Node Vol 01
Node Vol 01
You can use this address to download the digital copy of NODE Vol 01, the license, and all the project files:
dat://d5f52282d8277c323abcd838e7b1e62113af6dfa70f3c7316ec004911881ec41
CONTENTS
Interview with Paul Frazee 018 The Rise of Smart Organizations 098
The NODE Double Drive 024 The Pi Zero W Security Camera 106
Chattervox Tutorial 034 MNT Reform: Open Source DIY Laptop 114
Editor: Mike Dank. Contributors: NODE, Sam Patterson, John Light, Burak Nehbit, Eric Schallock & Esteban Ordano
004 / EDITOR’S LETTER
In 1968, a 29-year-old Stewart Brand and his Zines, small-circulation magazines often
wife embarked on a road trip in his 1963 produced independently by a small group of
Dodge pickup truck (dubbed the "Whole Earth people, have been around for decades. Going
Truck Store") to set up educational fairs at back to the 1930s and 1940s, many zines
communes across America. Before the trip, became staples within the science fiction
Brand and his colleagues published the first community as more popular "pulp" sci-fi
issue of the Whole Earth Catalog (1968), magazines would often reject more precarious
subtitled "access to tools," to sell along the stories that didn't align with their norm.
way. At each stop, Brand and his wife Lois Perhaps the biggest boom, or most radical
created a mobile micro-education service, mutation for zines, came in the 1970s by way
selling the catalog of tools, maps, clothing, of the punk subculture. The punk movement
computers, books, and journals, while offering was underground, and the advent of
advice to the growing, new communities. By home-publishing resources melded with the
the end of the trip, Brand's Whole Earth Catalog DIY spirit of punks around the world.
became a best-selling tool all in itself, and Thousands of these punk zines lived and died
nurtured a growing counterculture movement throughout the '70s. Many were vulgar and
with its curious, do-it-yourself attitude. profane, but filled with vital news on the
burgeoning punk scene and other information
80% of the tools in the first Whole Earth Catalog that would build up punk rock culture. These
were books. Written word--the transfer of zines were sold, or more often traded, around
knowledge from one person to another--is the world as a way to disseminate information
perhaps the most valuable tool we have as a to an otherwise unknown or isolated
species. These days, web content like video community. Punks didn't wait for the world to
tutorials or podcasts has become a prominent catch up--they didn't really want it to.
The Whole Earth Catalog
Photo by Akos Kokai (Creative Commons Attribution 2.0 Generic)
creativecommons.org/licenses/by/2.0/
006 / EDITOR’S LETTER
They took matters in their own hands, and for others to consume. It wasn't long before
created something they could control without people started publishing eZines, electronic
outside influence or corruption. zines, for this new ethereal medium. By the
time physical zines were on their way out in
The 1980s saw zines continue to flourish, the '90s, the World Wide Web was hitting hard,
expanding to the cyberpunks, grungers, and spawning a fresh movement of independent
cynical Generation X slackers who hijacked content publishers that could inexpensively
their office photocopiers. Zines became not publish in cyberspace and have their work
only a way to share your niche, but also escape accessible to anyone with a modem. Content
from the monotony of your McJob. The real publishers and web developers danced in
echo-boom in zine culture came with the Riot stunning coevolution--one group would feed
Grrrl movement, stemming from the marriage off of and influence the other in a
of DIY punk culture and American third-wave never-ending relationship we still see echoes
feminism in the early '90s. But, by the end of of today. As time went on, we saw the birth of
the decade, most prolific zines were either blogs, especially on free platforms, that gave
selling out and going corporate, or fading into way to the idea of everyone being a content
nothingness as independent publishing creator. These days, the reverberations of zine
companies went bankrupt. Almost overnight, a culture are found in a lot of content we see and
whole industry producing indie content regularly consume. Podcasters,
disappeared, but that isn't the end of the story. video-bloggers, indie game creators, lo-fi
musicians, and others maybe have very well
The advent of bulletin board systems (BBSes) been zinesters back in the '80s and '90s. The
in the 1980s led to an explosion of spirit never died, it just adapted.
contemporary techno-culture. Counterculture
pioneers and engineering wizards raised a new I've had the pleasure of working on NODE for a
high frontier of interconnected computing. few years now, and I'm always excited to see
Computer users could dial into centralized how it evolves and grows over time. It took me
machines and leave messages or share files too long to realize something about it that I
EDITOR’S LETTER / 007
deem fundamental: NODE isn't a website or a footsteps of the DIY punk spirit and the
video series or a person. NODE is an idea. Whole-Earthian standards of counterculture
NODE is a movement. NODE is a way to enlightenment. It's a perfect fusion of the
understand and reshape our world. eclectic idealism and self-sufficient attitude
that shows what can be done when you have
At its core, NODE works to gather and distill tools and the knowledge to use them. This
information to educate the curious. You're here zine holds firmly the idea of information
because you're curious. You have a certain itch sharing that NODE is built upon. It doesn't
that just can't be scratched no matter how matter if you can make flashy videos or
hard you try. NODE always pushes the produce a website, all it takes is one person
envelope for how we can use technology to with an idea who can convey their thoughts to
our advantage in this highly technical era. How another. As the surveilled-web continues to
can we make things more distributed? How grow along with our penchant to communicate
can we put power back into the hands of the digitally, print may become the only haven we
people? Every day, we see strides taken by have left to get information freely out of silos
corporations and government entities, but and into the hands of the motivated, standing
often at the cost of our personal liberty, the test of time.
privacy, or security. Hackers, tinkerers,
developers, and makers just like you are If you're out there somewhere, we will be too.
building things on distributed technologies or Knowledge is power, and we want to spread it.
shaking things up with movements like
biohacking, 3d printing, and solarpunk, primed I hope you enjoy this first issue of the annual
to disrupt the status quo and change our path NODE zine.
for the better.
Stay hungry. Stay foolish.
You're reading a zine right now. It's paper, and
it's cold in your hands, and it's not as modern Written by Mike Dank
as you might be used to, but it continues in the
008 / THE NODE MINI SERVER
DESIGN
Underneath, you can see the underside of the replacing it with the mini PCB. This basically
bottom PCB, and this design choice of lets us connect the two halves together with
exposing this board means the whole finished the little flex cable.
thing is much slimmer.
Then, you simply solder all the other
components onto the boards, connect the flex
MODIFICATIONS to the harddisk and Pi boards, and assemble
and screw everything together.
The internals comprise of two adapter boards,
which basically connect the Pi to the 2.5-inch
Hard Disk (or SSD). TEMPERATURE CONTROL
Basically all of the modifications require Little SBCs are often known for their heat
something to desolder components. I used an generation, and the Pi 3B+ is no exception, so
electric vacuum pump, which makes life I've done a few things to keep it under control.
extremely easy, but if you only have a
spring-loaded desolder pump and desolder Firstly, the top PCB used on the case is
wick that would work too. aluminium-based, meaning under normal
loads it stays pretty cool, and acts as a
Firstly on the Pi, we desolder the front three heatsink.
ports (ethernet, and 2x USB), and all the GPIO
pins. You then plug in the micro SD adapter, The micro SD card on the Pi has also been
screw the pi onto the board, and solder it all moved off the board itself, away from the
together with the corresponding holes heat, hopefully mitigating any of the
underneath on the adapter board. temp-related problems they can suffer from.
You then need to remove the USB port from There's also a temperature-controlled blower
the SATA adapter, and do the same procedure, fan you can set up in Raspbian, which
THE NODE MINI SERVER / 013
CONCLUSION
SOURCES
[1] https://n-o-d-e.net/url/1/
[2] https://n-o-d-e.net/url/2/
Written by NODE
014 / DAT PROJECT 101
DAT PROJECT 101: After installing Dat, let's see how a user can
interact with it.
