resources/public/arf.json
CawaAlreadyTaken 794d4f04ca
Some checks failed
Updates the graph by copying the updated files in the right directory / build-and-deploy (push) Failing after 3s
Weird character removed
2025-11-14 12:00:55 +01:00

649 lines
16 KiB
JSON

{
"name": "Miniera HackInPovo",
"type": "folder",
"children": [
{
"name": "Sustainability",
"type": "folder",
"children": [
{
"name": "Permacomputing",
"type": "folder",
"children": []
},
{
"name": "Low-tech & appropriate tech",
"type": "folder",
"children": []
},
{
"name": "Energy & efficiency",
"type": "folder",
"children": []
},
{
"name": "E-waste & recycling",
"type": "folder",
"children": []
},
{
"name": "Right to repair & circular economy",
"type": "folder",
"children": []
}
]
},
{
"name": "Privacy",
"type": "folder",
"children": [
{
"name": "The Onion Router",
"type": "folder",
"children": [
{
"name": "Tor Project",
"type": "file",
"url": "https://www.torproject.org/"
},
{
"name": "Orbot",
"type": "file",
"url": "https://orbot.app/"
},
{
"name": "OnionShare",
"type": "url",
"url": "https://onionshare.org/"
}
]
},
{
"name": "Espionage",
"type": "folder",
"children": [
{
"name": "Nascondino",
"type": "url",
"url": "https://nascondino.github.io/"
},
{
"name": "IMSI-catcher",
"type": "url",
"url": "https://en.wikipedia.org/wiki/IMSI-catcher"
},
{
"name": "Privacy Cell",
"type": "url",
"url": "https://www.stoutner.com/privacy-cell/"
}
]
},
{
"name": "Secure messaging",
"type": "folder",
"children": []
},
{
"name": "Metadata & traffic analysis",
"type": "folder",
"children": []
},
{
"name": "Tracking & fingerprinting",
"type": "folder",
"children": []
},
{
"name": "Physical & biometric privacy",
"type": "folder",
"children": []
}
]
},
{
"name": "Software Licenses",
"type": "folder",
"children": [
{
"name": "Free Software & Copyleft",
"type": "folder",
"children": []
},
{
"name": "Permissive licenses",
"type": "folder",
"children": []
},
{
"name": "Copyfarleft & commons",
"type": "folder",
"children": []
},
{
"name": "Creative Commons & culture",
"type": "folder",
"children": []
},
{
"name": "Data & database licenses",
"type": "folder",
"children": []
},
{
"name": "Hardware & open design licenses",
"type": "folder",
"children": []
}
]
},
{
"name": "Security",
"type": "folder",
"children": [
{
"name": "Software Security",
"type": "folder",
"children": [
{
"name": "Forensics",
"type": "folder",
"children": [
{
"name": "PTS Project",
"type": "url",
"url": "https://pts-project.org/"
}
]
},
{
"name": "Reverse Engineering",
"type": "folder",
"children": [
{
"name": "Disassemblers",
"type": "folder",
"children": [
{
"name": "Ghidra",
"type": "url",
"url": "https://github.com/NationalSecurityAgency/ghidra"
},
{
"name": "Radare2",
"type": "url",
"url": "https://www.radare.org/n/"
},
{
"name": "Cutter",
"type": "url",
"url": "https://cutter.re/"
}
]
},
{
"name": "Debuggers",
"type": "folder",
"children": [
{
"name": "GDB",
"type": "url",
"url": "https://www.gnu.org/software/gdb/"
}
]
}
]
},
{
"name": "Cryptography",
"type": "folder",
"children": [
{
"name": "Post Quantum",
"type": "folder",
"children": []
}
]
},
{
"name": "Steganography",
"type": "folder",
"children": [
{
"name": "vec2text",
"type": "url",
"url": "https://github.com/vec2text/vec2text"
},
{
"name": "Text Embeddings Reveal (Almost) As Much As Text [001]",
"type": "url",
"url": "https://openreview.net/pdf?id=wK7wUdiM5g0"
}
]
}
]
},
{
"name": "Hardware Security",
"type": "folder",
"children": [
{
"name": "NFC / RFID tags",
"type": "folder",
"children": [
{
"name": "Proxmark3",
"type": "url",
"url": "https://proxmark.com/"
},
{
"name": "ChameleonMini",
"type": "url",
"url": "https://github.com/emsec/ChameleonMini"
},
{
"name": "Flipper Zero",
"type": "url",
"url": "https://flipperzero.one/"
},
{
"name": "ACR122U",
"type": "url",
"url": "https://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/"
},
{
"name": "PN532",
"type": "url",
"url": "https://github.com/Seeed-Studio/PN532"
}
]
}
]
},
{
"name": "Physical Security",
"type": "folder",
"children": []
}
]
},
{
"name": "Networking",
"type": "folder",
"children": [
{
"name": "VPN",
"type": "folder",
"children": [
{
"name": "SSH Lirp",
"type": "url",
"url": "https://github.com/virtualsquare/sshlirp"
},
{
"name": "VirtualSquare",
"type": "url",
"url": "https://wiki.virtualsquare.org/"
}
]
},
{
"name": "Mesh & community networks",
"type": "folder",
"children": []
},
{
"name": "Routing & BGP",
"type": "folder",
"children": []
},
{
"name": "Wireless & radio links",
"type": "folder",
"children": []
},
{
"name": "Network monitoring & observability",
"type": "folder",
"children": []
},
{
"name": "Ad-hoc & disaster networking",
"type": "folder",
"children": []
}
]
},
{
"name": "Friends' Groups",
"type": "folder",
"children": [
{
"name": "Hackerspaces",
"type": "folder",
"children": [
{
"name": "Server Ribelli - Sorci",
"type": "url",
"url": "https://www.meltemieditore.it/catalogo/server-ribelli/"
},
{
"name": "General Grouping",
"type": "folder",
"children": [
{
"name": "Hackerspaces.org",
"type": "url",
"url": "https://hackerspaces.org/"
},
{
"name": "Hackaday.io Hackerspaces",
"type": "url",
"url": "https://hackaday.io/hackerspaces"
}
]
},
{
"name": "People we've known / heard of",
"type": "folder",
"children": [
{
"name": "Autistici Org",
"type": "url",
"url": "https://autistici.org/"
},
{
"name": "Tracciabi Li",
"type": "url",
"url": "https://www.tracciabi.li/"
},
{
"name": "Indivia Net",
"type": "url",
"url": "https://indivia.net/"
},
{
"name": "Bida",
"type": "url",
"url": "https://bida.im/"
},
{
"name": "Oziosi / Esiliati",
"type": "url",
"url": "https://www.oziosi.org/"
}
]
}
]
},
{
"name": "Local Social groups/organizations we know",
"type": "folder",
"children": [
{
"name": "LinuxTrent",
"type": "url",
"url": "https://www.linuxtrent.it/"
},
{
"name": "LibreriaUtopiaTrento",
"type": "url",
"url": "https://libreriautopiatrento.it/"
}
]
}
]
},
{
"name": "Computing Art",
"type": "folder",
"children": [
{
"name": "Generative art",
"type": "folder",
"children": []
},
{
"name": "Livecoding & audiovisual",
"type": "folder",
"children": []
},
{
"name": "Glitch art",
"type": "folder",
"children": []
},
{
"name": "Demoscene",
"type": "folder",
"children": []
},
{
"name": "Critical interfaces & data viz",
"type": "folder",
"children": []
},
{
"name": "Game art & interactive fiction",
"type": "folder",
"children": []
}
]
},
{
"name": "Preservation Of History",
"type": "folder",
"children": [
{
"name": "Digital preservation",
"type": "folder",
"children": []
},
{
"name": "Media archaeology",
"type": "folder",
"children": []
},
{
"name": "Local tech history",
"type": "folder",
"children": []
},
{
"name": "Oral histories & interviews",
"type": "folder",
"children": []
},
{
"name": "Archival formats & standards",
"type": "folder",
"children": []
}
]
},
{
"name": "Repair",
"type": "folder",
"children": [
{
"name": "Electronics repair",
"type": "folder",
"children": []
},
{
"name": "Laptop & phone repair",
"type": "folder",
"children": []
},
{
"name": "Appliance & household repair",
"type": "folder",
"children": []
},
{
"name": "Tools, skills & methods",
"type": "folder",
"children": []
},
{
"name": "Right to repair activism",
"type": "folder",
"children": []
}
]
},
{
"name": "Retrocomputing",
"type": "folder",
"children": [
{
"name": "8-bit & 16-bit era",
"type": "folder",
"children": []
},
{
"name": "Home computers & consoles",
"type": "folder",
"children": []
},
{
"name": "Old Unix & workstations",
"type": "folder",
"children": []
},
{
"name": "Vintage networking",
"type": "folder",
"children": []
},
{
"name": "Emulation & virtualization",
"type": "folder",
"children": []
},
{
"name": "Data transfer & rescue",
"type": "folder",
"children": []
}
]
},
{
"name": "Operating Systems",
"type": "folder",
"children": [
{
"name": "Phones",
"type": "folder",
"children": []
},
{
"name": "Computers",
"type": "folder",
"children": []
}
]
},
{
"name": "Hosting",
"type": "folder",
"children": [
{
"name": "Centralized",
"type": "folder",
"children": []
},
{
"name": "Self-Hosting",
"type": "folder",
"children": [
{
"name": "Home servers",
"type": "folder",
"children": []
},
{
"name": "Colocation",
"type": "folder",
"children": []
},
{
"name": "Monitoring & backups",
"type": "folder",
"children": []
}
]
},
{
"name": "Federation",
"type": "folder",
"children": [
{
"name": "Protocols",
"type": "folder",
"children": []
},
{
"name": "Fediverse",
"type": "folder",
"children": []
},
{
"name": "Email & XMPP",
"type": "folder",
"children": []
}
]
}
]
},
{
"name": "Happening Phenomena",
"type": "folder",
"children": [
{
"name": "Enshittification",
"type": "folder",
"children": [
{
"name": "A secret web",
"type": "url",
"url": "https://blog.clew.se/posts/secret-web/"
}
]
},
{
"name": "Platformization & walled gardens",
"type": "folder",
"children": []
},
{
"name": "Datafication",
"type": "folder",
"children": []
},
{
"name": "Subscriptionification & rent-seeking",
"type": "folder",
"children": []
},
{
"name": "AI-ification & automation creep",
"type": "folder",
"children": [
{
"name": "Noise HIP",
"type": "url",
"url": "https://noise.hackinpovo.it"
}
]
},
{
"name": "Dark patterns & manipulation design",
"type": "folder",
"children": []
}
]
}
]
}