Added resources

This commit is contained in:
CawaAlreadyTaken 2025-11-14 00:52:16 +01:00
parent 895498118e
commit cc11af00ed

View file

@ -2,272 +2,519 @@
"name": "Miniera HackInPovo", "name": "Miniera HackInPovo",
"type": "folder", "type": "folder",
"children": [ "children": [
{ {
"name": "Sustainability", "name": "Sustainability",
"type": "folder", "type": "folder",
"children": [] "children": [
}, {
{ "name": "Permacomputing",
"name": "Privacy", "type": "folder",
"type": "folder", "children": []
"children": [ },
{ {
"name": "The Onion Router", "name": "Low-tech & appropriate tech",
"type": "folder", "type": "folder",
"children": [ "children": []
{ },
"name": "Tor Project", {
"type": "file", "name": "Energy & efficiency",
"url": "https://www.torproject.org/" "type": "folder",
}, "children": []
{ },
"name": "Orbot", {
"type": "file", "name": "E-waste & recycling",
"url": "https://orbot.app/" "type": "folder",
}, "children": []
{ },
"name": "OnionShare", {
"type": "url", "name": "Right to repair & circular economy",
"url": "https://onionshare.org/" "type": "folder",
} "children": []
] }
}, ]
{ },
"name": "Espionage", {
"type": "folder", "name": "Privacy",
"children": [ "type": "folder",
{ "children": [
"name": "Nascondino", {
"type": "url", "name": "The Onion Router",
"url": "https://nascondino.github.io/" "type": "folder",
}, "children": [
{ {
"name": "IMSI-catcher", "name": "Tor Project",
"type": "url", "type": "file",
"url": "https://en.wikipedia.org/wiki/IMSI-catcher" "url": "https://www.torproject.org/"
}, },
{ {
"name": "Privacy Cell", "name": "Orbot",
"type": "url", "type": "file",
"url": "https://www.stoutner.com/privacy-cell/" "url": "https://orbot.app/"
} },
] {
} "name": "OnionShare",
] "type": "url",
}, "url": "https://onionshare.org/"
{ }
"name": "Software Licenses", ]
"type": "folder", },
"children": [] {
}, "name": "Espionage",
{ "type": "folder",
"name": "Security", "children": [
"type": "folder", {
"children": [ "name": "Nascondino",
"type": "url",
] "url": "https://nascondino.github.io/"
}, },
{ {
"name": "Networking", "name": "IMSI-catcher",
"type": "folder", "type": "url",
"children": [ "url": "https://en.wikipedia.org/wiki/IMSI-catcher"
{ },
"name": "VPN", {
"type": "folder", "name": "Privacy Cell",
"children": [ "type": "url",
{ "url": "https://www.stoutner.com/privacy-cell/"
"name": "SSH Lirp", }
"type": "url", ]
"url": "https://github.com/virtualsquare/sshlirp" },
}, {
{ "name": "Secure messaging",
"name": "VirtualSquare", "type": "folder",
"type": "url", "children": []
"url": "https://wiki.virtualsquare.org/" },
} {
] "name": "Metadata & traffic analysis",
} "type": "folder",
] "children": []
}, },
{ {
"name": "Friends' Groups", "name": "Tracking & fingerprinting",
"type": "folder", "type": "folder",
"children": [ "children": []
{ },
"name": "Hackerspaces", {
"type": "folder", "name": "Physical & biometric privacy",
"children": [ "type": "folder",
{ "children": []
"name": "General Grouping", }
"type": "folder", ]
"children": [ },
{ {
"name": "Hackerspaces.org", "name": "Software Licenses",
"type": "url", "type": "folder",
"url": "https://hackerspaces.org/" "children": [
}, {
{ "name": "Free Software & Copyleft",
"name": "Hackaday.io Hackerspaces", "type": "folder",
"type": "url", "children": []
"url": "https://hackaday.io/hackerspaces" },
} {
] "name": "Permissive licenses",
}, "type": "folder",
{ "children": []
"name": "People weve known / heard of", },
"type": "folder", {
"children": [ "name": "Copyfarleft & commons",
{ "type": "folder",
"name": "Autistici Org", "children": []
"type": "url", },
"url": "https://autistici.org/" {
}, "name": "Creative Commons & culture",
