The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: August 2015
Nvidia Is About To Steal The Cryptocurrency Mining Crown …
Posted: August 8, 2015 at 7:20 pm
Buried on the 17th page of Toms Hardwares GeForce GTX 750 Ti graphics card review is a simple benchmark result that will dramatically disrupt the landscape of cryptocurrency mining. In fact, its the kind of data that should send AMD back to the drawing board at least if they want to maintain their choke-hold on the mining hardware market.
Historically AMD has been the undisputed crowd favorite of miners looking to stock up on new forms of digital currency like Dogecoin and Litecoin. AMDs Radeon graphics cards possess a secret sauce that allows significantly more powerful compute capabilities, at least the kind required for Scrypt-based mining.
That is, untilNvidiareleased their new Maxwell architecture this week.
PNYs GTX 750 ti | Image Credit: PNY Technologies
As we learned from my introduction to the GTX 750 Ti,first-generation Maxwell cards exhibit a 35% peak performance boost per core and twice the performance per watt. They also blow Kepler hashrates out of the water. Based on what Im seeing with the 750 Ti, Nvidia is poised to embarrass AMD in the performance-per-watt race and thats a substantial factor when youre paying the inflated energy bills caused by mining.
Nvidia didnt breathe a word of Maxwells seriously improved hashing ability in their marketing copy or press briefings, but Toms Hardware discovered it, and Ive been able to replicate their findings with multiple 750 Ti cards from both Nvidia and PNY.
Hashrate using a reference 750 Ti 1GB card from Nvidia (Software: Cudaminer)
What youre looking at in the image above is a hashrate of about 242kh/s using Nvidias reference 750 Ti 1GB graphics card ($139). This is significant for several reasons. First, the 750 Ti is a 60Watt card and doesnt even require a PCI-E power connector. You could plug this card into a cheap box from HP or Dell with a 300W power supply and have power to spare. Second, the temperature never seems to breach 65 degrees Celsius, and it runs considerably quieter and cooler than the AMD 260x ($119), which achieves a peak hashrate of 206kh/s and consumes nearly 130Watts of power.
Hold on a minute! I can hear you saying. AMDs 260x is $20 cheaper than Nvidias entry-level 750 Ti! Thats true, but the nominal price difference quickly evaporates when you consider how the 750 Ti sips power, which matters in the long run. Additionally, Toms Hardware ran the same mining environment test with AMDs upcoming Radeon 265 ($149) and achieved a peak hashrate of 252kh/s and remember that the Radeon 265 is a 150Watt card.
For that same price of $149, heres what I pulled off with PNYs 750 Ti 2GB with a moderate (and stable) overclock:
Follow this link:
Nvidia Is About To Steal The Cryptocurrency Mining Crown ...
Posted in Cryptocurrency
Comments Off on Nvidia Is About To Steal The Cryptocurrency Mining Crown …
Liberty House – 207 Photos – American (New) – Jersey City …
Posted: at 7:19 pm
I was here last night for dinner, with 3 girlfriends. We made a reservation weeks prior, simply due to the fact that it's the holiday season and we figured it would be busy!
Once we walked in, we were greeted by the hostess, she showed us to our table and gave us the drink menu. Within 5 minutes we were introduced to our waiter, he took our drink order, told us the specials and left us with menus.
Being that this was all of our first times here we order a little bit of everything. For starters, drinks, obviously the most important, 3 cosmos and an extra dirty martini, all super yummy, yet a tiny bit to strong. For appetizer we ordered the sushi special, which was average, I've had better sushi at a take out place. The sausage risotto, which had wayyyyyy to much blue cheese on it, the organic salad, just your plain old salad, and the calamari, which was actually perfectly cooked. For dinner, we ordered the hanger steak, short ribs and the cod special. Presentation was very nice portion size was decent, but in my opinion a little small considering the large price tag. Everything was fresh though! For dessert we ordered the apple strudel, which was alright, not the best I've had. All that for 4 people came to $238, my opinion, just a tad pricey!!!
The view is great, but, during the winter you can't really sit outside and enjoy the view, and to be honest, I'm not paying for the view, I'm paying for the food!
Service was great! Our server was clearly knowledgeable of the food he was serving which is great!
All in all, I would come back! Maybe during the summer so I can enjoy the view!
Here is the original post:
Liberty House - 207 Photos - American (New) - Jersey City ...
Posted in Liberty
Comments Off on Liberty House – 207 Photos – American (New) – Jersey City …
Transhuman Superpowers & Longevity | KurzweilAI
Posted: at 7:17 pm
Source: Event organizer
Brighter Brains Institute will be presenting a conference at Humanist Hall in Oakland, on July 12, 2015. The theme is Transhuman Superpowers and Longevity.
Elizabeth Parrishis a leading voice for the advancement of biotechnology. She is the CEO ofBioViva USA Inc.which is committed to building gene therapies to eradicate disease and extend healthy life. She is a board member ofRadish Medical Solutionsand founder ofBiotrove Investmentsand media. She is actively involved in international educational media via theInternational Longevity Alliance, of which she is a board member and the American Longevity Alliance, on which she serves as Secretary. Her lecture presentation topic is A Historical Perspective of the Normal Way to Die and What BioViva is Doing to Change that Paradigm Today
Gabriel Licinais onetime co-founder of Science for the Masses, a biotech grinding think-tank aimed towards altering the human condition in the pursuit of new abilities and leveraging pre-existing technologies for accessibility. Gabriel has a degree in Molecular Biology from University of Washington and was the principle testing consultant for SfM. He develops projects to expand the human condition andtests the ideas put forth by the Grinding community for functionality and feasibility. He is currently working on various projects within the fields of material sciences, microbiology, and mammalian cell biology. Prior projects include mammalian near infra-red vision, next generation functional implant coating technologies and techniques, as well as bacterial modifications for the human and environmental micro biome.
Brian Hanleyis the founder of Butterfly Sciences, a company developing gene therapies for aging. He has a range of papers in biosciences, economics, policy and terrorism, in addition to a recent text on radiation treatment. He obtained his PhD in microbiology with honors from UC Davis, has a bachelors degree in computer science, is a multiple entrepreneur and guest lectured for years to the MBA program at Santa Clara University. Brian brings a unique vision of the future woven from multiple disciplines tempered in decades of practical implementation.
Mallory E. McLaren, J.D. is one of only a handful of persons, globally, who simultaneously hold a law degree and have made regenerative medicine their area of expertise. In the past Mallory has served an aide for a U.S. senator and served in a role at the U.S. State Department. She is an avid animal welfare advocate, a vegan/vegetarian lifestyle advocate, a cultivated meat, milk, and leather industry specialist, and an unapologetic transhumanist. Currently, she is in the process of establishing a financial vehicle aimed at accelerating rejuvenation biotechnology development globally. Mallory holds a B.A. in Interdisciplinary Liberal Arts from the Evergreen State College, and a J.D. concentrated in Life Sciences Law from Seton Hall University School of Law. Her presentation is titled: Here and Now: Mainstreaming Longevity/Resilience Biotechnology R&D in the Mid-2010shttp://www.linkedin.com/in/malloryemclaren/
See the original post:
Transhuman Superpowers & Longevity | KurzweilAI
Posted in Transhuman
Comments Off on Transhuman Superpowers & Longevity | KurzweilAI
Bitcoin Wiki
Posted: at 1:43 pm
Bitcoin
Bitcoin is a decentralized digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: transaction management and money issuance are carried out collectively by the network.
The original Bitcoin software by Satoshi Nakamoto was released under the MIT license. Most client software, derived or "from scratch", also use open source licensing.
Bitcoin is the first successful implementation of a distributed crypto-currency, described in part in 1998 by Wei Dai on the cypherpunks mailing list. Building upon the notion that money is any object, or any sort of record, accepted as payment for goods and services and repayment of debts in a given country or socio-economic context, Bitcoin is designed around the idea of using cryptography to control the creation and transfer of money, rather than relying on central authorities.
