TAKRIZ asks its members, friends, followers and readers to stop relying on Facebook and to disperse and follow TAKRIZ Twitter account twitter.com/takriz and check http://degage.tv publishing the latest videos.

A voice press conference will be given on Tuesday January 25th 9PM GMT+1 on our encrypted voice server accessible with a “mumble” software client. Details of the server will be given to press, NGO and diplomatic contacts only and by email.

Facebook Suspended All TAKRIZ Accounts With Admin 
                 Privileges on the Page TAKRIZO

http://takriz.com/press/24-1-2011-english.txt

Read more

In contrast to the medical, electrochemical, and pharmaceutical enhancements first envisioned for cyborgs, the effects of our consumer appurtenances thus far remain superficial and reversible—stranded on an island without an iPhone, your problems are no different from those faced by Robinson Crusoe. If our helplessness in such an environment is due to our being cyborgs, than we humans have been cyborgs for a very long time.

Lepht Anonym’s cyborg erotics harken back to Donna Haraway’s Cyborg Manifesto, in which a political impatience with the biological conditions of human life urged a radical break with biological limits and the cultural baggage that comes with them. “The cyborg would not recognize the Garden of Eden,” Haraway writes; “it is not made of mud and cannot dream of returning to dust.” Where the retail cyborgs that Amber Case describes seem to be seeking that Edenic reunion, a numbing togetherness of family and community, made possible by tools that promise to make us “more human.” Troubling and total, Lepht Anonym’s cybernetic commitments remind us that we co-opted pseudocyborgs are domesticated version of the true cyborg: angry, damaged, and feral.

Read more

The case against WikiLeaks is absolutely this decade’s version of the Saddam/WMD campaign. It’s complete with frivolous invocations of Terrorism, grave public warnings about National Security negated by concealed information, endlessly repeated falsehoods, a competition among political and media elites to advocate the harshest measures possible, a cowardly Congress that (with a few noble exceptions) acquiesces to it all on a bipartisan basis and is eager to enable it, and a media that not only fails to subject these fictions to critical scrutiny, but does the opposite: it takes the lead in propagating them. One might express bewilderment that most American journalists never learn their lesson about placing their blind faith in government claims, but that assumes – falsely – that their objective is to report truthfully.

Read more

** Underlying Causes **

This 21st century digital revolution is not driven by irreconcilable tribalism, religion, abuse of human rights or gender.

This is about corruption, extremely high unemployment, out-of-control food and fuel prices and the disruption of the daily lives of ordinary people.

Read more

There’s a special irony when Google CEO Eric Schmidt suggests—as he did in a speech to the Council on Foreign Relations last November—that China’s government will find it impossible to censor “a billion phones that are trying to express themselves.” Schmidt is rich because his company sells precisely targeted ads against hundreds of millions of search requests per day. If Google can zero in like that, so can China’s censors.

Calling China’s online censorship system a “Great Firewall” is increasingly trendy, but misleading. All walls, being the creation of engineers, can be breached with the right tools. But modern authoritarian governments control the web in ways more sophisticated than guard towers.

This isn’t just theory. The Kremlin is allegedly soliciting proposals for data-mining social networking sites. The police in Iran and Belarus reportedly browse such sites in order to find connections between opposition figures and dissidents. China tried to launch Green Dam, a technology that studies the browsing habits of its users before deciding to block access. And contrary to what Eric Schmidt believes, authorities do have the ability to locate and monitor mobile phone users, as well as censor their messages.

Why all the tricky techniques? Superpowers like China have to engage with the global economy. So for them, the best censorship system is the one that censors the least. Millions of people already disclose intimate social data on Facebook, LinkedIn, Delicious, and their Russian and Chinese alternatives—and that’s all the data governments need to pick the right target. Online friends with an antigovernment blogger? No access for you! Spend most of your day surfing Yahoo Finance? Browse whatever you want. Satisfied Chinese investment bankers will have access to an uncensored web; subversive democracy activists get added to the government watch list.

Can the Internet empower dissidents and pro-democracy activists? Yes. But it can also strengthen existing dictatorships and facilitate the control of their populations. Washington’s utopian plan to liberate the world one tweet at a time could also turn American innovation into a tool for the world’s subjugation.

Read more

Make no mistake: what is at stake here is the infrastructure for our national conversation—the very lifeblood of American democracy. We should be moving in precisely the opposite direction of what this Commission approves today

Read more

Andrei Zmievski, a San Francisco software engineer, asked Twitter in 2008 to let him claim the handle @A. After he took over the dormant account, he discovered the downside: Whenever a Twitter user enters @ plus the letter A—"I’m @a bar"—the tweet fills Mr. Zmievski’s feed.

The cool name has rendered part of Twitter’s function “useless,” Mr. Zmievski says. “It’s the price I have to pay.”

Read more

The Defense Advanced Research Projects Agency is really living up to its name on this one, giving Raytheon BBN $2.1 million for some seriously advanced research. The Cambridge-based deep thinkers will put the funds into two projects, both of which will use a feature of quantum physics known as quantum entanglement and both applied to using quantum-entangled light.

In the first project, given the tasty name of PIECOMM (Photon Information Efficient Communications), Raytheon BBN will try to use quantum physics to reach the limit of data density that can be packed into a stream of light. In a press release about the funding, Raytheon BBN says the applications for such communications could be in “free space optical communication links, including far-field links used in deep space.” Fire up the subspace radio, Lt. Uhura!

The second project hints at the kind of data that might be sent over that crazy-dense laser link. FINESSE (Fundamental Information Capacity of Electromagnetism with Squeezing and Spatial Entanglement) aims to create the ultimate imaging technology, using quantum states of light that don’t normally exist. And that gets to the real science fiction aspect of the projects – the potential uses of the quantum entanglement that will be at their hearts.

With quantum entangled light, each photon is connected at a quantum level to a photon in a second stream of light. If any change happens to the first particle, that change is reflected in the second particle. Because of that, any possible tampering – including simply looking at the first particle – will be known because it will happen to the second particle as well. That is a key to the super encryption, because any tampering could be made to change or destroy the data. But the real Star Trek item here is that the change in the light streams will occur in both at the same time, no matter how far apart they have become.

Raytheon BBN working on real Star Trek tech – Mass High Tech Business News

– awesome tech, could do without the Star Trek references though..

Read more

In my symptoms, however, I resemble more the casualty of an opium war than of a nuclear war: I sit in my dark den and hit the ‘refresh’ button all day and night. When I go out, I take a portable dose in my pocket, in the form of a pocket-sized screen. You might see me hitting ‘refresh’ as I’m crossing the street. You might feel an urge to honk.

Read more

before actually sending out a generation starship, a necessary first step is to assemble the habitat section, populate and provision it, and boost it out to the Earth-Sun L2 point (a stable solar orbit in Earth’s shadow, about 1.5 million Km further out from the sun). L2 is a good proxy for interstellar space — it’s in perpetual shadow and very cold — and if we can run a self-contained and unreprovisioned habitat there for a century, then we can probably strap a propulsion system to it and run it for a century-long interstellar cruise. On the other hand, it’s close enough to home that if the biosphere crashes due to some obscure micronutrient cycle going nuts, it (and its inhabitants) can be brought back to Earth orbit.

Read more