DECENTRALIZED DATA
1) Alice has a folder of documents on her
STORAGE system that she wants to share with her
friend Bob. She navigates to the directory via
her terminal, and issues a dat share
Dat is an open-source data distribution tool for command to create a new Dat address that
easily duplicating and version-controlling corresponds to her directory:
different data sets. First released in 2013, Dat
combines aspects of Git, BitTorrent, and $ dat share
cloud-storage sites like Dropbox to create an Created new dat
easy-to-use method for reliably sharing files dat://7c46dafaa44098d5d439812ed6300
without needing additional infrastructure. 036eaa85bbd9422ee677dbbdc722710a231
Sharing dat: 96 files
the address can clone the data repository, but reflected in her Dat. She can do this easily by
only the user with the accompanying private rerunning the dat share command within
key can make changes to it. her existing directory:
create a unique hash to identify data and share Dat also does not have a global peer swarm.
it with others to completely clone the data it Peers do not come together to join a global
corresponds to. Dat currently has the added network, and instead create smaller, focused
benefit of native browser support with the networks around pieces of data. This could be
Beaker browser, allowing the easy creation of considered beneficial as there is less overhead
Dat-based websites. Websites can be made in terms of peer connections, but it also makes
and hosted in either a user's filesystem with it difficult for applications to simply "connect
the aid of the dat application, or via the into Dat," leaving applications to implement
Beaker browser itself. their own way of interfacing with Dat.
BUILDING BEAKER: When did you first hear about Dat, and what
made you choose this project as a basis for
AN INTERVIEW WITH Beaker?
On the Dat protocol, Cabal was a really cool On the Web, you're appointing a server to your
surprise. It's a p2p Slack alternative that I'm leader. You have the server controlling the
really interested to see grow. data, the software, and the network itself.
020 / PAUL FRAZEE INTERVIEW
When you don't like something about It's almost like making a Linux distro at this
Facebook, all you can do is say "Oh well, it's point. There's been Brave, Vivaldi, Beaker, and
just Facebook" instead of going out and some others. And now, Microsoft is rebuilding
changing it. What kind of online society is that? Edge on top of Chrome. That move is really
That's not how the Web is supposed to work. going to shape the landscape. It's possible
That's not how Personal Computing is that Chromium forks will become really
supposed to work. We should be empowered common, and we'll debate our choices in the
to change our software. same way that Linux users debate their distro
picks. Who knows?
Peer-to-peer, on the other hand, gets closer to
anarchy as a design. That doesn't mean it's It's hard to say exactly where Beaker sits in
chaotic; it just means there isn't any baked-in the market until we see other vendors react to
hierarchy and users can choose leaders for us. Beaker is meant to be an ongoing
themselves. You can replace your software experiment, which is why we chose the name.
without having to leave the network, because Our mission is to push the Web forward, so
the software's not controlled by a server. success means getting our best features
That's how this should work. The design of the standardized and then moving on to the next
social network should be a dialogue within the experiment.
community that uses it, and the community
should be empowered to change it. So, I'd like I guess if we ever run an experiment that no
to see social networking move to P2P, where other browser wants to adopt but that our
the users are free to control the experience. users love then we'll just keep it and that'll be
our differentiator.
What role are browser like Beaker going to
play as the web evolves?
1 2
3 4
5 6
022 / PAUL FRAZEE INTERVIEW
When every peer stops sharing a Dat, the Mafintosh has been discussing this idea called
data within it stops being available. Do you "progressive deployment" that I think could be
feel this impermanence is a natural really exciting.
characteristic of the web or something that
needs repair? The idea stems from the fact that that he's
developing a way to deploy online services
I think there are cases where you can make the using public keys, similar to how you publish
impermanence a feature instead of a bug. I Dat sites. You connect to the services using
don't think that's the most common case, their public-key address, and the discovery
though. I think we need to solve uptime. network helps you deal with firewalls and
routers.
My ideal future is that people own servers at
home that run software like Hashbase, so that That technology has two effects. The first: you
they can have a "home cloud." I'm not sure yet can move a service from one device to another
whether people care enough to make that without the hassle of DNS, because you can
effort. reuse the keypair and so the address doesn't
change. The second effect: you can run a
What we're doing in the mean time is keeping service from your laptop because the
Hashbase on a FOSS license and making sure discovery network solves the routing problem.
that it's easy to deploy. It's not perfect, but
we've written it to use SQLite so that you don't So imagine this: you write a service in JS or in
have to configure a DB or anything. That way, Web Assembly, then start the service in your
we know we're not standing in the way of browser. That service would run in the
home hosting. background and handle user requests as
usual. Then, once you need that service to
How do you see all of these projects growing handle more users, you can move it to a cloud
in the future? Are there any exciting changes provider without interrupting it. That's the
on the horizon? "progressive deployment" part--you deploy at
PAUL FRAZEE INTERVIEW / 023
EXAMPLE LINKS
[1] dat://beakerbrowser.com
[2] dat://filez.destroywithscience.com
[3] dat://editor-cryptic.hashbase.io
[4] dat://datproject.org
[5] dat://beautifulwebtype.com
[6] dat://pfrazee.com
024 / THE NODE DOUBLE DRIVE
3 4
5 6
7 8
THE NODE DOUBLE DRIVE / 027
WRAPPING UP
Written by NODE
028 / SO GOD MADE A FARMER
pushing out a new product. Planned outlined plans for pricing or delivery
obsolescence reigns supreme. mechanisms. Currently, a farmer can obtain a
replacement part from a third party and even
In the US, farmers have been granted an install it, but the machine won't run until an
exception to the Digital Millennium Copyright authorized repair center locks the part to the
Act (DMCA), a piece of 1998 legislation that tractor via a firmware update that marries
enforces intellectual property rights and their serial numbers. DRM-culture has
criminalizes circumvention of access control. infected many aspects of daily life, and it can
However, manufacturers retaliated by only cripple technological advancement as
updating their terms of service to disallow the time goes on.
tampering that this law would permit. Though
it is fully legal for farmers to make certain Farmers have always been self-reliant: they
repairs, it is against company policy, and take repairs and construction into their own
manufacturers don't need to make things hands to save time and money. When you
simple, or have materials available to assist. need to get things done on a schedule, there
As with companies like Apple and Microsoft isn't a lot of time to waste in getting things up
and their respective iPhone and Xbox and running again; why spend thousands of
hardware, these manufacturers don't want dollars and send a machine away when a quick
anyone looking into the internals of a product, fix will do? Numerous websites exist to
even after it becomes a customer's own support farmers who wish to share their
property. Luckily, legislation is changing, albeit designs and inventions, including
slowly. Aligning with smaller strides in the https://farmhack.org/tools and
techno-legal space such as the https://www.opensourceecology.org.
unenforceability of "Warranty Void If Historically, there have been many interesting
Removed" stickers, tractor manufacturers technological feats accomplished by farmers.
have agreed to produce repair manuals,
firmware updates, and replacement parts in One such marvel is the introduction of barbed
California by 2021, but with no currently wire telephone lines going back to the 1880s.
