It doesn’t matter where you live: in a dictatorship or in a democracy, Internet censorship is already in place or coming very soon now. But since “the Internet views censorship as damage and routes around it,” this post will summarize effective circumvention techniques that you can leverage against the current brand of censorship technology. Granted, this is — yet again — trying to solve a social problem with technical means, but since we can’t fix social diseases, we can at least resist them with technology as much as we can.

On May 27th 2009, North Korea (DPRK) withdrew unilaterally from the armistice signed on July 27, 1953 with the United States of America. Formally, both countries are still at war, and with the truce now defunct, the armed conflict could resume any time soon.

In the aftermath of the 9/11 terror attacks, politicians of many democratic countries were eager to establish an Internet surveillance infrastructure of proportions unheard of ever before. The collective hysteria and public demand for control, control, and more control, … were just too useful to be left unexploited by our governments.

The BBC just reported that a team of German scientists, lead by Prof. Dr. Sigurd Hofmann at the Center for Heavy Ion Research (GSI, Helmholtzzentrum für Schwerionenforschung, GmbH) has discovered yet another element. There’s no name yet for element 112. Heise/Telepolis features an interview with Prof. Hofmann (in German).

Since 112 is the european equivalent of 911, may I humbly suggest to name element 112 Emergentium?

Let’s kick off this blog with a technical post.

On my FreeBSD/amd64 desktop system, I often swap out a lot of files to external hard drives, after archiving them to Verbatim DVD-Rs (made in Taiwan, I avoid those made in India like the plague, as they failed me in the past). Just to be on the safe(r) side, I also append additional error-correcting Reed-Solomon codes to the ISO images with dvdisaster, which you should really evaluate, as even good media is bound to degrade sooner than later. Anyway, all this is boring sysadmin backup and restore routine. But hang on, now it gets interesting: