Compare commits


2 Commits

  1. 11
  2. 21
  3. 13


@ -1,15 +1,10 @@
# SquatConf Call For Papers Berlin 2016
Welcome to SquatConf CFP repository. you can also mail your submission to [] please copy this [model] and mail it.
Welcome to SquatConf CFP repository.
## Submit a talk
- Fork this repo
- `cp proposed/`
- Edit your talk
- Submit a pull request
or use the email submission (see paragraph above).
## Disclaimer
@ -30,5 +25,3 @@ cool people.
SquatConf is an experience, it is up to you to try it.


@ -0,0 +1,21 @@
# Infos
auth-name : noffle
tag : holistic prescriptive unix web distributed node
need travel fee : N
need room : N
Location : San Jose, CA
# unix & holistic technologies
Every technology lies on a spectrum: prescriptive technologies, like car
assembly lines, have dependence on large non-individual organizational
structures in order to function; while holistic tech is self-reliant and
depends on little, like a personal garden. Or a unix program. Most
things lie somewhere in between.
What the consequences of a society heavily dependent on prescriptive
technologies? What is its cost of adoption? Where can freedom be found
in taking control of the toolchain? Let's look at where the unix
philosophy and the web fit in.


@ -0,0 +1,13 @@
# Fuck Your License: Communiques from the Copyfight
name : Knoe Won <>
time: 30 minutes - 1 hour
need travel fee : yes
need room : yes
Location : no ?
note: can only be there for the 29th
This workshop will present the myriad potentialities of unbridled data sharing emergent from non-legalist information liberation strategies. Starting off with an initial exposition of why copyleft licenses are not merely undesirable, but are in actuality far more cancerous to unbridled knowledge dissemination than copyright, the workshop will then present potential strategies for removing the various legal, technical, and cultural fetters enchaining various cultural bodies of work. In other words: how could one not only create open archives, but how can one do so safely without the possibility of adversarial reprisal? How could one integrate security considerations from the ground up to foster unimpeded data availability, irrespective of various potential impediments thereto?
NOTE: this talk need more info for us to process, it is still in flux right now.