{ "name": "Miniera HackInPovo", "type": "folder", "children": [ { "name": "Sustainability", "type": "folder", "children": [ { "name": "Permacomputing", "type": "folder", "children": [] }, { "name": "Low-tech & appropriate tech", "type": "folder", "children": [] }, { "name": "Energy & efficiency", "type": "folder", "children": [] }, { "name": "E-waste & recycling", "type": "folder", "children": [] }, { "name": "Right to repair & circular economy", "type": "folder", "children": [] } ] }, { "name": "Privacy", "type": "folder", "children": [ { "name": "The Onion Router", "type": "folder", "children": [ { "name": "Tor Project", "type": "file", "url": "https://www.torproject.org/" }, { "name": "Orbot", "type": "file", "url": "https://orbot.app/" }, { "name": "OnionShare", "type": "url", "url": "https://onionshare.org/" } ] }, { "name": "Espionage", "type": "folder", "children": [ { "name": "Nascondino", "type": "url", "url": "https://nascondino.github.io/" }, { "name": "IMSI-catcher", "type": "url", "url": "https://en.wikipedia.org/wiki/IMSI-catcher" }, { "name": "Privacy Cell", "type": "url", "url": "https://www.stoutner.com/privacy-cell/" } ] }, { "name": "Secure messaging", "type": "folder", "children": [] }, { "name": "Metadata & traffic analysis", "type": "folder", "children": [] }, { "name": "Tracking & fingerprinting", "type": "folder", "children": [] }, { "name": "Physical & biometric privacy", "type": "folder", "children": [] } ] }, { "name": "Software Licenses", "type": "folder", "children": [ { "name": "Free Software & Copyleft", "type": "folder", "children": [] }, { "name": "Permissive licenses", "type": "folder", "children": [] }, { "name": "Copyfarleft & commons", "type": "folder", "children": [] }, { "name": "Creative Commons & culture", "type": "folder", "children": [] }, { "name": "Data & database licenses", "type": "folder", "children": [] }, { "name": "Hardware & open design licenses", "type": "folder", "children": [] } ] }, { "name": "Security", "type": "folder", "children": [ { "name": "Software Security", "type": "folder", "children": [ { "name": "Forensics", "type": "folder", "children": [ { "name": "PTS Project", "type": "url", "url": "https://pts-project.org/" } ] }, { "name": "Reverse Engineering", "type": "folder", "children": [ { "name": "Disassemblers", "type": "folder", "children": [ { "name": "Ghidra", "type": "url", "url": "https://github.com/NationalSecurityAgency/ghidra" }, { "name": "Radare2", "type": "url", "url": "https://www.radare.org/n/" }, { "name": "Cutter", "type": "url", "url": "https://cutter.re/" } ] }, { "name": "Debuggers", "type": "folder", "children": [ { "name": "GDB", "type": "url", "url": "https://www.gnu.org/software/gdb/" } ] } ] }, { "name": "Cryptography", "type": "folder", "children": [ { "name": "Post Quantum", "type": "folder", "children": [] } ] }, { "name": "Steganography", "type": "folder", "children": [ { "name": "vec2text", "type": "url", "url": "https://github.com/vec2text/vec2text" }, { "name": "Text Embeddings Reveal (Almost) As Much As Text", "type": "url", "url": "https://openreview.net/pdf?id=wK7wUdiM5g0" } ] } ] }, { "name": "Hardware Security", "type": "folder", "children": [ { "name": "NFC / RFID tags", "type": "folder", "children": [ { "name": "Proxmark3", "type": "url", "url": "https://proxmark.com/" }, { "name": "ChameleonMini", "type": "url", "url": "https://github.com/emsec/ChameleonMini" }, { "name": "Flipper Zero", "type": "url", "url": "https://flipperzero.one/" }, { "name": "ACR122U", "type": "url", "url": "https://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/" }, { "name": "PN532", "type": "url", "url": "https://github.com/Seeed-Studio/PN532" } ] } ] }, { "name": "Physical Security", "type": "folder", "children": [] } ] }, { "name": "Networking", "type": "folder", "children": [ { "name": "VPN", "type": "folder", "children": [ { "name": "SSH Lirp", "type": "url", "url": "https://github.com/virtualsquare/sshlirp" }, { "name": "VirtualSquare", "type": "url", "url": "https://wiki.virtualsquare.org/" } ] }, { "name": "Mesh & community networks", "type": "folder", "children": [] }, { "name": "Routing & BGP", "type": "folder", "children": [] }, { "name": "Wireless & radio links", "type": "folder", "children": [] }, { "name": "Network monitoring & observability", "type": "folder", "children": [] }, { "name": "Ad-hoc & disaster networking", "type": "folder", "children": [] } ] }, { "name": "Friends' Groups", "type": "folder", "children": [ { "name": "Partito Pirata", "type": "url", "url": "https://it.wikipedia.org/wiki/Partito_Pirata" }, { "name": "Hackerspaces", "type": "folder", "children": [ { "name": "Server Ribelli - Sorci", "type": "url", "url": "https://www.meltemieditore.it/catalogo/server-ribelli/" }, { "name": "General