{ "name": "Miniera HackInPovo", "type": "folder", "children": [ { "name": "Sustainability", "type": "folder", "children": [ { "name": "Permacomputing", "type": "folder", "children": [] }, { "name": "Low-tech & appropriate tech", "type": "folder", "children": [] }, { "name": "Energy & efficiency", "type": "folder", "children": [] }, { "name": "E-waste & recycling", "type": "folder", "children": [] }, { "name": "Right to repair & circular economy", "type": "folder", "children": [] } ] }, { "name": "Privacy", "type": "folder", "children": [ { "name": "The Onion Router", "type": "folder", "children": [ { "name": "Tor Project", "type": "file", "url": "https://www.torproject.org/" }, { "name": "Orbot", "type": "file", "url": "https://orbot.app/" }, { "name": "OnionShare", "type": "url", "url": "https://onionshare.org/" } ] }, { "name": "Espionage", "type": "folder", "children": [ { "name": "Nascondino", "type": "url", "url": "https://nascondino.github.io/" }, { "name": "IMSI-catcher", "type": "url", "url": "https://en.wikipedia.org/wiki/IMSI-catcher" }, { "name": "Privacy Cell", "type": "url", "url": "https://www.stoutner.com/privacy-cell/" } ] }, { "name": "Secure messaging", "type": "folder", "children": [] }, { "name": "Metadata & traffic analysis", "type": "folder", "children": [] }, { "name": "Tracking & fingerprinting", "type": "folder", "children": [] }, { "name": "Physical & biometric privacy", "type": "folder", "children": [] } ] }, { "name": "Software Licenses", "type": "folder", "children": [ { "name": "Free Software & Copyleft", "type": "folder", "children": [] }, { "name": "Permissive licenses", "type": "folder", "children": [] }, { "name": "Copyfarleft & commons", "type": "folder", "children": [] }, { "name": "Creative Commons & culture", "type": "folder", "children": [] }, { "name": "Data & database licenses", "type": "folder", "children": [] }, { "name": "Hardware & open design licenses", "type": "folder", "children": [] } ] }, { "name": "Security", "type": "folder", "children": [] }, { "name": "Networking", "type": "folder", "children": [ { "name": "VPN", "type": "folder", "children": [ { "name": "SSH Lirp", "type": "url", "url": "https://github.com/virtualsquare/sshlirp" }, { "name": "VirtualSquare", "type": "url", "url": "https://wiki.virtualsquare.org/" } ] }, { "name": "Mesh & community networks", "type": "folder", "children": [] }, { "name": "Routing & BGP", "type": "folder", "children": [] }, { "name": "Wireless & radio links", "type": "folder", "children": [] }, { "name": "Network monitoring & observability", "type": "folder", "children": [] }, { "name": "Ad-hoc & disaster networking", "type": "folder", "children": [] } ] }, { "name": "Friends' Groups", "type": "folder", "children": [ { "name": "Hackerspaces", "type": "folder", "children": [ { "name": "Server Ribelli - Sorci", "type": "url", "url": "https://www.meltemieditore.it/catalogo/server-ribelli/" }, { "name": "General Grouping", "type": "folder", "children": [ { "name": "Hackerspaces.org", "type": "url", "url": "https://hackerspaces.org/" }, { "name": "Hackaday.io Hackerspaces", "type": "url", "url": "https://hackaday.io/hackerspaces" } ] }, { "name": "People we’ve known / heard of", "type": "folder", "children": [ { "name": "Autistici Org", "type": "url", "url": "https://autistici.org/" }, { "name": "Tracciabi Li", "type": "url", "url": "https://www.tracciabi.li/" }, { "name": "Indivia Net", "type": "url", "url": "https://indivia.net/" }, { "name": "Bida", "type": "url", "url": "https://bida.im/" }, { "name": "Oziosi / Esiliati", "type": "url", "url": "https://www.oziosi.org/" } ] } ] }, { "name": "Local Social groups/organizations we know", "type": "folder", "children": [ { "name": "LinuxTrent", "type": "url", "url": "https://www.linuxtrent.it/" }, { "name": "LibreriaUtopiaTrento", "type": "url", "url": "https://libreriautopiatrento.it/" } ] } ] }, { "name": "Computing Art", "type": "folder", "children": [ { "name": "Generative art", "type": "folder", "children": [] }, { "name": "Livecoding & audiovisual", "type": "folder", "children": [] }, { "name": "Glitch art", "type": "folder", "children": [] }, { "name": "Demoscene", "type": "folder", "children": [] }, { "name": "Critical interfaces & data viz", "type": "folder", "children": [] }, { "name": "Game art & interactive fiction", "type": "folder", "children": [] } ] }, { "name": "Preservation Of History", "type": "folder", "children": [ { "name": "Digital preservation", "type": "folder", "children": [] }, { "name": "Media archaeology", "type": "folder", "children": [] }, { "name": "Local tech history", "type": "folder", "children": [] }, { "name": "Oral histories & interviews", "type": "folder", "children": [] }, { "name": "Archival formats & standards", "type": "folder", "children": [] } ] }, { "name": "Repair", "type": "folder", "children": [ { "name": "Electronics repair", "type": "folder", "children": [] }, { "name": "Laptop & phone repair", "type": "folder", "children": [] }, { "name": "Appliance & household repair", "type": "folder", "children": [] }, { "name": "Tools, skills & methods", "type": "folder", "children": [] }, { "name": "Right to repair activism", "type": "folder", "children": [] } ] }, { "name": "Retrocomputing", "type": "folder", "children": [ { "name": "8-bit & 16-bit era", "type": "folder", "children": [] }, { "name": "Home computers & consoles", "type": "folder", "children": [] }, { "name": "Old Unix & workstations", "type": "folder", "children": [] }, { "name": "Vintage networking", "type": "folder", "children": [] }, { "name": "Emulation & virtualization", "type": "folder", "children": [] }, { "name": "Data transfer & rescue", "type": "folder", "children": [] } ] }, { "name": "Operating Systems", "type": "folder", "children": [ { "name": "Phones", "type": "folder", "children": [] }, { "name": "Computers", "type": "folder", "children": [] } ] }, { "name": "Hosting", "type": "folder", "children": [ { "name": "Centralized", "type": "folder", "children": [] }, { "name": "Self-Hosting", "type": "folder", "children": [ { "name": "Home servers", "type": "folder", "children": [] }, { "name": "Colocation", "type": "folder", "children": [] }, { "name": "Monitoring & backups", "type": "folder", "children": [] } ] }, { "name": "Federation", "type": "folder", "children": [ { "name": "Protocols", "type": "folder", "children": [] }, { "name": "Fediverse", "type": "folder", "children": [] }, { "name": "Email & XMPP", "type": "folder", "children": [] } ] } ] }, { "name": "Happening Phenomena", "type": "folder", "children": [ { "name": "Enshittification", "type": "folder", "children": [ { "name": "A secret web", "type": "url", "url": "https://blog.clew.se/posts/secret-web/" } ] }, { "name": "Platformization & walled gardens", "type": "folder", "children": [] }, { "name": "Datafication", "type": "folder", "children": [] }, { "name": "Subscriptionification & rent-seeking", "type": "folder", "children": [] }, { "name": "AI-ification & automation creep", "type": "folder", "children": [ { "name": "Noise HIP", "type": "url", "url": "https://noise.hackinpovo.it" } ] }, { "name": "Dark patterns & manipulation design", "type": "folder", "children": [] } ] } ] }