resources/public/arf.json
CawaAlreadyTaken 3607be73af
Some checks failed
Updates the graph by copying the updated files in the right directory / build-and-deploy (push) Failing after 5s
Finished to copy nextcloud info, added also the first note
2025-11-14 11:57:03 +01:00

649 lines
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"name": "Miniera HackInPovo",
"type": "folder",
"children": [
{
"name": "Sustainability",
"type": "folder",
"children": [
{
"name": "Permacomputing",
"type": "folder",
"children": []
},
{
"name": "Low-tech & appropriate tech",
"type": "folder",
"children": []
},
{
"name": "Energy & efficiency",
"type": "folder",
"children": []
},
{
"name": "E-waste & recycling",
"type": "folder",
"children": []
},
{
"name": "Right to repair & circular economy",
"type": "folder",
"children": []
}
]
},
{
"name": "Privacy",
"type": "folder",
"children": [
{
"name": "The Onion Router",
"type": "folder",
"children": [
{
"name": "Tor Project",
"type": "file",
"url": "https://www.torproject.org/"
},
{
"name": "Orbot",
"type": "file",
"url": "https://orbot.app/"
},
{
"name": "OnionShare",
"type": "url",
"url": "https://onionshare.org/"
}
]
},
{
"name": "Espionage",
"type": "folder",
"children": [
{
"name": "Nascondino",
"type": "url",
"url": "https://nascondino.github.io/"
},
{
"name": "IMSI-catcher",
"type": "url",
"url": "https://en.wikipedia.org/wiki/IMSI-catcher"
},
{
"name": "Privacy Cell",
"type": "url",
"url": "https://www.stoutner.com/privacy-cell/"
}
]
},
{
"name": "Secure messaging",
"type": "folder",
"children": []
},
{
"name": "Metadata & traffic analysis",
"type": "folder",
"children": []
},
{
"name": "Tracking & fingerprinting",
"type": "folder",
"children": []
},
{
"name": "Physical & biometric privacy",
"type": "folder",
"children": []
}
]
},
{
"name": "Software Licenses",
"type": "folder",
"children": [
{
"name": "Free Software & Copyleft",
"type": "folder",
"children": []
},
{
"name": "Permissive licenses",
"type": "folder",
"children": []
},
{
"name": "Copyfarleft & commons",
"type": "folder",
"children": []
},
{
"name": "Creative Commons & culture",
"type": "folder",
"children": []
},
{
"name": "Data & database licenses",
"type": "folder",
"children": []
},
{
"name": "Hardware & open design licenses",
"type": "folder",
"children": []
}
]
},
{
"name": "Security",
"type": "folder",
"children": [
{
"name": "Software Security",
"type": "folder",
"children": [
{
"name": "Forensics",
"type": "folder",
"children": [
{
"name": "PTS Project",
"type": "url",
"url": "https://pts-project.org/"
}
]
},
{
"name": "Reverse Engineering",
"type": "folder",
"children": [
{
"name": "Disassemblers",
"type": "folder",
"children": [
{
"name": "Ghidra",
"type": "url",
"url": "https://github.com/NationalSecurityAgency/ghidra"
},
{
"name": "Radare2",
"type": "url",
"url": "https://www.radare.org/n/"
},
{
"name": "Cutter",
"type": "url",
"url": "https://cutter.re/"
}
]
},
{
"name": "Debuggers",
"type": "folder",
"children": [
{
"name": "GDB",
"type": "url",
"url": "https://www.gnu.org/software/gdb/"
}
]
}
]
},
{
"name": "Cryptography",
"type": "folder",
"children": [
{
"name": "Post Quantum",
"type": "folder",
"children": []
}
]
},
{
"name": "Steganography",
"type": "folder",
"children": [
{
"name": "vec2text",
"type": "url",
"url": "https://github.com/vec2text/vec2text"
},
{
"name": "Text Embeddings Reveal (Almost) As Much As Text [001]",
"type": "url",
"url": "https://openreview.net/pdf?id=wK7wUdiM5g0"
}
]
}
]
},
{
"name": "Hardware Security",
"type": "folder",
"children": [
{
"name": "NFC / RFID tags",
"type": "folder",
"children": [
{
"name": "Proxmark3",
"type": "url",
"url": "https://proxmark.com/"
},
{
"name": "ChameleonMini",
"type": "url",
"url": "https://github.com/emsec/ChameleonMini"
},
{
"name": "Flipper Zero",
"type": "url",
"url": "https://flipperzero.one/"
},
{
"name": "ACR122U",
"type": "url",
"url": "https://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/"
},
{
"name": "PN532",
"type": "url",
"url": "https://github.com/Seeed-Studio/PN532"
}
]
}
]
},
{
"name": "Physical Security",
"type": "folder",
"children": []
}
]
},
{
"name": "Networking",
"type": "folder",
"children": [
{
"name": "VPN",
"type": "folder",
"children": [
{
"name": "SSH Lirp",
"type": "url",
"url": "https://github.com/virtualsquare/sshlirp"
},
{
"name": "VirtualSquare",
"type": "url",
"url": "https://wiki.virtualsquare.org/"
}
]
},
{
"name": "Mesh & community networks",
"type": "folder",
"children": []
},
{
"name": "Routing & BGP",
"type": "folder",
"children": []
},
{
"name": "Wireless & radio links",
"type": "folder",
"children": []
},
{
"name": "Network monitoring & observability",
"type": "folder",
"children": []
},
{
"name": "Ad-hoc & disaster networking",
"type": "folder",
"children": []
}
]
},
{
"name": "Friends' Groups",
"type": "folder",
"children": [
{
"name": "Hackerspaces",
"type": "folder",
"children": [
{
"name": "Server Ribelli - Sorci",
"type": "url",
"url": "https://www.meltemieditore.it/catalogo/server-ribelli/"
},
{
"name": "General Grouping",
"type": "folder",
"children": [
{
"name": "Hackerspaces.org",
"type": "url",
"url": "https://hackerspaces.org/"
},
{
"name": "Hackaday.io Hackerspaces",
"type": "url",
"url": "https://hackaday.io/hackerspaces"
}
]
},
{
"name": "People weve known / heard of",
"type": "folder",
"children": [
{
"name": "Autistici Org",
"type": "url",
"url": "https://autistici.org/"
},
{
"name": "Tracciabi Li",
"type": "url",
"url": "https://www.tracciabi.li/"
},
{
"name": "Indivia Net",
"type": "url",
"url": "https://indivia.net/"
},
{
"name": "Bida",
"type": "url",
"url": "https://bida.im/"
},
{
"name": "Oziosi / Esiliati",
"type": "url",
"url": "https://www.oziosi.org/"
}
]
}
]
},
{
"name": "Local Social groups/organizations we know",
"type": "folder",
"children": [
{
"name": "LinuxTrent",
"type": "url",
"url": "https://www.linuxtrent.it/"
},
{
"name": "LibreriaUtopiaTrento",
"type": "url",
"url": "https://libreriautopiatrento.it/"
}
]
}
]
},
{
"name": "Computing Art",
"type": "folder",
"children": [
{
"name": "Generative art",
"type": "folder",
"children": []
},
{
"name": "Livecoding & audiovisual",
"type": "folder",
"children": []
},
{
"name": "Glitch art",
"type": "folder",
"children": []
},
{
"name": "Demoscene",
"type": "folder",
"children": []
},
{
"name": "Critical interfaces & data viz",
"type": "folder",
"children": []
},
{
"name": "Game art & interactive fiction",
"type": "folder",
"children": []
}
]
},
{
"name": "Preservation Of History",
"type": "folder",
"children": [
{
"name": "Digital preservation",
"type": "folder",
"children": []
},
{
"name": "Media archaeology",
"type": "folder",
"children": []
},
{
"name": "Local tech history",
"type": "folder",
"children": []
},
{
"name": "Oral histories & interviews",
"type": "folder",
"children": []
},
{
"name": "Archival formats & standards",
"type": "folder",
"children": []
}
]
},
{
"name": "Repair",
"type": "folder",
"children": [
{
"name": "Electronics repair",
"type": "folder",
"children": []
},
{
"name": "Laptop & phone repair",
"type": "folder",
"children": []
},
{
"name": "Appliance & household repair",
"type": "folder",
"children": []
},
{
"name": "Tools, skills & methods",
"type": "folder",
"children": []
},
{
"name": "Right to repair activism",
"type": "folder",
"children": []
}
]
},
{
"name": "Retrocomputing",
"type": "folder",
"children": [
{
"name": "8-bit & 16-bit era",
"type": "folder",
"children": []
},
{
"name": "Home computers & consoles",
"type": "folder",
"children": []
},
{
"name": "Old Unix & workstations",
"type": "folder",
"children": []
},
{
"name": "Vintage networking",
"type": "folder",
"children": []
},
{
"name": "Emulation & virtualization",
"type": "folder",
"children": []
},
{
"name": "Data transfer & rescue",
"type": "folder",
"children": []
}
]
},
{
"name": "Operating Systems",
"type": "folder",
"children": [
{
"name": "Phones",
"type": "folder",
"children": []
},
{
"name": "Computers",
"type": "folder",
"children": []
}
]
},
{
"name": "Hosting",
"type": "folder",
"children": [
{
"name": "Centralized",
"type": "folder",
"children": []
},
{
"name": "Self-Hosting",
"type": "folder",
"children": [
{
"name": "Home servers",
"type": "folder",
"children": []
},
{
"name": "Colocation",
"type": "folder",
"children": []
},
{
"name": "Monitoring & backups",
"type": "folder",
"children": []
}
]
},
{
"name": "Federation",
"type": "folder",
"children": [
{
"name": "Protocols",
"type": "folder",
"children": []
},
{
"name": "Fediverse",
"type": "folder",
"children": []
},
{
"name": "Email & XMPP",
"type": "folder",
"children": []
}
]
}
]
},
{
"name": "Happening Phenomena",
"type": "folder",
"children": [
{
"name": "Enshittification",
"type": "folder",
"children": [
{
"name": "A secret web",
"type": "url",
"url": "https://blog.clew.se/posts/secret-web/"
}
]
},
{
"name": "Platformization & walled gardens",
"type": "folder",
"children": []
},
{
"name": "Datafication",
"type": "folder",
"children": []
},
{
"name": "Subscriptionification & rent-seeking",
"type": "folder",
"children": []
},
{
"name": "AI-ification & automation creep",
"type": "folder",
"children": [
{
"name": "Noise HIP",
"type": "url",
"url": "https://noise.hackinpovo.it"
}
]
},
{
"name": "Dark patterns & manipulation design",
"type": "folder",
"children": []
}
]
}
]
}