Grouping", "type": "folder", "children": [ { "name": "Hackerspaces.org", "type": "url", "url": "https://hackerspaces.org/" }, { "name": "Hackaday.io Hackerspaces", "type": "url", "url": "https://hackaday.io/hackerspaces" } ] }, { "name": "People we've known / heard of", "type": "folder", "children": [ { "name": "Autistici Org", "type": "url", "url": "https://autistici.org/" }, { "name": "Tracciabi Li", "type": "url", "url": "https://www.tracciabi.li/" }, { "name": "Indivia Net", "type": "url", "url": "https://indivia.net/" }, { "name": "Bida", "type": "url", "url": "https://bida.im/" }, { "name": "Oziosi / Esiliati", "type": "url", "url": "https://www.oziosi.org/" } ] } ] }, { "name": "Local Social groups/organizations we know", "type": "folder", "children": [ { "name": "LinuxTrent", "type": "url", "url": "https://www.linuxtrent.it/" }, { "name": "LibreriaUtopiaTrento", "type": "url", "url": "https://libreriautopiatrento.it/" } ] } ] }, { "name": "Computing Art", "type": "folder", "children": [ { "name": "Generative art", "type": "folder", "children": [] }, { "name": "Livecoding & audiovisual", "type": "folder", "children": [] }, { "name": "Glitch art", "type": "folder", "children": [] }, { "name": "Demoscene", "type": "folder", "children": [] }, { "name": "Critical interfaces & data viz", "type": "folder", "children": [] }, { "name": "Game art & interactive fiction", "type": "folder", "children": [] } ] }, { "name": "Preservation Of History", "type": "folder", "children": [ { "name": "Digital preservation", "type": "folder", "children": [] }, { "name": "Media archaeology", "type": "folder", "children": [] }, { "name": "Local tech history", "type": "folder", "children": [] }, { "name": "Oral histories & interviews", "type": "folder", "children": [] }, { "name": "Archival formats & standards", "type": "folder", "children": [] } ] }, { "name": "Repair", "type": "folder", "children": [ { "name": "Electronics repair", "type": "folder", "children": [] }, { "name": "Laptop & phone repair", "type": "folder", "children": [] }, { "name": "Appliance & household repair", "type": "folder", "children": [] }, { "name": "Tools, skills & methods", "type": "folder", "children": [] }, { "name": "Right to repair activism", "type": "folder", "children": [] } ] }, { "name": "Retrocomputing", "type": "folder", "children": [ { "name": "8-bit & 16-bit era", "type": "folder", "children": [] }, { "name": "Home computers & consoles", "type": "folder", "children": [] }, { "name": "Old Unix & workstations", "type": "folder", "children": [] }, { "name": "Vintage networking", "type": "folder", "children": [] }, { "name": "Emulation & virtualization", "type": "folder", "children": [] }, { "name": "Data transfer & rescue", "type": "folder", "children": [] } ] }, { "name": "Operating Systems", "type": "folder", "children": [ { "name": "Phones", "type": "folder", "children": [] }, { "name": "Computers", "type": "folder", "children": [] } ] }, { "name": "Hosting", "type": "folder", "children": [ { "name": "Centralized", "type": "folder", "children": [] }, { "name": "Self-Hosting", "type": "folder", "children": [ { "name": "Home servers", "type": "folder", "children": [] }, { "name": "Colocation", "type": "folder", "children": [] }, { "name": "Monitoring & backups", "type": "folder", "children": [] } ] }, { "name": "Federation", "type": "folder", "children": [ { "name": "Protocols", "type": "folder", "children": [] }, { "name": "Fediverse", "type": "folder", "children": [ { "name": "What is the Fediverse", "type": "url", "url": "https://simplyexplained.com/videos/mastodon-and-fediverse-explained/" }, { "name": "List of fediverse software", "type": "url", "url": "https://codeberg.org/fediverse/delightful-fediverse-experience#games" }, { "name": "(De)centralizzazione", "type": "url", "url": "https://poliverso.org/display/0477a01e-1964-abfd-552f-aef477916660" }, { "name": "W3C - Activity Pub", "type": "url", "url": "https://www.w3.org/TR/activitypub/" } ] }, { "name": "Email & XMPP", "type": "folder", "children": [] } ] } ] }, { "name": "Happening Phenomena", "type": "folder", "children": [ { "name": "Enshittification", "type": "folder", "children": [ { "name": "A secret web", "type": "url", "url": "https://blog.clew.se/posts/secret-web/" } ] }, { "name": "Platformization & walled gardens", "type": "folder", "children": [] }, { "name": "Datafication", "type": "folder", "children": [] }, { "name": "Subscriptionification & rent-seeking", "type": "folder", "children": [] }, { "name": "AI-ification & automation creep", "type": "folder", "children": [ { "name": "Noise HIP", "type": "url", "url": "https://noise.hackinpovo.it" } ] }, { "name": "Dark patterns & manipulation design", "type": "folder", "children": [] } ] } ] }