SO GOD MADE A FARMER / 031
A more recent analog we see if the rise of These homesteaders would carry out
community broadband networks in rural areas. agricultural tasks, construction, infrastructure
Initiatives such as B4RN in Lancashire, planning, and basic jobs to contribute to the
England and RS Fiber in Minnesota, USA were livelihood of their community. Merry
founded through grassroots efforts to combat Pranksters, Whole-Earthers, Douglas
a lack of high-speed Internet availability. Some Englebert disciples, and engineers blended in
farmers and ranchers got fed up and started high collaboration. Steve Jobs, Ted Nelson, and
trenching and lighting their own fiber, while Xerox PARC pioneers all drew from this
others started deploying wireless access self-sufficient culture, creating an explosion of
points and backhaul links to cover area ISPs mind-expanding technological inventions that
wouldn't service. Many of these installations would go on to shape our present.
are done through member-owned
cooperatives set up specifically for broadband
expansion within communities. These
built-outs are often performed without federal
funding, and ensure that communities have
Internet service essential to their well-being
and businesses.
LIKE IRC OVER RADIO sign and verify messages with one another in
real time, even when they are miles apart.
WAVES: CHATTERVOX
As of this writing, the software is in beta and
TUTORIAL relatively new. That said, the current version is
stable, easy to use, and simple to set up with
inexpensive hardware. Please note, depending
Packet radio is a technology that has existed on your country of residence, you may need to
for decades, going back to projects like acquire an amateur radio license to use
ALOHAnet in 1971 where it was used to Chattervox legally depending on what
transfer data through the Hawaiian islands. frequency band you choose to use.
Anyone participating in the chat will need to chattervox can then be started using the
tune in to the same frequency. For basic chat flag. On the first run for a user, it will set
CHATTERVOX TUTORIAL / 037
When a Tor hidden service is set up, a public/ To illustrate how it works, here is what
private key-pair is generated for it to use. happens when Alice wants to message to Bob:
RICOCHET 101 / 041
1. Alice and Bob exchange Ricochet 5. Behind the scenes, Alice's and
addresses through an existing, Bob's machines open a new
trusted, communication method such connection and keep it open to
as an in-person meetup. accurately determine if the other is
online at any given time.
2. Alice chooses to add a new contact
and inputs Bob's Ricochet address, 6. Now, they will each appear as
optionally adding some message text online in each other's contact lists
before pressing "Add." within Ricochet. Alice or Bob can now
instigate a new message with the
3. In the background, a connection is other over the encrypted,
made between Alice and Bob over anonymous connection that runs
the Tor network, sending Alice's between them.
contact request along with
authentication information about her Most of the technical aspects of this
hidden service. Since this connection transaction happen in the background and are
is made from Alice to Bob's hidden hidden away from the user. To anyone using
service, it is signed and encrypted Ricochet, the process of messaging a contact
with Alice's private key and Bob's resembles that of any other instant messaging
public key. This means that the application.
request can only have been sent by
Alice, and can only be read by Bob.
Anonymous No No Yes
For one, all messages on the platform are or operators. Connections between users are
end-to-end encrypted via public-key done P2P and do not require any additional
cryptography and authenticated, so they are messaging infrastructure.
completely private between the sender and
receiver. Lastly, Ricochet has undergone a security audit
by the NCC Group, with positive results.
The location of the sender and receiver are
also completely hidden via the Tor network.
While other applications may let you connect DOWNSIDES
through Tor, not all of them have it as default.
Being decentralized, Ricochet does not have
Ricochet is also a decentralized application, any concept of registration or login, so an
not relying on or trusting any central services attacker with physical or remote access to a
RICOCHET 101 / 043
user's machine could assume that user's application which runs Ricochet acting like an
identity (though this is a general challenge IRC server to facilitate access through the
with all P2P software). terminal if preferred.
CONCLUSION
CLIENTS
So that's the basics of Ricochet. It has the
The official Ricochet GUI client is available for benefit of secure communication between
Mac, Windows, and Linux, and downloadable users, and it is completely decentralized and
as a binary from the Ricochet.im site. There is trust-less. Additionally, the application's use of
also the option to build Ricochet from source. the ever-growing Tor network helps to
enhance privacy for the users.
Ricochet
https://ricochet.im Written by Mike Dank
The more points of data that can be gleaned HTML5 Canvas. The Canvas API is a
from a person, the more unique the fingerprint feature in HTML5 which is used to
is, and the easier it is to identify and track draw 2D graphics and animations on
someone, even if they think they're acting web pages. It fingerprints users by
anonymously by doing something like masking drawing a hidden canvas, and
their IP address. converting that to a hash. Since every
computer is slightly different, this
Here's an overview of some of the ways your creates a unique identifier, which can
personal fingerprint is constructed. It applies to be used to track you.
both browser-based tracking, as well as
tracking done through other apps. WebGL. Again, similar to Canvas, this
fingerprinting technique deals with
how your system renders 3D
graphics for web pages. The
combination of specific hardware and
(Further fingerprinting techniques are always drivers will result in a different,
being developed, so this list is not exhaustive.) trackable hash.
DIGITAL FINGERPRINTING & TRACKING / 045
Timezone. Websites can find your WebRTC. This plugin, which allows
time zone in two ways. First by using for P2P web applications through the
your IP address, and second through browser, can leak both your public
Javascript functions which read the and local IP addresses, even if you're
regional settings of your operating using a proxy.
system. If you use a proxy or VPN,
this second method can reveal your Fonts. If you've installed custom
real time zone, and the discrepancy
Aa fonts on your system, these can be
between your real time zone and the read by websites, making your
proxy time zone will make you stand fingerprint much more unique.
out further.
Media Devices. Another feature of
Audio Context. Similar to HTML5 WebRTC is that in order to
Canvas, the AudioContext fingerprint successfully connect users through
is based on your system's physical P2P connections, a hash of the media
hardware capabilities. In this case, the devices, such as cameras,
unique hash relates to your audio microphones and audio hardware, is
stack and settings. required. This is called Device ID, and
it can be used as a way to identify
Browser Storage. Browsers store a users across the web.
variety of local data related to your
browsing habits, such as cookies, Battery Level. The Battery Status API
browser history, extensions, settings, allows for over 14 million different
local storage and more. Depending on values for a battery's current state,
your browser and personal settings, giving a very unique fingerprint. This
websites may have open access to can allow ad tracking scripts to track
this storage, making it a good way to the same person over completely
track you. unrelated websites.
046 / DIGITAL FINGERPRINTING & TRACKING
Facial Recognition. It's not just file File Fingerprinting. When you
metadata though, the actual content download files from apps or
can be tracked, especially with faces. websites, they may insert unique
data into them which can be tied to
If you upload photos to large you, so if someone else uploads the
companies like Facebook or Google, same file down the line, the service
or if you use services which utilize will know where it came from,
their APIs, this face data is stored. creating a new data point.
Even if you randomly appear in the
background of a stranger's photo, the Movement Tracking. Even if you have
combination of metadata can still link location tracking turned off for your
you to people, locations, usage phone, the accelerometers can see
patterns, etc. when you're up and about, and create
a movement profile, so phone
Hardware Fingerprint. Apps installed manufacturers or app developers can
on your devices have greater control still track you over different devices.
over what data is gleaned, so they
can see exactly what hardware you
are using. If you a have non standard,
custom setup, this will set you apart CONCLUSION
from others.
These are just a handful of the ways we're
Both your computer, and network fingerprinted and tracked online. It's impossible
interfaces have unique identifiers to completely get rid of your unique fingerprint,
(serial number and MAC addresses), but you can aim to blend in with the crowd.
meaning if some apps are made by
the same company, or use the same Written by NODE
APIs, they can identify you.
048 / PI-HOLE ON THE NANO SERVER
ADS & TRACKERS Create a blank text file, name it ssh, then drag
it into the micro SD volume's root directory.
