diff options
Diffstat (limited to 'tests/html/riemenstext.html.simple')
-rw-r--r-- | tests/html/riemenstext.html.simple | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/tests/html/riemenstext.html.simple b/tests/html/riemenstext.html.simple index 3020d90..5ead416 100644 --- a/tests/html/riemenstext.html.simple +++ b/tests/html/riemenstext.html.simple @@ -6,7 +6,7 @@ Riemens<br> <br> </b></p> - <p><i>"The + <p style="margin:1em 0em"><i>"The Theory of 'Free Software' as the seed of a post-capitalist society only makes sense where it is understood as the exposure of those very contradictions of the development of productive forces which are relevant to the process @@ -16,7 +16,7 @@ of a process that one ought to follow as if it were a blueprint." ("Eight Theses on Liberation," Oekonux mailing list)</i></p> - <p>As + <p style="margin:1em 0em">As the new information and communication technologies (ICT) entered our lives and became increasingly important in our daily activities, so did all kinds of knowledge, working habits and ways of thinking that were previously @@ -26,7 +26,7 @@ days, artists, intellectuals, and political activists have become fairly visible as informed and even innovative actors in what has become known as the public domain in cyberspace.</p> - <p>"Hackers," + <p style="margin:1em 0em">"Hackers," also often, but inexactly referred to as "computer pirates" or other derogatory term, constitute without doubt the first social movement that was intrinsic to the electronic technology that spawned our networked @@ -43,7 +43,7 @@ assumed with various degrees of (de)merit by a plethora of cultural and political activists associated, closely or loosely, with the "counter-globalization movement."</p> - <p>Yet, + <p style="margin:1em 0em">Yet, whereas hackers (if we take a broad definition of the term) have been pioneering the opening up of electronic channels of communication in the South, in the North, they initially were held in suspicion by those same @@ -60,7 +60,7 @@ breakdown of their stranglehold on communication and information taking place. For some time, it looked like as if a level playing field between hitherto dominators and dominated had come within sight.</p> - <p>The + <p style="margin:1em 0em">The Net, as a result, became not only one of the principal carriers of political activism, but also one of its major locus and issue. Once they had overcome their initial shock and surprise, the powers that be were bound to react @@ -75,7 +75,7 @@ and has resulted in activist circles (political, but also intellectual, cultural, and artistic) becoming markedly, sometimes completely, ITC-driven. However, as we will see, this does not ipso facto make them hackers.</p> - <p>But + <p style="margin:1em 0em">But it was equally within the domain of ICT itself that the exponential expansion of both range and carrying capacity of the Internet, as well of that of the related technologies, and all this within an increasingly aggressive @@ -90,7 +90,7 @@ programs, utilities and application modalities that have become known under the generic name of Linux, Free Software, Open Source, and General Public License (for definitions, see www.gnu.org).</p> - <p>De + <p style="margin:1em 0em">De prime abord, these developments suggest that given these technological settings and socio-economic and political circumstances, convergence was bound to take place between the actors involved, meaning a merger between @@ -113,7 +113,7 @@ run roughshod of the sensibilities of "authentic" hackers - and it does so unfortuitously - it also misrepresents reality hence giving rise to erroneous hypothesizes and unwarranted expectations.</p> - <p>"Hacker + <p style="margin:1em 0em">"Hacker culture," a concept one often encounters these days among networked activists, purports to represent this playful confluence between tech wizardry and the moral high ground. Hence, "Open Source" is @@ -139,7 +139,7 @@ on liberties by powerful institutions. The group later had to defend itself of guilt by association with respect to recent manifestations of "hacktivism" as Distributed Denial of Services (DoDS) attacks.</p> - <p>Behind + <p style="margin:1em 0em">Behind the so-called "Hacker Ethic" is the usual, daily activity of hackers. To put it very simply, without going deeper into its precise content, the hacker ethic runs strikingly parallel to the formula "l'art @@ -163,7 +163,7 @@ acquainted with their "natural allies." Yet it is neither fortuitous nor aberrant that the Californian transmutation of libertarianism enjoys such widespread support among hackers.</p> - <p>The + <p style="margin:1em 0em">The existence of such "ideological" positions has its reflection in the daily and usual activities of hackers, which are generally characterized by an absence of preconceived ideas and positions. Despite the avowed @@ -178,7 +178,7 @@ to think that such a program, as limited as it may sound, is essential, not subsequent, to the achievement of the better society we all aspire too.</p> - <p>This + <p style="margin:1em 0em">This being said, the points of convergence between the activities of hackers and those of (political) activists are many, and they increase by the day. It is becoming more and more evident that both groups face the same @@ -193,7 +193,7 @@ and endure in the same measure as the hostility and risks both groups are likely to encounter augment, it is worthwhile to analyze what unites as well as what separates them.</p> - <p>"Hacktivist" + <p style="margin:1em 0em">"Hacktivist" activities (and I am mostly referring here to the handywork of three groups, Electronic Disturbance Theater, Electrohippies and RTMark), well advertised by their authors, but also gleefully reported in the mainstream media, @@ -210,13 +210,13 @@ of aims and targets, amount in their eyes to attacks on the freedom of expression, which they seem to respect in a much more principled manner than most political activists.</p> - <p>The + <p style="margin:1em 0em">The truth is, that by abetting "hacktivism," activists implicitly admit that the net has become a mere corporate carrier, to which they have only a subordinate, almost clandestine, access, as opposed to be stakeholders in, and thus sharing responsibility for it. This constitutes their fundamental divergence with hackers, and it is not easily remediable.</p> - <p>Political + <p style="margin:1em 0em">Political activists are also, almost by definition, inclined to seek maximum media exposure for their ideas and actions. Their activities, therefore, tend to be public in all the acceptations of the term. The range of issues @@ -233,7 +233,7 @@ between equals, that is equals recognized as such beforehand, and hence also elitist. Political activists on the other hand are much more opportunistic when it comes to alliances and associations they engage in.</p> - <p>So + <p style="margin:1em 0em">So does the idea of "hacker culture" represent an effective way to describe and define certain current modes of political activism, especially when those do have a large ICT component? In many instances where the @@ -249,7 +249,7 @@ www.anarchogeek.com). But it should caution against a facile (and trendy) assumption of an equivalence, and maybe against the confusion-inducing use of the term "hacker culture" itself.</p> - <p><br> + <p style="margin:1em 0em"><br> <i>This article first appeared in French in Multitudes, Vol 2, No 8, March-April 2002, and in (an expanded) English translation |