From: blackh <gra...@li...> - 2003-04-18 09:47:23
|
blackh Fri Apr 18 02:47:22 2003 EDT Modified files: /grapevine README Log: Added notes about dial-ups and firewalls. Index: grapevine/README diff -u grapevine/README:1.8 grapevine/README:1.9 --- grapevine/README:1.8 Fri Apr 4 03:37:31 2003 +++ grapevine/README Fri Apr 18 02:47:21 2003 @@ -1,4 +1,4 @@ -$Id: README,v 1.8 2003/04/04 11:37:31 blackh Exp $ +$Id: README,v 1.9 2003/04/18 09:47:21 blackh Exp $ ------------------------------------------------------------------------------ Stephen Blackheath 04 April 2003 http://www.grapevineproject.org/ @@ -33,6 +33,29 @@ * It can scale to global size. +CAN I USE IT WITH A DIAL-UP CONNECTION? + +Yes - please do. The software is designed to cope well with a connection that +is only sometimes up. + + +CAN I USE IT FROM BEHIND A FIREWALL? + +At the time of writing, no. You have to put it on a machine that is directly +connected to the Internet, because it must be able to accept incoming +connections directly. + +We intend to fix this. + + +WHY IS IT GOBBLING UP ALL MY CPU TIME? + +It is supposed to do this. Grapevine runs a low-priority thread which +consumes all otherwise unused CPU time. This should have only a neglegible +impact on the performance of your system. The website explains the purpose +behind this "Solve A Hard Problem" algorithm. + + GRAPEVINE DEVELOPMENT PLATFORM This version of the software functions as the real thing, while also acting as @@ -47,14 +70,6 @@ code. We realize this, but we are doing it as a convenience to ourselves during the development phase. When the software is nearer completion, we will release "real" versions that do not bootstrap off the network. - - -WHY IS IT GOBBLING UP ALL MY CPU TIME? - -It is supposed to do this. Grapevine runs a low-priority thread which -consumes all otherwise unused CPU time. This should have only a neglegible -impact on the performance of your system. The website explains the purpose -behind this "Solve A Hard Problem" algorithm. WHY ARE WE DOING THIS? |
From: blackh <gra...@li...> - 2003-04-21 00:55:15
|
blackh Sun Apr 20 17:55:14 2003 EDT Modified files: /grapevine README Log: Index: grapevine/README diff -u grapevine/README:1.9 grapevine/README:1.10 --- grapevine/README:1.9 Fri Apr 18 02:47:21 2003 +++ grapevine/README Sun Apr 20 17:55:14 2003 @@ -1,4 +1,4 @@ -$Id: README,v 1.9 2003/04/18 09:47:21 blackh Exp $ +$Id: README,v 1.10 2003/04/21 00:55:14 blackh Exp $ ------------------------------------------------------------------------------ Stephen Blackheath 04 April 2003 http://www.grapevineproject.org/ @@ -41,11 +41,12 @@ CAN I USE IT FROM BEHIND A FIREWALL? -At the time of writing, no. You have to put it on a machine that is directly -connected to the Internet, because it must be able to accept incoming -connections directly. +The short answer is no. But you can do it if you configure your firewall to +forward your network TCP port to the machine on which grapevine is running. +(The port number must match.) -We intend to fix this. +We intend to fix it so you can run it on a machine behind a firewall with no +special configuration, but this is not top priority at the moment. WHY IS IT GOBBLING UP ALL MY CPU TIME? |
From: blackh <gra...@li...> - 2003-05-01 23:11:20
|
blackh Thu May 1 16:11:19 2003 EDT Modified files: /grapevine README Log: Improvements to README file. Index: grapevine/README diff -u grapevine/README:1.10 grapevine/README:1.11 --- grapevine/README:1.10 Sun Apr 20 17:55:14 2003 +++ grapevine/README Thu May 1 16:11:19 2003 @@ -1,7 +1,7 @@ -$Id: README,v 1.10 2003/04/21 00:55:14 blackh Exp $ +$Id: README,v 1.11 2003/05/01 23:11:19 blackh Exp $ ------------------------------------------------------------------------------ -Stephen Blackheath 04 April 2003 http://www.grapevineproject.org/ +Stephen Blackheath 02 May 2003 http://www.grapevineproject.org/ Thank you for helping us test the Grapevine Project! @@ -104,14 +104,14 @@ a measure the amount of wealth as is commonly believed). Intellectual property in its modern form is an economic system that sacrifices -this great benefit to society, so that large corporations can use their -existing illegitimate power to gain more illegitimate power. The copyright -expiry period has gradually increased from 15 years to 99 years, so that these -corporations own very nearly all of our culture, and even much of our language -(the basis of thought). And, they are constantly dreaming up new things that -can be owned, such as genetic material. Our purpose is to give people the -power to remind the intellectual property corporations of what their parents -told them when they were young - to say "Please". +this great benefit to society, so that corporations can translate the power of +withholding information into income. Due to industry lobbying, the copyright +expiry period has gradually increased from 15 years to 99 years, and so these +corporations now own a large section of our culture, and even much of our +language (the basis of thought). And, they are constantly dreaming up new +things that can be owned, such as genetic material. + +Our purpose is to shift the balance of power. Libel laws @@ -121,9 +121,9 @@ companies became 'legal persons'. And so they had an unbeatable combination: The legal rights of a person, and the political power of a homicidal robot from the future. So for example, they are protected by libel laws, but not -bound by murder laws. This allows them to go into Third World countries and -shoot people (which they now do on a regular basis), and then prosecute anyone -who tells on them. +bound by murder laws. This has allowed them to go into Third World countries +and shoot people (which is becoming a regular occurrence), and then prosecute +anyone who tells on them. Mass media @@ -180,12 +180,11 @@ surveillance system is a concentration of unimaginable power. This fact is not immediately obvious to most people. When the government is honest and strongly structured, these concentrations are a potential weakness in the -system. When the government is corrupt, freedom is dead. Now which kind of -government rules your country? Yes, I am aware that many people still live -in fantasy land on this issue. +system. When the government is corrupt, freedom is dead. Which kind of +government do you live under? -Surveillance is a central theme in Orwell's "Nineteen Eighty Four". The -Fourth Amendment of the American Constitution is violated by all this. And, +Surveillance is a central theme in Orwell's "Nineteen Eighty Four". This +surveillance violates the Fourth Amendment of the American Constitution. And, if you think about it the Third Amendment is also about surveillance, but it was written before Orwell's notion of "continuous warfare" became non-fiction, and before the advent of police and digitally networked video cameras. |
From: blackh <gra...@li...> - 2003-08-16 08:03:15
|
blackh Sat Aug 16 01:03:15 2003 EDT Modified files: /grapevine README Log: Index: grapevine/README diff -u grapevine/README:1.11 grapevine/README:1.12 --- grapevine/README:1.11 Thu May 1 16:11:19 2003 +++ grapevine/README Sat Aug 16 01:03:14 2003 @@ -1,4 +1,4 @@ -$Id: README,v 1.11 2003/05/01 23:11:19 blackh Exp $ +$Id: README,v 1.12 2003/08/16 08:03:14 blackh Exp $ ------------------------------------------------------------------------------ Stephen Blackheath 02 May 2003 http://www.grapevineproject.org/ @@ -31,6 +31,21 @@ * It operates reliably and efficiently, even though the network is composed of unreliable nodes. * It can scale to global size. + + +HOW DO I USE IT? + +First, install the software. Then, to use The Grapevine, point your web +browser at + + http://localhost:5669/ + +Configuration is system-specific, but it involves editing a file called +grapevine-config.xml (in /etc on Unix), and re-starting the Grapevine daemon. + +If you want to access the local web interface from other hosts in your +network, you will need to add them as allowed addresses in +grapevine-config.xml and re-start the daemon. CAN I USE IT WITH A DIAL-UP CONNECTION? |
From: blackh <gra...@li...> - 2003-08-16 08:19:56
|
blackh Sat Aug 16 01:19:56 2003 EDT Modified files: /grapevine README Log: Improvements to README file for next release. Index: grapevine/README diff -u grapevine/README:1.12 grapevine/README:1.13 --- grapevine/README:1.12 Sat Aug 16 01:03:14 2003 +++ grapevine/README Sat Aug 16 01:19:56 2003 @@ -1,7 +1,7 @@ -$Id: README,v 1.12 2003/08/16 08:03:14 blackh Exp $ +$Id: README,v 1.13 2003/08/16 08:19:56 blackh Exp $ ------------------------------------------------------------------------------ -Stephen Blackheath 02 May 2003 http://www.grapevineproject.org/ +Stephen Blackheath 16 Aug 2003 http://www.grapevineproject.org/ Thank you for helping us test the Grapevine Project! @@ -9,8 +9,6 @@ NOTE: The use of this software entails some risk to you. It is important that you read the WARNING document before using it. -For usage instructions, see README.<Your Operating System> - WHAT IS IT? @@ -47,6 +45,8 @@ network, you will need to add them as allowed addresses in grapevine-config.xml and re-start the daemon. +For more detailed usage instructions, see README.