This short guide will show you how to install Now create another text file, and name it
Pi-Hole (https://pi-hole.net), a wpa_supplicant.conf. Add the following
network-wide ad blocker, on a NODE Nano text, replacing the SSID and Password with
Server. your WiFi details:
INSTALLING PI-HOLE
curl -sSL
https://install.pi-hole.net | bash
Written by NODE
PI-HOLE ON THE NANO SERVER / 051
052 / LIBREBOOTING THE THINKPAD X200
4 5
LIBREBOOTING THE THINKPAD X200 / 055
Continued...
056 / LIBREBOOTING THE THINKPAD X200
RASPBERRY PI SETUP and make a note of it. Enter ifconfig into the
console and look for an interface with a local IP
Alright, now we need to set up the Raspberry address. It will usually be something like
Pi so it's able to flash the BIOS firmware. I 192.168.0.10.
used a Pi Zero (with GPIO headers), but a Pi 2
or 3 should also work. 7. Now, you can do the rest by SSHing into the
Pi from your main computer, so you can
1. Download and burn the latest lite version of disconnect the monitor/keyboard, etc. Open a
Raspbian OS to a micro SD card and insert it terminal on your computer and type in:
into the Pi. Refer to the official RPi page for a ssh [email protected] (replacing the IP with
how-to (raspberrypi.org/downloads) if the one you wrote down). Type in the
you've never done this before. password to log in.
2. Hook the Pi up to a monitor, add a keyboard, 8. Let's install what we need. Type in (all on the
and power it on. same line):
3. Log in using the default credentials sudo apt-get update && sudo apt-get
(username: pi, password: raspberry). install libftdi1 libftdi-dev
libusb-dev libpci-dev subversion
4. In the console, type sudo raspi-config flashrom
and press Enter.
9. Once everything is installed, turn the Pi off,
5. Go into Interfacing Options and enable SSH, and wire up the SOIC-8 or SOIC-16 clip
SPI and I2C. adapter, depending on which one your X200
has. Use the diagram on the next page for
6. If you haven't already, connect the Pi to WiFi reference. Female jumper cables are much
or ethernet so it's connected to the Internet. easier to work with, but you can just solder the
Once done, find out the Pi's IP address and wires directly if you don’t have any.
LIBREBOOTING THE THINKPAD X200 / 057
C
E F It's up to you how you do this, but get those
8MB newly downloaded files onto the Pi, and place
B A
them in the home folder.
D
Then do the same for the Libreboot util file 6. Let's create a new 'x200' directory, and copy
(again on the same line): the bin file into it. Remember to change the
number depending on your X200 BIOS chip:
tar xf
libreboot_r20160907_util.tar.xz mkdir ~/x200
cp ich9fdgbe_8m.bin ~/x200/
2. Now, navigate to the new util directory:
7. Now we need to grab the .rom file which
cd libreboot_r20160907_util corresponds to the keyboard layout on your
particular X200. Again, remember to change
3. Go into the 'ich9deblob' directory: the '8mb' to '4mb', depending on your chip. Go
to the rom directory, then list the files.
cd ich9deblob
cd ~/libreboot_r20160907_grub_x200_8mb
4. Navigate to the 'armv7l' directory: ls
specific to our X200 laptop, so first go back to Multiple flash chip definitions
the 'x200' directory: match the detected chip(s):
"MX25L6405(D)",
cd ~/x200 "MX25L6406E/MX25L6436E",
"MX25L6445E/MX25L6473E"
Then run the following (all on one line): Please specify which chip
definition to use with the -c
dd if=ich9fdgbe_8m.bin <chipname> option.
of=x200_8mb_ukqwerty_vesafb.rom
bs=1 count=12k conv=notrunc 12. Find the chip name closest to the one you
wrote down earlier, and repeat the process,
10. The *vesafb.rom file is now updated and now with your specific chip number. (Replace
tailored to your X200 laptop. 'MX25L6405' with your chip)
flashrom -p flashrom -p
linux_spi:dev=/dev/spidev0.0,spispeed=128 linux_spi:dev=/dev/spidev0.0,spispeed=128
-r factory3.rom -V -w ~/x200/x200_8mb_ukqwerty_vesafb.rom -V
-c MX25L6405
15. Now it's time to flash the chip. Run the You now have a laptop with dodgy boot
following command, and remember to change backdoors mitigated. Next steps would
the chip number to your specific one. Also note obviously include installing a FOSS operating
the .rom file specified is the one we made system.
earlier in our 'x200' directory.
This leaves you with one of the freest laptops
Again, keep it on one line (sorry, lack of space you can own these days. For web browsing,
writing this!) coding, writing, light editing, etc, it's more than
capable. Enjoy!
LIBREBOOTING THE THINKPAD X200 / 061
062 / DECENTRALAND
Decentraland’s mission is to create a social When laying down the concept for
and 3D virtual world that is owned and Decentraland, we definitely were inspired by
managed by its users. various fictional virtual worlds, such as in
Ready Player One (2011) and Snowcrash (1992).
This virtual world is, at its essence, a platform As an organization, our goal is to provide the
including the open source tools to create foundations for a world without owners, a
dynamic 3D content, games, and applications; platform that can eventually become
the infrastructure to host and distribute that self-sustaining, like the web: free from the
content in a decentralized fashion (without control or oversight of a central organization,
relying on central servers); and a web-based with a set of open standards to which
app through which users can access and everyone can contribute.
interact with that content.
We’re excited to share our vision, our journey, FINDING A PATH FORWARD
and what we’ve learned along the way.
We’ve been experimenting with different P2P
architectures needed for a truly decentralized
INITIAL INSPIRATION platform, all while trying to cater to very
different use cases. On one side, the network
"Science fiction is any idea that occurs in the has to be resilient. We cannot let any particular
head and doesn’t exist yet, but soon will, and node become a single point of failure. On the
DECENTRALAND / 063
Map of Decentraland’s
‘Genesis City’
064 / DECENTRALAND
DECENTRALAND / 065
We saw IPFS (the InterPlanetary File System) With such an ambitious vision, we weren’t
as the clear solution for our unusual use case, surprised to encounter some challenges.
but we quickly ran into some problems. We We’ve ended up making different trade-offs
knew that we would have to allow members of and compromises, but we’ve worked to stay
the network (LAND owners) to have control true to our mission of building a distributed
over the particular content they want to serve, network, free from centralization of resources
a task that IPFS doesn’t lend itself to easily. and power.
066 / DECENTRALAND
Navigating through the Ethereum ecosystem people actively using VR headsets is very low
and discovering just what we can build in this compared to these platforms, so completing a
space has been a phenomenal experience. true VR experience isn’t our first priority.
We’ve met similar, and very inspiring, projects
all working to cultivate a network of people Having said that, we do have some
who value our unique opportunity to redefine experimental builds that work on the Vive and
the information networks of today. Rift through WebVR!
token. MANA was first used to buy LAND, the targeting web desktop browsers, with a client
ERC721 tokens representing the parcels of re-written (but compatible) for the Unity
virtual real estate in Decentraland, during the Engine. This’ll allow us to compile to WASM
Terraform Event. All of the MANA exchanged and benefit from a better memory
for LAND in the Terraform Event was burned, management system, among many other
removing it from circulation. goodies. This is going to be a major milestone
for our project. By Q3, the mobile client should
Today, MANA can used to buy and sell LAND in be released.
the Marketplace, it can be burned in exchange
for LAND in our public auctions (like the second Once these milestones are behind us, the
public auction we held in December of last golden age of iterating over features and
year), and it can be used to weight votes in adding more value to the users of the virtual
Agora, our community voting platform. We world will be our guiding star.
intend for MANA to eventually be used in
many of the "in-world" transactions conducted Finally, I want to extend our sincerest thanks
within Decentraland. to all of the district leaders, community
members, and colleagues who have helped us
to get here.
WHERE WE’RE HEADED
We’ll see you in the metaverse!
We’re going to release our open source client
Q1 2019. Up until now, we’ve chosen to Check the project out at decentraland.org
develop the client below the radar, to give
ourselves more room to maneuver and make Written by Eric Schallock & Esteban Ordano
breaking changes. (Screenshots provided by Martin Shibuya under
CreativeCommons Attribution-Share Alike 4.0
We’re preparing to release the client to a International license.)
wider, more "mainstream" audience in Q2, creativecommons.org/licenses/by-sa/4.0/
070 / BULLETIN BOARD SYSTEMS TODAY
BEAUTY OF THE BAUD: connected and got your turn. If the BBS
System Operator, the SysOp, only owned this
BULLETIN BOARD one computer, the machine could go offline if
the SysOp needed to use it for another task. If
SYSTEMS TODAY there was a hardware failure, the machine may
never have come back up.
In the '80s and '90s, back before the Internet Most bulletin board systems you would dial
became the de facto form of digital into were local to you (to avoid long distance
communication, Bulletin Board Systems charges), but some BBSes were famous
(BBSes) were how computer enthusiasts could around the world. Cities could have hundreds
connect, chat, play games and share files with of them, diligently fostering unique
one another. Bulletin Board Systems were communities while they tried to make names
rarely run with elaborate hardware. In fact, for themselves. Many systems had their own
most BBSes were simple, commodity personal distinct goals, offerings, or general feel, akin to
computers outfitted with one or more modems the diversity of websites we see today. Bulletin
and special software that could accept Board Systems were revered for their ability to
incoming calls from other, inquiring computers. spread information, not just through message
These connections were one-to-one--each forums, but through an abundance of text files
modem on the host BBS could only talk to one (or "philes") that were traded from board to
calling computer at a time. When a computer board. Sure, there may have been pirated
connected, they were greeted with an warez like applications and games, but small
interactive, textual menu that might display text files written by hacking/phreaking groups,
colorful ANSI art and direct a caller to a chat anarchists, crackers, and general computer
area, a forum, a games section, or even a files enthusiasts went worldwide. You and your
directory with downloads. If all the lines on the friends could write a zine full of interesting
system were busy, you'd have to wait until information and upload it to a local BBS. Then,
someone logged off before you successfully overnight, people would download and
BULLETIN BOARD SYSTEMS TODAY / 071
distribute it to other BBSes all over the world. ACTIVE BULLETIN BOARD SYSTEMS
There really wasn't anything quite like it before,
and some may argue there hasn't been There are many BBSes out there that you can
anything like it since. still access today. Some stick around, but most
live, die, and fade away in a short amount of
These days, BBSes have mostly died off. Those time. Here’s a list of a few popular modern
that survive are often accessible over the Bulletin Board Systems you can check out.
Internet using protocols like Telnet or
SSH--something that your modern computer Please remember, Telnet is a plaintext protocol,
probably supports out of the box. A few BBSes meaning any eavesdroppers can see your
still tie into the phone lines and are accessible traffic. Most BBSes allow you to visit with a
via modem, but those are few and far between. guest account, but if you decide to register an
Why would anyone still want to use or run a account of your own, use a unique password!
BBS these days? While retro-computing
hobbyists make up a large group of modern
BBS users, bulletin board systems can still be
useful in specific situations. For example,
consider a warring country with its Internet
shut off, or a remote area where bandwidth is
limited. Maybe there is a community that has
no telephone access, and decides to
communicate through a BBS via packet radio.
Many low-bandwidth environments, including
amateur mesh networks or darknets like Tor, PIRANHA: UNDER THE BLACK FLAG
could benefit from bulletin board systems as a telnet - blackflag.acid.org
lightweight way to distribute data.
Aside from that, they are a fascinating if This BBS is run by the ANSI artscene group
obscure way to communicate over the wire. ACiD, and showcases a lot of early computer
BULLETIN BOARD SYSTEMS TODAY / 073
graphics artwork. Aside from the impressive connect over phone lines. The Level 29 BBS is
interface, Black Flag also connects to the located in Fair Oaks, CA, USA.
FidoNet network, a store-and-forward system
for inter-BBS communication that allows for
the exchange of forum messages and email.
Black Flag has been operating since 1995 and
is located in Hudson, FL, USA.
THE CAVE
telnet - cavebbs.homeip.net
Level 29 is a popular BBS, drawing in many Originally operating between 1992 and 1998 in
retro computer owners who attempt to Raleigh, NC, USA, The Cave was completely
connect from a variety of older hardware. rebuilt in 2004.
CONCLUSION
BBS on a Raspberry Pi
Photo by Mike Dank (Creative Commons Attribution-Share Alike 4.0 International)
creativecommons.org/licenses/by-sa/4.0/
076 / MAINTAINING PUBLIC SPACES IN P2P NETWORKS
Then one day, a bank robbery happens. It turns This is a good moment to stop and think about
out the thieves brandished their electric why this is happening.
rollerblades prominently, and their escape was
aided by the fact that your rollerblades were Your thing is new. It is not a car--no one thinks
able to zip around and move in places that no of cars primarily as vehicles for crime. People
police car could possibly go. have little experience with your thing, however,
so their impression is vulnerable to a few bad
Two weeks later, another robbery happens. incidents on the news. There is no established
Also on rollerblades. precedent. Consider how smoking is a known
danger, yet allowed on personal liberty grounds,
Three weeks on, a woman is assaulted by but e-cigarettes get banned left and right.
someone trying to take her bag and whiz
away. On the front page of New York Times, We want our work to reach as many people as
there's a photo of a badly injured woman in a possible to help improve lives. But, even with
MAINTAINING PUBLIC SPACES IN P2P NETWORKS / 077
our best intentions, we ended up in a place This isn't a theoretical problem either: this is
where the tech is tarnished to the point that something that I faced with Aether, and this is
no respectable person would ever touch it. the thought framework that I came up with to
handle these kinds of issues. To make for a
This is a contrived example. But the point is, better, real-world example, here's an actual
while in theory the technology stands on its issue and how I ended up with a way out.
own, in practice, new technologies aren't just
judged by their merits, but also by how they
interact with the rest of the society. THE GREATER GOAL
Attempt 2. Mark NSFW content, and remove This is getting better though. You're still
it from the front page. receiving complaints, but they're now starting
to be more about what you're trying to
Heil dictator! You just inadvertently installed accomplish (a friendly, safe-for-work
yourself as an arbiter of what is safe and what front-page for beginners) and not about you
is unsafe. With your new job as The Ultimate being a tyrannical dictator.
MAINTAINING PUBLIC SPACES IN P2P NETWORKS / 079
Attempt 4. Keep the SFW list, but let users Attempt 5. Keep everything from previous
know when NSFW content is there, and have attempts, but now introduce custom SFW and
them click if they want to view it. block lists that users can make and share.
This is getting better, but also more complex. Now this makes a lot more sense--you have a
How do you know that? Because now you're 'feature' that you can plan and build around,
getting people confused about what the SFW and you're no longer building a specific,
list actually does. They seem to think it also exception case. That's good. People still
applies to threads, posts, or people, instead of complain, but they now complain about the
only communities--they believe it is now more actual thing you want to do (have a beginner
granular than it actually is. friendly homepage), and not the things you
don't want (becoming a dictator via deciding
Explaining takes too long, and that alone is a on what can be said).
sign you have to simplify the mental model
needed to understand it. Also, you haven't This can go on for a sixth attempt, but I want
fixed the garden variety dictator issue: you are to stop here to make obvious the basic pattern
still the only person in control of that SFW list. we are following. The main purpose of what
we're doing with these iterations is to allows
While the list is optional, and further, us, the builder, control over the amount of
temporarily overridable even when enabled, it complexity we are willing to trade for a better
does help with not binding people by your solution. From the most naive to the most
personal wishes. It does not, however, fix the complex, this makes more visible what
single point of decision issue. amount of complexity you're adding in each
MAINTAINING PUBLIC SPACES IN P2P NETWORKS / 081
step, and to what improvement. Not all couple iterations on the app that (I believe)
problems need complex solutions, but all improved things.
problems can have them. It is up to you, as the
maker, to determine how complex, thus For the problem in question, I'm afraid I have
surgical, of a solution you're willing to build for no great answers other than a solution being
that particular problem. You will find that dependent on the type of community you're
many problems can be solved to 80% by interested in building. Some communities
something very simple, and you'll feel below a certain size might not need this kind
personally responsible for solving the others of design method. An example of this would be
to 99.8%. That is up to you. Just pick your if you're creating an app that handles private
complexity battles carefully, because I can communities like Discord, or Slack, where each
almost guarantee that there is some part of community would have their own reputation,
your application that would appreciate your and it wouldn't affect the app itself. But, if
attention more. you're building something like Mastodon, then
most things in large communities are going to
affect how your app is perceived by the public,
CONCLUSION fairly or unfairly. This happens whether you
accept it or not, so the practical way of
I hope this ends up being a useful method that handling it is to be aware of this happening
you can utilise when you're building your own and be conscious about it. You might decide to
project, as well as being informative for users, not care, and that is fine as well--so long as it
to explain the thought-processes behind is an explicit decision to do so.
making these kind of systems.
Feel free to try out my project, Aether, at
For this method, it's not a be-all-end-all way getaether.net. We're a small, friendly
of thinking but I've found it helps more often decentralized community.
than not. By applying this concept to a
problem that I've had, I've ended up with a Written by Burak Nehbit
082 / MESH NETWORKING BASICS
Modern mesh networks are often run by Routers do all the heavy lifting for the
technical, grassroots groups that thrive in a network, forwarding traffic from node to node
MESH NETWORKING BASICS / 083
so it can reach its final destination. Choosing constraints when constructing paths for data
router hardware mostly comes down to to follow. Further, some protocols rely on the
hardware compatibility and availability; if the origin router determining the whole path for
hardware is closed off or scarce, it will be the data across the network while others allow
harder to configure and deploy. individual routers to pick the next hop
themselves, so each router determines the
But how does the traffic actually get from one next link within the chain. Routing protocol
node to another? Mesh networks use their choice can often come down to personal
own routing protocols to send packets across preference, ease of set-up, or performance
the network. These protocols might take in to goals. Different protocols can have different
account number of hops to a destination (sum trade-offs, and it's difficult to switch packages
total of the routers that the traffic has to pass once hardware is deployed in the field. Popular
through), signal quality, or even bandwidth protocols you might hear about include
MESH NETWORKING BASICS / 085
and MikroTik have first-party software with peer with one another using an older protocol
robust mesh networking support, but bear in known as Border Gateway Protocol (BGP).
mind that this is proprietary and BGP is responsible for routing Internet traffic
closed--geeks trying to run their own routers all over the world through a series of
will have to buy specific hardware and the point-to-point links between two entities and
network will rely on the Original Equipment their respective networks. Taking a step back,
Manufacturer (OEM) for support and updates. BGP itself creates links to form a type of mesh
Hardware that directly supports and runs a network, and the more connections a node on
Linux variant can be incredibly flexible, but the Internet has, the better.
more difficult to setup and maintain. A
standard distribution such as Debian can
easily support a wide variety of mesh
networking protocols given it has compatible
wireless radio hardware.
Ninux, a mesh network project in Italy, is a changing how we can access the Internet.
free, open, experimental network. Ninux Wireless mesh networks are a
follows many principles established by other community-focused way of creating an open,
European mesh networks, and shares testing neutral network, and more of them are
information to improve mesh networking starting up all the time. There might already be
practices as a whole. Ninux has over 340 one in a city near you!
nodes deployed which run their own
FirmwareNG firmware based on OpenWRT,
utilizing the OLSR routing protocol. LINKS
3D PRINTING
WIFI ANTENNAS
This guide will show you how to create two
different long range Wifi antennas, using
cheap, readily available parts, and a 3D printer.
Both antennas cost a few dollars each to PARTS
make, and have the potential to reach maybe 2
miles when pointed accurately with good - 3D Printed Antenna Parts
line-of-sight. - USB Wifi Dongle with SMA adapter
- 14AWG Flexible Silicone Wire (~1m length)
I've seen similar instructions online, but they - Male to Female Reverse SMA Cable
involved a lot of manual measurements and - M6 x 6mm Screw
assembly. Making the antennas 3D-printable - M6 x 10mm Hex Standoff
removes a lot of those steps, and makes the - Small rubber band
process more streamlined and precise.
1 2
3 4
092 / 3D PRINTING WIFI ANTENNAS
5. Cut the wire, strip 5mm off the end, and tin
the end with solder.
This design is bigger, and works better 1. Print out all the parts, and assemble the
outdoors, so it should be good for meshnets tube sections. The three parts are numbered,
and the like. It's kind of like a more polished with "1" going at the bottom. Make sure all the
Pringles "cantenna," in that it uses a helical eyelets are lined up.
design to catch the WiFi waves.
2. Now we need to wind the 14AWG wire
(This design is an iteration of the one around the antenna tube. Make sure that the
documented at ab9il.net/wlan-projects tubes remain aligned, and make sure there is
so check that out for more advanced details on enough excess wire at the bottom.
the construction.)
3. Take the PCB, and with the NODE logo at the
back, align it up with the antenna tube. Like
PARTS the other antenna, you'll need to cut and strip
about 5mm off the end of the wire, but the
This design uses many of the same cheap, and exposed part needs to line up with the PCB.
easy to find parts as the yagi antenna. (As shown)
- 3D-Printed Antenna Parts 4. Take the female end of the reverse SMA
- 14AWG Flexible Silicone Wire (~2.5m length) cable, cut it to about 5cm, and strip the end so
- USB Wifi Dongle with SMA adapter the inner core is exposed. (Make sure to cut
- Male to Female Reverse SMA Cable the outer shielding away)
- M6 x 6mm Screw
- M6 x 10mm Hex Standoff 5. Solder the 14AWG wire to the SMA cable,
- 4x M2.5 x 15mm Screws through the hole in the back of the PCB.