Languages needing translation work: AR ID MS BG CA CS DA ET EL EO EU FA GL KO HE HR KA LV LT HU NL JA NO NN PT SK SL SR SH FI SV TH VI TR UK
See more here:
Bitcoin Wiki
Posted in Bitcoin
Comments Off on Bitcoin Wiki
Bitcoin Wikipedia, wolna encyklopedia
Posted: at 1:43 pm
Bitcoin Kod ISO 4217 XBT, BTC uywane potocznie[1] Pastwo niezalena od kraju, ponadnarodowa Poziom inflacji prawdopodobny brak inflacji. Ustalenie sztywnego ograniczenia liczby na 21 mln sztuk wywiera presj deflacyjn[2] Podzia 100 000 000 satoshi = 1 bitcoin 1mBTC = 0,001BTC = 103BTC 1BTC = 0,000001BTC = 106BTC Symbol BTC, XBT[3], , [4] Bank centralny brak Mennica brak, zdecentralizowana, rozproszona
Bitcoin kryptowaluta, wprowadzona w 2009 roku przez osob (bd grup osb) o pseudonimie Satoshi Nakamoto[2]. Nazwa odnosi si take do uywajcego jej otwartordowego oprogramowania oraz sieci peer-to-peer, ktr formuje. Bitmonety mog zosta zapisane na komputerze osobistym w formie pliku portfela lub przetrzymywane w prowadzonym przez osoby trzecie zewntrznym serwisie zajmujcym si przechowywaniem takich portfeli. W kadym z tych przypadkw bitcoiny mog zosta przesane do innej osoby przez Internet do dowolnego posiadacza adresu bitcoin. Kady bitcoin dzieli si na 100000000 mniejszych jednostek, zwanych czasem satoshi.
Odmiennie ni w przypadku wikszoci walut, bitcoin nie opiera si na zaufaniu wzgldem emitenta centralnego. Bitcoin uywa zdecentralizowanej bazy danych, rozprowadzonej pomidzy wzami sieci peer-to-peer do przechowywania transakcji, oraz kryptografii w celu zapewnienia podstawowych funkcji bezpieczestwa, takich jak upewnienie si, e bitcoiny mog by wydane tylko raz przez osob, ktra je posiada w danym momencie.
Topologia peer-to-peer sieci bitcoin oraz brak administracji centralnej czyni manipulacj wartoci bitmonet poprzez produkcj wikszej ich iloci niewykonaln dla jakiejkolwiek rzdowej czy innej organizacji lub jednostki, nadal moliwa jest jednak baka spekulacyjna[5][6]. Budowa bitcoina pozwala na anonimowe posiadanie wasnoci oraz jej transfery.
Bitcoin jest jedn z pierwszych implementacji konceptu zwanego kryptowalut, pierwszy raz opisanego w 1998 r. przez Wei Daia na licie mailingowej cypherpunkw[7].
Bitcoin opiera si na transferze kwot midzy rachunkami publicznymi, przy uyciu kryptografii klucza publicznego. Wszystkie transakcje s publiczne i przechowywane w rozproszonej bazie danych. W celu zapobieenia podwjnemu wydawaniu, sie implementuje rodzaj rozproszonego serwera czasowego, uywajc koncepcji acuchowych dowodw matematycznych wykonanych dziaa (tzw. Proof of Work, w skrcie PoW). Dlatego te caa historia transakcji musi by przechowywana w bazie, a w celu ograniczenia rozmiaru magazynu uywane jest drzewo funkcji skrtu.
Bitcoin jest implementacj konceptu b-money autorstwa Wei Daia oraz Bitgold autorstwa Nicka Szabo, opart na sieci P2P. Zasady funkcjonowania systemu s opisane w specyfikacji technicznej stworzonej i opublikowanej w 2008 roku przez Satoshiego Nakamoto[2][8].
Kada osoba uczestniczca w sieci bitcoin ma portfel zawierajcy dowoln liczb par kluczy kryptograficznych. Klucze publiczne, zwane te adresami bitcoin, dziaaj jako miejsce rdowe oraz miejsce docelowe dla wszystkich patnoci. Odpowiadajce im prywatne klucze autoryzuj patnoci tylko dla posiadajcego je uytkownika. Adresy nie zawieraj adnej informacji na temat ich waciciela i s zazwyczaj anonimowe[9].
