Our zine brings you inspiration and information regarding independent science fiction and futurescience. Themes and topics covered include dystopia, cyber+punk, futurism, h+, utopia, and science-based hard sci-fi.
If you’re an artist, organization or technologist searching for new ideas or looking to promote your work, join us.
Note: this is a prototype and will be updated over the coming day or so. Leave any thoughts or suggestions in the comments section and we’ll see about making adjustments or adding more of what you’d like to see.
Feature: Hackers (1995) — 20th Anniversary of a Cult Classic
+ Angelina Jolie as Kate Libby in Hackers (1995). […]
Technological advancement anxiety? Check. Outrageously latex-heavy fashion? Check. Excessive product placement? If Hackers wasn’t a predictive emblem of everything 2015’s Miley generation represents, we don’t know what is. Light years (or at least two decades, seven iPhones and countless internet scandals) ahead of its time, director Ian Softley’s cult classic is a faultless exploration of myriad punk elements. It tackles contemporary consumer culture and inspires looks for days, underpinned by a pioneering electronic soundtrack along the way. […]
+Phil Chen on Virtual Agency: Unlocking VR’s Potential [3m 59s]
Virtual reality pushes the capabilities of computers like no other current technology; putting a 3D world in front of you and making it interactive requires a lot of power. But the payoff? A new medium that directly engages with you, multiplying your perspective and allowing a new kind of empathy.
By my teenage years my love of drawing attracted me to comic books, a passion I still hold dear. I spent every cent of my allowance on those artists I admired so much. I would emulate their work, redrawing all of my favorite panels, and often times created my own comic book characters and stories.
By this point, I was certain that I was going to be an artist when I grew up. My parents, however, took a little more convincing.
+Edward Snowden has a really good theory as to why we’ve never heard from aliens.
Snowden rigged a robot that he can control from Russia, and rolled right into astrophysicist Neil deGrasse Tyson’s office at the Hayden Planetarium in New York with his face displayed on the screen.
The conversation turned to encryption and cybersecurity, but here’s where an astrophysicist differs from a journalist: Tyson’s line of questioning quickly turned to how encryption relates to communication with … aliens.
Tyson asked Snowden if a highly intelligent alien civilization might be communicating with encrypted messages. And Snowden had an unsettling answer. […]
+Library Freedom Project, guest post: Privacy — who needs it? The benefits of online privacy can seem intangible. So what if someone on the Internet knows what someone else is doing on the Internet? But for many people (potentially including you or people you know), privacy tools are a shield from very real and immediate threats. Let’s meet seven of them. […]
+US, China Race To Boost Military Coding Personnel. As U.S. and Chinese leaders reportedly negotiate red lines in cyberspace, there is a hacker troop build-up playing out in their respective countries. […]
Comment: China: 100,000 cyberwarriors. United States: 6,200. North Korea: 6,000. Iran: 1,500.
+The Good, the Bad, and the Ugly: The Unix Legacy. Comments by Rob Pike of Bell Labs regarding the spread of Unix, and its problems, over the decades. (PDF) […]
+The $8 key that can open New York City to terrorists. Master keys for every elevator in the city, major construction sites, subways and skyscrapers are being freely sold online, despite a city law that makes it illegal for unauthorized persons to possess them. […]
Comment: Enjoy some FUD over leaked keys to easily-picked locks. Don’t equate it to encryption back doors, though. Never.
+PowerShell Memory Scraping for Credit Cards. During the post exploitation phase of a penetration test, I like to provide the client with examples of what could happen if a breach were to take place. One of the most common examples of this is credit card theft. To demonstrate this threat, I created a PowerShell memory scraper against whatever application (many times browsers) the target is using to harvest track data. […]
+Moon Engulfed in Permanent, Lopsided, Dust Cloud. New science results from NASA’s LADEE mission indicate that the moon is engulfed in a permanent, but lopsided, dust cloud that increases in density when annual events like the Geminids meteor shower spew shooting stars… […]
+Whoa. Hundreds(?) of malicious apps in the iOS store made it past Apple review due to a backdoored version of XCode… […]
+ The iOS store attack is exactly why developers should have reproducible build processes. […]
+Sunday Funday is Putting LGBT Rights in Writing Around the Globe. Sunday Funday: From Nepal to Argentina to Scotland, LGBT rights are gaining traction. […]
+Weevely3 – Weaponized Web Shell. Weevely is a command line web shell dynamically extended over the network at runtime designed for remote administration and pen testing. It provides a weaponized telnet-like console through a PHP script running on the target, even in restricted environments. […]
+Are the Kids Alright? Digital Risks to Minors from South Korea’s Smart Sheriff Application. Smart Sheriff exemplifies the risks inherent in government-mandated monitoring applications. The application’s design suffers from serious security flaws and appears to have been insufficiently checked for vulnerabilities, yet users have little choice in adopting and continuing to use the software. […]
+2015 Conference on Export Controls and Policy. November 2-4, 2015 […]
Comment: Registration now open for @BISgov’s little export control shindig in November.