<section id="cursorpage1"></section>
$if(toc)$
<section id="TOC" role="doc-toc">
$if(toc-title)$
<h2 id="$idprefix$toc-title">$toc-title$</h2>
$endif$
$table-of-contents$
</section>
$endif$
$body$
<section id="cursorpage2"></section>
<section id="backcover">
<pre id="backcover-pattern">
Ranciere's the ignorant master ?
I just said "testing, testing, testing"
— did you hear it ?
And so, if this is a limited case use, just for
missing children, "how do we know that it's working ?
Is privacy sandbox an effort to turn the web into its own Facebook ?
Eliminate behavioral tracking completely and shift to another economic mode ?
Do we want more control over devices? If we do, who should control them ?
This is about those few rowdy elements or suspicious
people who we want to catch, and so, the form of resistance of
the form of obfuscation if you will, is to say, "how do you know that it works" ?
You really had to look for evidence of these kinds of
technologies' use, so the only kind of resistance we had was, "is this accurate?", and "does it work" ?
If it's a repressive government that then can siphon
information off, is it the appropriate level of governance for this and how do you ensure… ?
And when it became a sorting tool, the question or the form of resistance
became, "how are you doing this? Under what authority of law are you doing this?", right ?
What if, instead of trying to fly under the enemy’s radar,
we let that radar help us find allies with whom we can fly in formation ?
The ad side has extensive ad fraud such as fraudulent clicks.
What do you now know, what is real and what isn't real, in terms of what we can measure ?
How does that impact whether the whole complicated
exercise is even something worthwhile for us to
resist or engage with, or do we really need to overturn the whole thing ?
Tools like AdNauseam are still primarily focussed on an individual.
Sally, is it perhaps that we cannot take such an individual approach ?
We thought that without these technologies
we did a really good job, is the necessity of this really proportionate to our legal rights ?
Can you comment on the ethics of intentional/unintentional negative impact
of obfuscation / subversive AI on the *non-users* of obfuscation / subversive AI ?
Talking about how we can flip the script to talking about the fact
that these technologies are not inevitable, getting into the resistance,
getting into the advocacy game before the use become ubiquitous is a big challenge now, right ?
So how can we know for sure whether AdNauseam clicks work or not ?
Are the clicks that we successfully introduced experimental
click fraud, or can the clicks that we introduced be considered as fraud ?
With that in mind,
is browser-based obfuscation something that is still possible and meaningful ?
So now, from the side of publishers, it's an interesting question
as to whether the publishers would be interested in obfuscation
and what degree of obfuscation, and who would be obfuscated to who ?
So how well does this work ?
</pre>
</section>
</body>
</html>

BIN
snapshots/cover-making.png

Binary file not shown.

After

Width:  |  Height:  |  Size: 229 KiB

BIN
snapshots/post-script-printing-at-uneasy-repro-04.jpeg

Binary file not shown.

After

Width:  |  Height:  |  Size: 417 KiB

BIN
snapshots/post-script-printing-at-uneasy-repro-08.jpeg

Binary file not shown.

After

Width:  |  Height:  |  Size: 445 KiB

BIN
snapshots/post-script-printing-at-uneasy-repro-09.jpeg

Binary file not shown.

After

Width:  |  Height:  |  Size: 476 KiB

BIN
snapshots/post-script-printing-at-uneasy-repro-10.jpeg

Binary file not shown.

After

Width:  |  Height:  |  Size: 542 KiB

BIN
snapshots/post-script-printing-at-uneasy-repro-14.jpeg

Binary file not shown.

After

Width:  |  Height:  |  Size: 406 KiB

Loading…
Cancel
Save