Adresy, w atwej do odczytania przez czowieka formie, s cigami tekstowymi, skadajcymi si z liczb i liter o dugoci okoo 34 znakw w formie zblionej do 1rYK1YzEGa59pI314159KUF2Za4jAYYTd. Rozpoczynaj si zawsze od liczby 1 lub 3, zawieraj wielkie i mae litery oraz cyfry alfabetu aciskiego z wykluczeniem: cyfry 0, wielkiej litery O, wielkiej litery I i maej litery l. Uytkownicy bitcoina mog posiada wiele adresw, a waciwie mog generowa nowe adresy bez adnych ogranicze, poniewa generowanie nowego adresu jest relatywnie natychmiastowe, rwne wygenerowaniu nowej pary kluczy prywatnego/publicznego oraz nie wymaga kontaktu z reszt sieci. Jest take wykorzystywany do jednoznacznej identyfikacji zapaty za towar poprzez tworzenie unikalnego adresu bitcoin dla kadej transakcji, poniewa obecnie sie nie dopuszcza tytuu przelewu znanego z tradycyjnych form przekazu. Tworzenie jednorazowych adresw wykorzystywanych do pojedynczego celu moe te pomc w zachowaniu anonimowoci uytkownika.
Bitmonety zawieraj klucz publiczny (adres) aktualnego posiadacza. Kiedy uytkownik A przetransferuje jak ilo do uytkownika B, A rezygnuje z ich posiadania, dodajc klucz publiczny (adres) B do tych monet oraz podpisujc je wasnym kluczem prywatnym[10]. Nastpnie ogasza wykonan przez siebie transakcj w komunikacie wysanym do sieci peer-to-peer. Reszta sieci sprawdza poprawno zastosowanych w transakcji podpisw cyfrowych oraz iloci monet przed jej zaakceptowaniem.
Posted in Bitcoin
Comments Off on Bitcoin Wikipedia, wolna encyklopedia
Interactives . DNA . Genetic Engineering
Posted: at 1:42 pm
Genetic engineering is the process of removing a gene from one organism and putting it into another. Often, the removed genes are put into bacteria or yeast cells so that scientists can study the gene or the protein it produces more easily. Sometimes, genes are put into a plant or an animal.
One of the first genetic engineering advances involved the hormone insulin. Diabetes, a medical condition that affects millions of people, prevents the body from producing enough insulin necessary for cells to properly absorb sugar. Diabetics used to be treated with supplementary insulin isolated from pigs or cows. Although this insulin is very similar to human insulin, it is not identical. Bovine insulin is antigenic in humans. Antibodies produced against it would gradually destroy its efficacy.
Scientists got around the problem by putting the gene for human insulin into bacteria. The bacteria's cellular machinery, which is identical to the cellular machinery of all living things, "reads" the gene, and turns it into a protein-human insulin-through a process called translation.
Read the original here:
Interactives . DNA . Genetic Engineering
Posted in Genetic Engineering
Comments Off on Interactives . DNA . Genetic Engineering
European Society of Human Genetics: Home
Posted: at 1:42 pm
is a non-profit organization. Its aims are to promote research in basic and applied human and medical genetics, to ensure high standards in clinical practice and to facilitate contacts between all persons who share these aims, particularly those working in Europe. The Society will encourage and seek to integrate research and its translation into clinical benefits and professional and public education in all areas of human genetics.
The 2015 registration process for the European registered Clinical Laboratory Geneticist (ErCLG) by the European Board of Human Genetics has started and is open until September 15, 2015.
Information on eligibility criteria, required documents and the submission process can be found here.
Applications can be made exclusively via the new online submission tool.
11.Jun.2015
We wish to thank almost 2,700participants and over 145 exhibiting companiesand their staff for having attended the ESHG Conference in Glasgow. We hope to see you in Barcelona in May 2016.
View the following sessions as web-cast:
-Opening Plenary Session- selected talks -ESHG-ASHG Building Bridges Symposium on "Genetic testing in children" -Plenary Debate: "Should all geneticists have their genome sequenced?" -Mendel Lecture -ESHG Award Lecture
Access the streaming
Videos are nowavailable as on-demand download.
Read the original here:
European Society of Human Genetics: Home
Posted in Human Genetics
Comments Off on European Society of Human Genetics: Home
DRD4 genotype predicts longevity in mouse and human.
Posted: at 1:41 pm
Longevity is influenced by genetic and environmental factors. The brain's dopamine system may be particularly relevant, since it modulates traits (e.g., sensitivity to reward, incentive motivation, sustained effort) that impact behavioral responses to the environment. In particular, the dopamine D4 receptor (DRD4) has been shown to moderate the impact of environments on behavior and health. We tested the hypothesis that the DRD4 gene influences longevity and that its impact is mediated through environmental effects. Surviving participants of a 30-year-old population-based health survey (N = 310; age range, 90-109 years; the 90+ Study) were genotyped/resequenced at the DRD4 gene and compared with a European ancestry-matched younger population (N = 2902; age range, 7-45 years). We found that the oldest-old population had a 66% increase in individuals carrying the DRD4 7R allele relative to the younger sample (p = 3.5 10(-9)), and that this genotype was strongly correlated with increased levels of physical activity. Consistent with these results, DRD4 knock-out mice, when compared with wild-type and heterozygous mice, displayed a 7-9.7% decrease in lifespan, reduced spontaneous locomotor activity, and no lifespan increase when reared in an enriched environment. These results support the hypothesis that DRD4 gene variants contribute to longevity in humans and in mice, and suggest that this effect is mediated by shaping behavioral responses to the environment.
Read the original post:
DRD4 genotype predicts longevity in mouse and human.
Posted in Human Longevity
Comments Off on DRD4 genotype predicts longevity in mouse and human.
Rash 101: The Most Common Types of Skin Rashes
Posted: at 1:41 pm
Rash facts Rash is not a specific diagnosis. Instead it means skin inflammation and discoloration that changes the way the skin looks. Common rashes include eczema, poison ivy, hives, and heat rash. Infections that cause rashes may be fungal, bacterial, parasitic, or viral. Over-the-counter products may be helpful treatments for many skin rashes. Rashes lasting more than a few days that are unexplained should be evaluated by a doctor. What are the causes, symptoms, and signs of common noninfectious rashes?
Some common, noninfectious rashes are listed below. If you have a new rash and you have a fever or some other generalized illness associated with it, it would be best to see your doctor.
Seborrheic dermatitis: Seborrheic dermatitis is the single most common rash affecting adults. It produces a red scaling eruption that characteristically affects the scalp, forehead, brows, cheeks, and external ears.
Atopic dermatitis: Atopic dermatitis, often called eczema, is a common disorder of childhood which produces red itchy, weeping rashes on the inner aspects of the elbows and in back of the knees as well as the cheeks, neck, wrists, and ankles. It is commonly found in patients who also have asthma and hay fever.
Contact dermatitis: Contact dermatitis is a rash that is brought on either by contact with a specific chemical to which the patient is uniquely allergic or with a substance that directly irritates the skin. Some chemicals are both irritants and allergens. This rash is also occasionally weepy and oozy and affects the parts of the skin which have come in direct contact with the offending substance. Common examples of contact dermatitis caused by allergy are poison ivy or poison oak (same chemical, different plant) and reactions to costume jewelry containing nickel.
Diaper rash: This is a common type of contact dermatitis that occurs in most infants who wear diapers when feces and urine are in contact with skin for too long.
Stasis dermatitis: This is a weepy, oozy dermatitis that occurs on the lower legs of individuals who have chronic swelling because of poor circulation in veins.
Psoriasis: This bumpy scaling eruption never weeps or oozes and tends to occur on the scalp, elbows, and knees. It leads to silvery flakes of skin that scale and fall off.
Nummular eczema: This is a weepy, oozy dermatitis that tends to occur as coin-shaped plaques in the wintertime and is associated with very dry skin.
Drug eruptions: Certain drugs can produce skin rash as an unwanted side effect. The common appearance is similar to rashes produced by certain common viral infections. On the other hand, drugs may produce a wide variety of other types of rashes.
Posted in Eczema
Comments Off on Rash 101: The Most Common Types of Skin Rashes
The Connection Has Been Reset – The Atlantic
Posted: at 1:41 pm
Illustration by John Ritter
Many foreigners who come to China for the Olympics will use the Internet to tell people back home what they have seen and to check what else has happened in the world.
The first thing theyll probably notice is that Chinas Internet seems slow. Partly this is because of congestion in Chinas internal networks, which affects domestic and international transmissions alike. Partly it is because even electrons take a detectable period of time to travel beneath the Pacific Ocean to servers in America and back again; the trip to and from Europe is even longer, because that goes through America, too. And partly it is because of the delaying cycles imposed by Chinas system that monitors what people are looking for on the Internet, especially when theyre looking overseas. Thats what foreigners have heard about.
Theyll likely be surprised, then, to notice that Chinas Internet seems surprisingly free and uncontrolled. Can they search for information about Tibet independence or Tiananmen shooting or other terms they have heard are taboo? Probablyand theyll be able to click right through to the controversial sites. Even if they enter the Chinese-language term for democracy in China, theyll probably get results. What about Wikipedia, famously off-limits to users in China? They will probably be able to reach it. Naturally the visitors will wonder: Whats all this Ive heard about the Great Firewall and Chinas tight limits on the Internet?
In reality, what the Olympic-era visitors will be discovering is not the absence of Chinas electronic control but its new refinementand a special Potemkin-style unfettered access that will be set up just for them, and just for the length of their stay. According to engineers I have spoken with at two tech organizations in China, the government bodies in charge of censoring the Internet have told them to get ready to unblock access from a list of specific Internet Protocol (IP) addressescertain Internet cafs, access jacks in hotel rooms and conference centers where foreigners are expected to work or stay during the Olympic Games. (I am not giving names or identifying details of any Chinese citizens with whom I have discussed this topic, because they risk financial or criminal punishment for criticizing the system or even disclosing how it works. Also, I have not gone to Chinese government agencies for their side of the story, because the very existence of Internet controls is almost never discussed in public here, apart from vague statements about the importance of keeping online information wholesome.)
Depending on how you look at it, the Chinese governments attempt to rein in the Internet is crude and slapdash or ingenious and well crafted. When American technologists write about the control system, they tend to emphasize its limits. When Chinese citizens discuss itat least with methey tend to emphasize its strength. All of them are right, which makes the governments approach to the Internet a nice proxy for its larger attempt to control peoples daily lives.
Disappointingly, Great Firewall is not really the right term for the Chinese governments overall control strategy. China has indeed erected a firewalla barrier to keep its Internet users from dealing easily with the outside worldbut that is only one part of a larger, complex structure of monitoring and censorship. The official name for the entire approach, which is ostensibly a way to keep hackers and other rogue elements from harming Chinese Internet users, is the Golden Shield Project. Since that term is too creepy to bear repeating, Ill use the control system for the overall strategy, which includes the Great Firewall of China, or GFW, as the means of screening contact with other countries.
In America, the Internet was originally designed to be free of choke points, so that each packet of information could be routed quickly around any temporary obstruction. In China, the Internet came with choke points built in. Even now, virtually all Internet contact between China and the rest of the world is routed through a very small number of fiber-optic cables that enter the country at one of three points: the Beijing-Qingdao-Tianjin area in the north, where cables come in from Japan; Shanghai on the central coast, where they also come from Japan; and Guangzhou in the south, where they come from Hong Kong. (A few places in China have Internet service via satellite, but that is both expensive and slow. Other lines run across Central Asia to Russia but carry little traffic.) In late 2006, Internet users in China were reminded just how important these choke points are when a seabed earthquake near Taiwan cut some major cables serving the country. It took months before international transmissions to and from most of China regained even their pre-quake speed, such as it was.
Thus Chinese authorities can easily do something that would be harder in most developed countries: physically monitor all traffic into or out of the country. They do so by installing at each of these few international gateways a device called a tapper or network sniffer, which can mirror every packet of data going in or out. This involves mirroring in both a figurative and a literal sense. Mirroring is the term for normal copying or backup operations, and in this case real though extremely small mirrors are employed. Information travels along fiber-optic cables as little pulses of light, and as these travel through the Chinese gateway routers, numerous tiny mirrors bounce reflections of them to a separate set of Golden Shield computers.Here the terms creepiness is appropriate. As the other routers and servers (short for file servers, which are essentially very large-capacity computers) that make up the Internet do their best to get the packet where its supposed to go, Chinas own surveillance computers are looking over the same information to see whether it should be stopped.
Follow this link:
The Connection Has Been Reset - The Atlantic
Posted in Censorship
Comments Off on The Connection Has Been Reset – The Atlantic