forked from varia/post-script
manetta
3 years ago
commit
43e845ed71
9 changed files with 156 additions and 0 deletions
@ -0,0 +1,28 @@ |
|||||
|
# Post-Script |
||||
|
|
||||
|
pad-to-print workflow to make the post-script of the 3rd Obfuscation Workshop |
||||
|
|
||||
|
<http://www.obfuscationworkshop.org> |
||||
|
|
||||
|
<https://3rd.obfuscationworkshop.org> |
||||
|
|
||||
|
## About this Post-Script |
||||
|
|
||||
|
This publication was made using a custom tool that allows for collaborative design, based on Flask, Pandoc, Etherpad, Etherdump and Weasyprint. The publication was written on one shared Etherpad and turned into a PDF using web-to-print techniques. This way of working allows for the writing, editing, copy-editing and design could happen within the same space. |
||||
|
|
||||
|
Throughout the publication 9 *text pattern separators* appear that were generated partially in the last Study Group session by Cristina Cochior, Ero Balsa, Manetta Berends, and Pieter Delobelle. We performed a form of "slow computing" on the transcripts and chats from the sessions by looking for markers which traverse the multiple topics and registers that had been discussed during the Obfuscation Workshop. The last three separators come from the editing work of Amy Pickles who shared through email some of the words that reappeared often but were spelled differently each time. |
||||
|
|
||||
|
## Generate the Post-Script |
||||
|
|
||||
|
`$ sh post-script.sh` |
||||
|
|
||||
|
- (input) downloads `post-script.md` from an etherpad |
||||
|
- (input) downloads `post-script.css` from another etherpad |
||||
|
- (processing) uses `post-script.template.html` with Pandoc to generate the PDF |
||||
|
- (output) generates `post-script.html` (for debugging) and `post-script.pdf` |
||||
|
|
||||
|
|
||||
|
|
||||
|
|
||||
|
|
||||
|
|
@ -0,0 +1,6 @@ |
|||||
|
etherpump gettext post-script.md > post-script.md |
||||
|
etherpump gettext post-script.css > css/post-script.css |
||||
|
|
||||
|
pandoc -f markdown -t html -c css/post-script.css --toc --toc-depth=1 --standalone --template post-script.template.html post-script.md -o post-script.html |
||||
|
|
||||
|
pandoc -f markdown --pdf-engine=weasyprint -c css/post-script.css --toc --toc-depth=1 --standalone --template post-script.template.html --reference-location=section post-script.md -o post-script.pdf |
@ -0,0 +1,122 @@ |
|||||
|
<!doctype html> |
||||
|
|
||||
|
<html lang="$language$"> |
||||
|
|
||||
|
<head> |
||||
|
<meta charset="utf-8"> |
||||
|
<link href="css/post-script.css" rel="stylesheet" type="text/css" media="print"> |
||||
|
<title>$title$</title> |
||||
|
</head> |
||||
|
|
||||
|
<body> |
||||
|
|
||||
|
<section id="cover"> |
||||
|
|
||||
|
<h1 class="title">$title$</h1> |
||||
|
<pre id="cover-pattern"> |
||||
|
Ranciere's the ignorant master ? |
||||
|
I just said "testing, testing, testing" |
||||
|
— did you hear it ? |
||||
|
And so, if this is a limited case use, just for |
||||
|
missing children, "how do we know that it's working ? |
||||
|
Is privacy sandbox an effort to turn the web into its own Facebook ? |
||||
|
Eliminate behavioral tracking completely and shift to another economic mode ? |
||||
|
Do we want more control over devices? If we do, who should control them ? |
||||
|
This is about those few rowdy elements or suspicious |
||||
|
people who we want to catch, and so, the form of resistance of |
||||
|
the form of obfuscation if you will, is to say, "how do you know that it works" ? |
||||
|
You really had to look for evidence of these kinds of |
||||
|
technologies' use, so the only kind of resistance we had was, "is this accurate?", and "does it work" ? |
||||
|
If it's a repressive government that then can siphon |
||||
|
information off, is it the appropriate level of governance for this and how do you ensure… ? |
||||
|
And when it became a sorting tool, the question or the form of resistance |
||||
|
became, "how are you doing this? Under what authority of law are you doing this?", right ? |
||||
|
What if, instead of trying to fly under the enemy’s radar, |
||||
|
we let that radar help us find allies with whom we can fly in formation ? |
||||
|
The ad side has extensive ad fraud such as fraudulent clicks. |
||||
|
What do you now know, what is real and what isn't real, in terms of what we can measure ? |
||||
|
How does that impact whether the whole complicated |
||||
|
exercise is even something worthwhile for us to |
||||
|
resist or engage with, or do we really need to overturn the whole thing ? |
||||
|
Tools like AdNauseam are still primarily focussed on an individual. |
||||
|
Sally, is it perhaps that we cannot take such an individual approach ? |
||||
|
We thought that without these technologies |
||||
|
we did a really good job, is the necessity of this really proportionate to our legal rights ? |
||||
|
Can you comment on the ethics of intentional/unintentional negative impact |