{ "type": "folder",
"name": "Tracciabi Li", "children": []
"type": "url", },
"url": "https://www.tracciabi.li/" {
}, "name": "Data & database licenses",
{ "type": "folder",
"name": "Indivia Net", "children": []
"type": "url", },
"url": "https://indivia.net/" {
}, "name": "Hardware & open design licenses",
{ "type": "folder",
"name": "Bida", "children": []
"type": "url", }
"url": "https://bida.im/" ]
}, },
{ {
"name": "Oziosi / Esiliati", "name": "Security",
"type": "url", "type": "folder",
"url": "https://www.oziosi.org/" "children": []
} },
] {
} "name": "Networking",
] "type": "folder",
}, "children": [
{ {
"name": "Local Social groups/organizations we know", "name": "VPN",
"type": "folder", "type": "folder",
"children": [ "children": [
{ {
"name": "LinuxTrent", "name": "SSH Lirp",
"type": "url", "type": "url",
"url": "https://www.linuxtrent.it/" "url": "https://github.com/virtualsquare/sshlirp"
}, },
{ {
"name": "LibreriaUtopiaTrento", "name": "VirtualSquare",
"type": "url", "type": "url",
"url": "https://libreriautopiatrento.it/" "url": "https://wiki.virtualsquare.org/"
} }
] ]
} },
] {
}, "name": "Mesh & community networks",
{ "type": "folder",
"name": "Computing Art", "children": []
"type": "folder", },
"children": [] {
}, "name": "Routing & BGP",
{ "type": "folder",
"name": "Preservation Of History", "children": []
"type": "folder", },
"children": [] {
}, "name": "Wireless & radio links",
{ "type": "folder",
"name": "Repair", "children": []
"type": "folder", },
"children": [] {
}, "name": "Network monitoring & observability",
{ "type": "folder",
"name": "Retrocomputing", "children": []
"type": "folder", },
"children": [] {
}, "name": "Ad-hoc & disaster networking",
{ "type": "folder",
"name": "Operating Systems", "children": []
"type": "folder", }
"children": [ ]
{ },
"name": "Phones", {
"type": "folder", "name": "Friends' Groups",
"children": [] "type": "folder",
}, "children": [
{ {
"name": "Computers", "name": "Hackerspaces",
"type": "folder", "type": "folder",
"children": [] "children": [
} {
] "name": "General Grouping",
}, "type": "folder",
{ "children": [
"name": "Hosting", {
"type": "folder", "name": "Hackerspaces.org",
"children": [ "type": "url",
{ "url": "https://hackerspaces.org/"
"name": "Centralized", },
"type": "folder", {
"children": [] "name": "Hackaday.io Hackerspaces",
}, "type": "url",
{ "url": "https://hackaday.io/hackerspaces"
"name": "Self-Hosting", }
"type": "folder", ]
"children": [] },
}, {
{ "name": "People weve known / heard of",
"name": "Federation", "type": "folder",
"type": "folder", "children": [
"children": [] {
} "name": "Autistici Org",
] "type": "url",
}, "url": "https://autistici.org/"
{ },
"name": "Happening Phenomena", {
"type": "folder", "name": "Tracciabi Li",
"children": [ "type": "url",
{ "url": "https://www.tracciabi.li/"
"name": "Enshittification", },
"type": "folder", {
"children": [ "name": "Indivia Net",
{ "type": "url",
"name": "A secret web", "url": "https://indivia.net/"
"type": "url", },
"url": "https://blog.clew.se/posts/secret-web/" {
} "name": "Bida",
] "type": "url",
}, "url": "https://bida.im/"
{ },
"name": "Platformization & walled gardens", {
"type": "folder", "name": "Oziosi / Esiliati",
"children": [] "type": "url",
}, "url": "https://www.oziosi.org/"
{ }
"name": "Datafication", ]
"type": "folder", }
"children": [] ]
}, },
{ {
"name": "Subscriptionification & rent-seeking", "name": "Local Social groups/organizations we know",
"type": "folder", "type": "folder",
"children": [] "children": [
}, {
{ "name": "LinuxTrent",
"name": "AI-ification & automation creep", "type": "url",
"type": "folder", "url": "https://www.linuxtrent.it/"
"children": [ },
{ {
"name": "Noise HIP", "name": "LibreriaUtopiaTrento",
"type": "url", "type": "url",
"url": "https://noise.hackinpovo.it" "url": "https://libreriautopiatrento.it/"
} }
] ]
}, }
{ ]
"name": "Dark patterns & manipulation design", },
"type": "folder", {
"children": [] "name": "Computing Art",
} "type": "folder",
] "children": [
}] {
"name": "Generative art",
"type": "folder",
"children": []
},
{
"name": "Livecoding & audiovisual",
"type": "folder",
"children": []
},
{
"name": "Glitch art",
"type": "folder",
"children": []
},
{
"name": "Demoscene",
"type": "folder",
"children": []
},
{
"name": "Critical interfaces & data viz",
"type": "folder",
"children": []
},
{
"name": "Game art & interactive fiction",
"type": "folder",
"children": []
}
]
},
{
"name": "Preservation Of History",
"type": "folder",
"children": [
{
"name": "Digital preservation",
"type": "folder",
"children": []
},
{
"name": "Media archaeology",
"type": "folder",
"children": []
},
{
"name": "Local tech history",
"type": "folder",
"children": []
},
{
"name": "Oral histories & interviews",
"type": "folder",
"children": []
},
{
"name": "Archival formats & standards",
"type": "folder",
"children": []
}
]
},
{
"name": "Repair",
"type": "folder",
"children": [
{
"name": "Electronics repair",
"type": "folder",
"children": []
},
{
"name": "Laptop & phone repair",
"type": "folder",
"children": []
},
{
"name": "Appliance & household repair",
"type": "folder",
"children": []
},
{
"name": "Tools, skills & methods",
"type": "folder",
"children": []
},
{
"name": "Right to repair activism",
"type": "folder",
"children": []
}
]
},
{
"name": "Retrocomputing",
"type": "folder",
"children": [
{
"name": "8-bit & 16-bit era",
"type": "folder",
"children": []
},
{
"name": "Home computers & consoles",
"type": "folder",
"children": []
},
{
"name": "Old Unix & workstations",
"type": "folder",
"children": []
},
{
"name": "Vintage networking",
"type": "folder",
"children": []
},
{
"name": "Emulation & virtualization",
"type": "folder",
"children": []
},
{
"name": "Data transfer & rescue",
"type": "folder",
"children": []
}
]
},
{
"name": "Operating Systems",
"type": "folder",
"children": [
{
"name": "Phones",
"type": "folder",
"children": []
},
{
"name": "Computers",
"type": "folder",
"children": []
}
]
},
{
"name": "Hosting",
"type": "folder",
"children": [
{
"name": "Centralized",
"type": "folder",
"children": [
]
},
{
"name": "Self-Hosting",
"type": "folder",
"children": [
{
"name": "Home servers",
"type": "folder",
"children": []
},
{
"name": "Colocation",
"type": "folder",
"children": []
},
{
"name": "Monitoring & backups",
"type": "folder",
"children": []
}
]
},
{
"name": "Federation",
"type": "folder",
"children": [
{
"name": "Protocols",
"type": "folder",
"children": []
},
{
"name": "Fediverse",
"type": "folder",
"children": []
},
{
"name": "Email & XMPP",
"type": "folder",
"children": []
}
]
}
]
},
{
"name": "Happening Phenomena",
"type": "folder",
"children": [
{
"name": "Enshittification",
"type": "folder",
"children": [
{
"name": "A secret web",
"type": "url",
"url": "https://blog.clew.se/posts/secret-web/"
}
]
},
{
"name": "Platformization & walled gardens",
"type": "folder",
"children": []
},
{
"name": "Datafication",
"type": "folder",
"children": []
},
{
"name": "Subscriptionification & rent-seeking",
"type": "folder",
"children": []
},
{
"name": "AI-ification & automation creep",
"type": "folder",
"children": [
{
"name": "Noise HIP",
"type": "url",
"url": "https://noise.hackinpovo.it"
}
]
},
{
"name": "Dark patterns & manipulation design",
"type": "folder",
"children": []
}
]
}
]
} }