<Your Operating System> + CAN I USE IT WITH A DIAL-UP CONNECTION? @@ -103,9 +103,9 @@ Information as power Few people truly grasp the political power that comes from the control of the -flow of information in human society. The withholding of information is one -of the primary mechanisms of power at all strata of society. When this power -is concentrated, the result is tyranny. When this power is diffused, tyranny +flow of information. The withholding of information is one of the primary +mechanisms of power at all strata of society. When this power is +concentrated, the result is tyranny. When this power is diffused, tyranny cannot exist. @@ -116,7 +116,7 @@ information, I do not lose it. The free exchange of information produces the greatest possible material wealth (which is quite distinct from monetary wealth, which represents the distribution of economic control rather than -a measure the amount of wealth as is commonly believed). +a measure the amount of wealth). Intellectual property in its modern form is an economic system that sacrifices this great benefit to society, so that corporations can translate the power of @@ -124,7 +124,8 @@ expiry period has gradually increased from 15 years to 99 years, and so these corporations now own a large section of our culture, and even much of our language (the basis of thought). And, they are constantly dreaming up new -things that can be owned, such as genetic material. +things that can be owned, such as genetic material and Internet search +keywords. Our purpose is to shift the balance of power. @@ -133,9 +134,9 @@ Libel (defamation) laws were created to protect a person's good name from mud slinging, which is a very good idea. Unfortunately, some while ago -companies became 'legal persons'. And so they had an unbeatable combination: -The legal rights of a person, and the political power of a homicidal robot -from the future. So for example, they are protected by libel laws, but not +companies became 'legal persons'. And so this meant they had the legal +rights of a person, but the political power of a homicidal robot from the +future. For example, they are protected by libel laws, but not effectively bound by murder laws. This has allowed them to go into Third World countries and shoot people (which is becoming a regular occurrence), and then prosecute anyone who tells on them. @@ -161,9 +162,8 @@ modems. The Internet is slowly being converted into interactive television. Many news websites drop old articles into the memory hole, freeing themselves -from scrutiny. New Zealand's leading news website drops articles after a day! -The global news agencies are swiftly degenerating into outright lying, -especially regarding economics and war. +from scrutiny. The global news agencies are swiftly degenerating into +outright lying, especially regarding economics and war. Governments - the Australian Government being a shining example - are dreaming up fake crackdowns on child pornography, hate speech, and other acts of @@ -171,10 +171,11 @@ this marvellous property of being inherently unaccountable. It only needs to be introduced - it does not need to be justified on an ongoing basis. -Various "terrorist" websites have been shut down in the USA (First Amendment -be damned!). Internet Service Providers (which are owned by news and -entertainment corporations) are increasingly being required to police -censorship and copyright laws, and more recently, "counter-terrorism". +Various "terrorist" websites have been shut down in the USA (the Home of the +Brave rather than the Land of the Free). Internet Service Providers (which +are owned by news and entertainment corporations) are increasingly being +required to police censorship and copyright laws, and more recently, +"counter-terrorism". And importantly, hate speech is now illegal in Europe, providing a panorama of excuses for political censorship. @@ -198,11 +199,8 @@ system. When the government is corrupt, freedom is dead. Which kind of government do you live under? -Surveillance is a central theme in Orwell's "Nineteen Eighty Four". This -surveillance violates the Fourth Amendment of the American Constitution. And, -if you think about it the Third Amendment is also about surveillance, but it -was written before Orwell's notion of "continuous warfare" became non-fiction, -and before the advent of police and digitally networked video cameras. +It is important to note that total surveillance violates TWO ammendments to +the American Constitution. ARTICLE THREE @@ -210,6 +208,9 @@ consent of the owner, nor in time of war, but in a manner to be prescribed by law. +In the modern world, read "police" and "electronic surveillance equipment", +neither of which existed when this law was written. + ARTICLE FOUR The right of the people to be secure in their persons, houses, papers, and @@ -217,4 +218,7 @@ and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. + +Surveillance is a central theme in Orwell's "Nineteen Eighty Four", a book +which every adult should read. |
From: Ross S. I. <ro...@sm...> - 2003-04-18 15:58:38
|
> +CAN I USE IT FROM BEHIND A FIREWALL? > + > +At the time of writing, no. You have to put it on a machine that is directly > +connected to the Internet, because it must be able to accept incoming > +connections directly. > + > +We intend to fix this. Steve, This isn't exactly true. I use grapevine behind a firewall, but I foward the needed port directly to the machine running grapevine. Do you want to change the verbage to explain this exception? -Ross |