||||
|
of obfuscation / subversive AI on the *non-users* of obfuscation / subversive AI ? |
||||
|
Talking about how we can flip the script to talking about the fact |
||||
|
that these technologies are not inevitable, getting into the resistance, |
||||
|
getting into the advocacy game before the use become ubiquitous is a big challenge now, right ? |
||||
|
So how can we know for sure whether AdNauseam clicks work or not ? |
||||
|
Are the clicks that we successfully introduced experimental |
||||
|
click fraud, or can the clicks that we introduced be considered as fraud ? |
||||
|
With that in mind, |
||||
|
is browser-based obfuscation something that is still possible and meaningful ? |
||||
|
So now, from the side of publishers, it's an interesting question |
||||
|
as to whether the publishers would be interested in obfuscation |
||||
|
and what degree of obfuscation, and who would be obfuscated to who ? |
||||
|
So how well does this work ? |
||||
|
</pre> |
||||
|
|
||||
|
</section> |
||||
|
<section id="cursorpage1"></section> |
||||
|
$if(toc)$ |
||||
|
<section id="TOC" role="doc-toc"> |
||||
|
$if(toc-title)$ |
||||
|
<h2 id="$idprefix$toc-title">$toc-title$</h2> |
||||
|
$endif$ |
||||
|
$table-of-contents$ |
||||
|
</section> |
||||
|
$endif$ |
||||
|
$body$ |
||||
|
|
||||
|
<section id="cursorpage2"></section> |
||||
|
<section id="backcover"> |
||||
|
<pre id="backcover-pattern"> |
||||
|
Ranciere's the ignorant master ? |
||||
|
I just said "testing, testing, testing" |
||||
|
— did you hear it ? |
||||
|
And so, if this is a limited case use, just for |
||||
|
missing children, "how do we know that it's working ? |
||||
|
Is privacy sandbox an effort to turn the web into its own Facebook ? |
||||
|
Eliminate behavioral tracking completely and shift to another economic mode ? |
||||
|
Do we want more control over devices? If we do, who should control them ? |
||||
|
This is about those few rowdy elements or suspicious |
||||
|
people who we want to catch, and so, the form of resistance of |
||||
|
the form of obfuscation if you will, is to say, "how do you know that it works" ? |
||||
|
You really had to look for evidence of these kinds of |
||||
|
technologies' use, so the only kind of resistance we had was, "is this accurate?", and "does it work" ? |
||||
|
If it's a repressive government that then can siphon |
||||
|
information off, is it the appropriate level of governance for this and how do you ensure… ? |
||||
|
And when it became a sorting tool, the question or the form of resistance |
||||
|
became, "how are you doing this? Under what authority of law are you doing this?", right ? |
||||
|
What if, instead of trying to fly under the enemy’s radar, |
||||
|
we let that radar help us find allies with whom we can fly in formation ? |
||||
|
The ad side has extensive ad fraud such as fraudulent clicks. |
||||
|
What do you now know, what is real and what isn't real, in terms of what we can measure ? |
||||
|
How does that impact whether the whole complicated |
||||
|
exercise is even something worthwhile for us to |
||||
|
resist or engage with, or do we really need to overturn the whole thing ? |
||||
|
Tools like AdNauseam are still primarily focussed on an individual. |
||||
|
Sally, is it perhaps that we cannot take such an individual approach ? |
||||
|
We thought that without these technologies |
||||
|
we did a really good job, is the necessity of this really proportionate to our legal rights ? |
||||
|
Can you comment on the ethics of intentional/unintentional negative impact |
||||
|
of obfuscation / subversive AI on the *non-users* of obfuscation / subversive AI ? |
||||
|
Talking about how we can flip the script to talking about the fact |
||||
|
that these technologies are not inevitable, getting into the resistance, |
||||
|
getting into the advocacy game before the use become ubiquitous is a big challenge now, right ? |
||||
|
So how can we know for sure whether AdNauseam clicks work or not ? |
||||
|
Are the clicks that we successfully introduced experimental |
||||
|
click fraud, or can the clicks that we introduced be considered as fraud ? |
||||
|
With that in mind, |
||||
|
is browser-based obfuscation something that is still possible and meaningful ? |
||||
|
So now, from the side of publishers, it's an interesting question |
||||
|
as to whether the publishers would be interested in obfuscation |
||||
|
and what degree of obfuscation, and who would be obfuscated to who ? |
||||
|
So how well does this work ? |
||||
|
</pre> |
||||
|
</section> |
||||
|
</body> |
||||
|
|
||||
|
</html> |
After Width: | Height: | Size: 229 KiB |
After Width: | Height: | Size: 417 KiB |
After Width: | Height: | Size: 445 KiB |
After Width: | Height: | Size: 476 KiB |
After Width: | Height: | Size: 542 KiB |
After Width: | Height: | Size: 406 KiB |
Loading…
Reference in new issue