- 110x110mm Groundplane PCB (or standard
single-sided copper clad board) 6. Once complete, use the 4x15mm, and screw
3D PRINTING WIFI ANTENNAS / 095
1 2
3 4
096 / 3D PRINTING WIFI ANTENNAS
CONCLUSION
organization"--or "DAO" for short--soon are secured by smart contracts and executed
sparked the imaginations of many in the by machines, rather than being secured by
growing cryptocurrency movement. paper contracts and executed by humans. With
smart contract-based security comes the
Fast-forward to 2017. Ethereum was not even benefit of increased auditability, reliability, and
two years old yet and it had not even been one transparency of transactions in a smart
year since the infamous failure of "The DAO", organization.
the first major attempt to launch a DAO on
Ethereum. The first alpha version of Aragon, a For example, a traditional organization may
platform for creating DAOs, was deployed to have a contract with an employee that says
Ethereum's Kovan test network, and the every 30 days, the employee will be paid
movement to realize the powerful concept of $5000. Every 30 days, the company will pay
decentralized organizations was revitalized. the employee--or not, if there are internal
With the new, modular architecture of power struggles or the financial infrastructure
aragonOS, it became possible to program any of the company is compromised. If the
kind of organization on Ethereum and use company doesn't pay as expected, the
Aragon apps to extend their functionality. A employee may be forced to pursue a remedy
new term was needed to describe these through a lengthy and expensive lawsuit.
organizations, one that encompassed both
centralized and decentralized organizations A smart organization, by contrast, may use a
that were built using smart contracts. The payroll smart contract to give employees a
"smart organization" was born. higher degree of certainty that they will be
paid what they are owed on time as specified
in the contract. So long as the network that
FEATURES OF SMART ORGS executes the smart contract is online and has
capacity to process the transaction, the
The defining feature of a smart organization is employee will get paid as expected. An
that its operational and governance processes additional benefit is that, because the
100 / THE RISE OF SMART ORGANIZATIONS
costs of aggregating labor under one Some processes (such as hiring or dispute
organization are lower than the cost of resolution inside the company) are still carried
outsourcing to a third-party supplier. This has out manually, but once a certain outcome
led to different types of firms emerging, all of involving the transfer of resources inside the
which have been traditionally composed of organization is required, it can be encoded in a
paper contracts that are executed by humans smart contract to ensure reliable and
and secured by a State-run legal system. transparent execution.
A Decentralized Altruistic Community (DAC) is they could try to pass a proposal that sends all
a smart organization with a charitable mission of the funds that belong to the organization to
such as feeding the homeless, curing diseases, their own private address. Using fiduciary
or maintaining a public park. With a DAC, agreements that are judged by a neutral
donors get the altruistic benefits of charity arbitration system, honest minority
with the transparency and control offered by tokenholders in a smart organization can be
smart contracts. protected from a malicious majority trying to
pass proposals that are harmful or contrary to
Donors allocate funds to campaigns proposed the purpose of the organization.
by members of the DAC and can see exactly
how their funds are being spent. If during the The Aragon Network is a digital jurisdiction for
course of the campaign the donor feels that smart organizations. Smart contracts made in
their funds are being misallocated, they can this jurisdiction can be arbitrated by jurors in
reallocate what is left towards a different the network’s decentralized court system.
campaign using a liquid pledging smart
contract. This ensures that there are checks The benefit of using the system to arbitrate
and balances to prevent waste by those disputes is that the Aragon Network itself is
carrying out the campaigns. smart contract-native and can resolve
disputes even when all parties are
pseudonymous. This is in contrast to regular
THE ARAGON NETWORK private arbitration or State-run court systems
that require participants to disclose their legal
What happens if there is a dispute between identity and do not yet have a means of
tokenholders in a smart organization over the interfacing directly with smart contracts.
legitimacy of a proposal that appears to have
popular support? For example, if a malicious The Aragon Network is itself a smart
entity gains supermajority control of the organization governed by holders of ANT, the
tokens that govern a smart organization, Aragon Network Token. ANT holders set the
THE RISE OF SMART ORGANIZATIONS / 105
rules and parameters that govern the network, functionality in their organizations. And as the
vote on finance allocations, and participate as Aragon client evolves, it will be possible for
jurors in the court system if they have users who prefer a graphic interfacesI to have
expertise that’s helpful in arbitrating disputes. the same level of control over their orgs as a
programmer with direct access to the smart
Customers of the Aragon Network court who contracts would.
have a lot of value depending on honest
outcomes in the court may also hold large For the first time in history, it is possible to
amounts of ANT to use as collateral for experiment with governance and
agreements and to participate in the organizational forms at the speed of software
governance of the court system. rather than the speed of law. Despite the
technology being less than two years old at
the time of this writing, we are already seeing
THE FUTURE OF SMART ORGS new forms of organizations with advanced
functionality never seen before.
It’s early days for smart organizations, yet it is
already possible for anyone to create them for As the tech advances there will be a Cambrian
less cost, in less time, and with greater ease explosion of experimentation in smart
than traditional organizations. organization design, and more people will be
freed from the constraints of traditional
Aragon is a decentralized application that was organizations, unleashing waves of activist
designed to make the process of creating and entrepreneurial energy on the world as
smart organizations as easy as creating a people begin to exercise their newfound
profile on a social networking app. freedom to organize and transact. Smart
Programmers can interact with their organizations, with all their power and
organizations by interfacing with aragonOS potential, are here to stay.
and Aragon app contracts directly, even
creating their own apps to enable new Written by John Light
106 / THE PI ZERO W SECURITY CAMERA
The config file sets the video to stream at 3. Now place the camera holder into the case,
30fps, with a resolution of 640x480. with the FPC end directed towards the bottom.
Alternatively, you can check out the config file
for yourself and change it to whatever best 4. Screw the camera holder in, with the 2x
suits your situation. M2.5 x 8mm screws.
The final thing to do is edit the file 5. Place the Pi Zero W in the case, with the
/etc/init.d/motion so the correct drivers Micro SD Card side pointing towards the top.
are loaded during the boot process:
6. Secure the backplate with the 4 screws.
sudo nano /etc/init.d/motion
7. Now you can choose the bracket or hook
Then add the following line after the first line attachment to fix it into place. I added a
that says "chown" a bit further down: suction cup to stick mine to a window.
1 2
3 4
5 6
7 8
THE PI ZERO W SECURITY CAMERA / 111
112 / OPEN BAZAAR
ZX Spectrum, Commodore 64 and Amiga 500) illustrates through its lack of needing various
as well as early laptops (I feel a strong NDAs or registration requirements.
influence from early IBM ThinkPads, myself),
the chassis aims to be the core of a modular 5x USB2.0, HDMI, 1000Mbps Ethernet, 3.5mm
system, allowing for parts to be easily audio, mPCIe, WWAN, mSata, SPI, I2C, and
repaired, replaced or upgraded as needed for GPIO interfaces are all offered from a custom
years to come. motherboard that also houses 4GB of DDR3
RAM, a SIM card slot, and a microSD card slot
"Case parts should be replaceable using a 3D (bootable). The battery, currently composed of
printer and electronics fixable with a soldering a single 10Ah LiFePo4 cell, is a safe and
station," Lukas explains. Reform invites users durable power-source that can be charged
to open up the hardware to hack and with a 5-volt DC adapter.
experiment. Mess up something while making
a modification? Print out a replacement. The display is a 11" IPS panel that can output a
At home. For free. 1366x768 resolution. The swappable keyboard
is built using Cherry ML switches, while the
The brain of the system is the NXP i.MX6 pointing device is a custom trackball with two
QuadPlus SoC, boasting four ARM Cortex-A9 buttons (also using Cherry ML switches), a
cores running at up to 1.2 GHz. The i.MX6 also rarity in laptops these days.
offers a Vivante GC2000 GPU that has
completely open-source drivers within
mainline Linux (etnaviv) and OpenGL (mesa). SOFTWARE
Lukas shares that he "wanted to use a
CPU/SoC that is as open as possible and The i.MX6 is completely blob-free, and fully
doesn't require any closed source drivers." supported by mainline Linux. Currently, a
Debian-based image is available for Reform,
Each part of the machine is intended to be as but any other Linux distribution should be
open as the chassis, which the i.MX6 further easily supported. Other OS ports are planned.
THE MNT REFORM LAPTOP / 118
118 / THE MNT REFORM LAPTOP
Valuing function over form is important for Considerations have been made to change the
Lukas. "MacBooks are treated like expensive SoC to something more performant, such as
fashion accessories that you wouldn't crack the more recent i.MX8, but it currently utilizes
open and put your own modifications in," he binary-blobs, has poor documentation, and
says, adding that "the ergonomics of incomplete GPU drivers. Alternative options,
keyboards are suffering from the dogma of like a RISC-V chip, are not available at a low
making everything ultra slim." That said, enough price-point to make them
though Reform focuses on openness, it economically feasible. All hope for RISC-V is
exhibits good design as well. not lost, however. "As soon as affordable and
THE MNT REFORM LAPTOP / 119
120 / THE MNT REFORM LAPTOP
THE MNT REFORM LAPTOP / 121
fast chips will become available, I'd like to developing, writing, and general computing
move to the RISC-V platform (which has an tasks, we may one day see the Reform
open instruction set architecture) and do some platform expanded for other purposes.
experiments of connecting it to our open
source graphics tech developed for VA2000 There is no current release date for the next
and now ZZ9000," Lukas shares. iteration of the Reform laptop, but the
price-point is likely to be similar to that of the
Having ports of other operating systems beta unit (and the initial estimate) at around
besides Debian Linux is also in the pipeline €500-700.
according to Lukas. "Next to the BSDs, I'd also
like to see ports of Plan9, RiscOS, and BeOS. I MNT Research has also recently moved into a
chose Debian GNU/Linux as the first OS new location. Lukas explains, "the first version
because this is what I'm most familiar with. I of Reform was mostly assembled in our (Greta
also wrote my own toy OS 'Interim' that I'd like & my) shared flat, but we just moved to a real
to port one day." studio space in Berlin Friedenau to focus on
OSHW and other projects (like clothing)." With
We may also see Reform hardware outside of any luck, a larger space will allow more room
the laptop form factor as Lukas discloses that for Reform to grow.
"Reform is supposed to be a family of open
devices of all sizes." Reform is still a work in progress, check for
updates at https://mntmn.com/reform
The Reform laptop project is a fresh take on (Photos provided by Lukas Hartmann under
creating an open computer, and it has already Creative Commons Attribution-Share Alike 4.0
produced a tangible, working beta unit. While International license)
the current specifications should be suited to creativecommons.org/licenses/by-sa/4.0/
122 / DECIPHERING THE LEXICON
BITSEED 3 BITSEED 3
Plug and play Bitcoin full node. Fanless Plug and play Bitcoin full node. Fanless
COMPUTERS & SERVERS
design with 4GB RAM and 1TB HDD. design with 4GB RAM and 1TB HDD.
$359.00 $359.00
http://bitseed.org http://bitseed.org
LIBREM 13 V4 HELIOS 4
Modern Linux laptop. Intel i7 CPU, up to Open NAS server. 2GB RAM included,
16GB RAM, hardware switches + more. and space for 4 external SATA drives.
FROM $1399.00 $195.24
https://puri.sm https://kobol.io
GL-B1300 ROUTER
Dual-band homw mesh router. Comes
COMMUNICATIONS with OpenWRT firmware.
$89.00
https://store.gl-inet.com
SKYMINER OPENDIME
Node for Skycoin alt Internet. 8 CPUs, USB credsticks that let you transfer
CRYPTOCURRENCY HARDWARE
16GB RAM, & OpenWRT switch built in. Bitcoin offline and in person.
$1999.00 $39.94 (3 Pack)
https://store.skycoin.net https://opendime.com
SKYMINER DEXMO
Node for Skycoin alt Internet. 8 CPUs, Wireless haptic glove system that lets
VIRTUAL
16GB RAM, REALITY
& OpenWRT switch built in. you feel VR/AR worlds.
$1999.00 $3000.00
https://store.skycoin.net https://dextarobotics.com
X-CARVE VRGLUV
Modular, customizable CNC mill, with Accurately sense users' hands and
highly scalable work area. BOOKS in real time.
finger movement
$1349.00 $POA
https://inventables.com https://www.vrgluv.com
P2P / COMMUNICATIONS
P2P / DATA
P2P / DATA
P2P / ENTERTAINMENT
P2P / MONEY
P2P / NETWORKING
AUGMENTATIONS
SPACE
SPACE
HOUSING
Open Building Inst. Open source furniture plans and more https://openbuildinginstitute.org
Divine on the Road Plans for building your dream van https://divineontheroad.com/build-a-van
COMMUNICATIONS
COMMUNICATIONS
MANUFACTURING / 3D PRINTING
Creality Ender-3 Hardware and software plans for Ender-3 printer github.com/Creality3DPrinting/Ender-3
Creality CR-10 Hardware and software plans for CR-10 printer github.com/Creality3DPrinting/CR-10
MANUFACTURING / 3D PRINTING
MANUFACTURING / 3D SCANNING
ELECTRICITY
FARMING
CRYPTOCURRENCY
DRONES
VIRTUAL/AUGMENTED REALITY
COMPUTING
Satoshi Nakamoto is a symbol of hope. Even though we still live in this imperfect
Not because the pseudonymous creator of world, with many of the same corrupt forces,
Bitcoin birthed a brand new currency, a you could argue that Bitcoin has already
payment system, or even that he solved an succeeded in that it:
ages old computer science problem, no it's
much deeper than that. - Created a censorship-resistant system used
by millions of people
On January 03 2009, block 0 of a new - Created the most powerful computer
distributed system was mined. Contained hashing network in existence
within, was a message, "The Times - Created a market valued at multiple billions,
03/Jan/2009 Chancellor on brink of second all from nothing
bailout for banks", revealing some of the - Has been used as a safe haven by citizens in
thinking behind its genesis. failed states around the world
- Spawned a whole raft of other important
Taking into account that this was in the midst software innovations
of the financial crisis, and combining that with
later writings, we can infer that Satoshi wasn't As Peter Thiel would say, that is a 0 to 1
happy with the economic system he found development. Satoshi started all of this when
himself in. he sat down and figured out how to solve a
seemingly unsolvable problem.
What's interesting though, is that instead of
moaning, begging, lobbying politicians, voting, He's quoted as once saying "I'm better with
protesting, occupying wall street, or any of code than with words", and this is the core of
THE SATOSHI MINDSET / 147
the mindset: creating new technological "What can I build that will be so good that
alternatives, instead of just complaining. others will voluntarily abandon their old ways
Echoing this sentiment back in 1993 with the for this new thing?"
Cypherpunk Manifesto, Eric Hughes famously
declared, "Cypherpunks write code." Our civilization's heavy reliance on electronic
technology means that now more than ever,
This amalgam of recognizing problems, having you have a chance to come up with real
technical skills to potentially fix them, and then technological solutions and nudge our species
taking personal ownership for trying to do so in a better direction.
is probably one of, if not the most important
qualities our species has. So in closing, I just want to get across that it is
down to YOU, and no one else. Stop shaking
Human history is littered with these your fist at the sky, and shift your mindset.
feats--monumental forces of will which flip
the script, change reality, and reveal new Satoshi took on the responsibility of an
pathways for being. impossible task, and succeeded. You can too.
Pick a difficult problem, and go after it. If you
Another example is Linux. Do you think the need help, find like-minded people, and if you
operating system would be used on the have gaps in your knowledge, learn.
majority of phones, tablets, and servers today
if not for Linus Torvalds deciding one day to This is how we improve things--everything
create and release his own kernel, even when else is a distraction.
it seemed like a insane undertaking?
I just wanted to say THANK YOU for reading NODE
It's not about idolizing Satoshi or others. The Vol 01, hope you liked it. Now it’s your turn to go
point is that in order to solve big problems, we out there and build something.
must first look inwards and take responsibility.
Think: "What can I create to solve this?", and NODE
SUBMISSIONS
We’re going to open up submissions to the community for the
next issue, so if you are working on something unique, new,
and/or generally interesting, get in touch.
GUIDELINES: