Welcome to Constant Etherpad!

These pads are archived each night (around 4AM CET) @ http://etherdump.constantvzw.org/
An RSS feed from the etherdump also appears on http://constantvzw.org/

To prevent your public pad from appearing in the archive and RSS feed, put or just leave the following (including the surrounding double underscores) anywhere in the text of your pad:

    __NOPUBLISH__

Changes will be reflected after the next update at 4AM.
Questions:

Testbed: what does this name suggest? Allows for? (and Dowse?)
Dowsing vs testing: different vocabularies, different practices.

What could /should/would a testbed do?

What do you want to visualize? What are is the significance of the network analysis ?
Making material, making visible, making interrogible?

What does it mean to be observed?

What does it mean to look at traffic, what does observ ing the network mean?

Where is IoT and what does it mean to look in relation to setting its limits?
If it looks at medical tools for example, does it mean to look at bodies too? What does it mean to situate our vision in this situation?

How to look with discretion? Whitelists and blacklists. Other practices of what you look at (or not); looking sets up a relationship. 


tcp-dump-style inspectors (wireshark etc.): The inspector needs to become a node in the network, relies on the horizontality of the IP local network , ie you already have access to the network you want to inspect. The observer is situated within what is observed. This is only possible in IP-based IoT scenarios. Different approaches ("simple" observing vs re-routing of the whole network..)
What happens after, what can be done with this data, how to act upon it differs per project.
It is where IoT is also most vulnerable because of its promiscuity

When IoT is set up as an ad hoc network of machines ( M2M : beacon, LoRa, bluetooth ...) which then offer some different access to passive "users" for example via bluetooth, then the inspector cannot enter that network, the M2M machines communicate with each other via a closed network to which you do not have access. Actually this type of IoT has no Internet "proper" involved.
You can see that data is being sent, and from what device is exchanging between what. https://image.slidesharecdn.com/10-160913103418/95/jonathan-carter-iot-living-lab-glimworm-iot-the-city-24-638.jpg
Reliance on parallel structures and different networks.
Proprietary protocols
No user-facing interfaces.



https://www.shodan.io
https://thingful.net




intersections of dependencies and vocabularies

network-sovereignty

governance versus governement
surveillance versus information
appropriation versus education
creative use versus practice
making it 'useful' final word




Catalog

OpenSensors.io
'In OpenSensors, you can connect all kinds of devices like sensors,  gateways or even your phone. Each device is authenticated and has meta  data such as location and the type of data it is sending. You can set  alerts to get notified when data reaches certain thresholds.  Mobile or  web applications can connect to our APIs to get data. They can also send  messages back to the devices (e.g. turn your lights on and off using  your mobile phone).'
https://www.opensensors.io/how-to-publish
Goal is to publish data from your devices. See also: Patchhub (same idea)

----

Live Wire (or Dangling String)
“Dangling String” is one of the earliest expamles for Ambient  Interfaces. Those interfaces lie in the periphery of our perception.
It consists of an 8 foot piece of plastic spaghetti that hangs from a  small electric motor mounted in the ceiling. The motor is electrically  connected to a nearby Ethernet cable, so that each bit of information  that goes past causes a tiny twitch of the motor. A very busy network  causes a madly whirling string with a characteristic noise; a quiet  network causes only a small twitch every few seconds. Placed in an unused corner of a hallway, the long string is visible and audible from many offices without being obtrusive.
She completed the project while working as a Consultant Research Scientist at the Computer Science Lab,  Xerox Palo Alto Research Center (1994–96).

----

Network analysis tools, in different packagings, for different publics. Often using Wireshark or Tshark

tcpdump

Wireshark
'Wireshark is the world’s foremost and widely-used  network protocol analyzer.  It lets you see what’s happening on your  network at a microscopic level and is the de facto (and often de jure)  standard across many commercial and non-profit enterprises, government  agencies, and educational institutions.  Wireshark development thrives  thanks to the volunteer contributions of networking experts around the  globe and is the continuation of a project started by Gerald Combs in  1998.'
https://www.wireshark.org/

Hovelbot
Hovelbot is a computer program that, just like Frankenstein’s monster, quietly observes how humans live, in order to learn and be able  to share its stories with them. The visitor is asked to connect her phone to a local network. By doing so, the visitor can observe how the  hidden activity happening on her device is giving form to Hovelbot. In turn Hovelbot takes its unintentional “teachers” on a journey that,  even though it might remind us of the 19th century romantic pursues, will rather be a confrontation between our networked self and the artificial beings that make this network.
http://www.constantvzw.org/site/On-Journey-with-Hovelbot,2661.html

Dowse
'The Privacy Hub for the Internet of ThingsTo perceive and affect all devices in the local sphere'
Inspects wireless traffic only, this means you need to be already inside a network to be able to observe
http://dowse.equipment/

http://www.iot-inspector.com/
'detect vulnerabilities in the firmware of IoT devices, no source code required, instant results, comprehensive reporting and alerting, covers a broad range of IoT devices, including IP Cameras, Routers, Printers and many more, ISP specific solution for CPE devices available'
Inspection as a service.

IoT Inspector
Inspects wireless traffic only, this means you need to be already inside a network to be able to observe.

The transparency grenade

Xively
'Xively by LogMeIn offers an Internet of Things  (IoT) platform as a service, business services, and partners that enable businesses to quickly connect products and operations to the  Internet. It is pronounced "zively" (rhymes with lively).'
Usman Haque based Xively on Patchube, an early network monitoring project it has been bought over .
https://en.wikipedia.org/wiki/Xively

-----------------------

GetGee
www.getgee.xyz
Relational database for social media helping to relate information to their sources and make sense of environmental noise.

"G  is a powerful social media platform that allows people to easily use  graph databases to build collaborative knowledge repositories. 
G will instantly show the context and impact of news in complex systems. Every grain of information will build a bigger picture.
G provides a tool currently missing from the social media environment,  and is also a breakthrough for all data mapping and collaborative  environments, from school group projects to corporate data analysis.
G is the wiki of the future and a new way to use social media."

If we start analyzing our networks we will need to make sense of the information then collected and find citizen based platforms to share information about processes and sources.

Netflix Stethoscope
'Netflix is pleased to announce the open source release of Stethoscope, our first project following a User Focused Security approach. The notion of “User Focused Security” acknowledges that attacks against corporate users (e.g., phishing, malware) are the primary mechanism leading to security incidents and data breaches, and it’s one of the core principles driving our approach to corporate information security. It’s also reflective of our philosophy that tools are only effective when they consider the true context of people’s work.
Stethoscope is a web application that collects information for a given user’s devices and gives them clear and specific recommendations for securing their systems. If we provide employees with focused, actionable information and low-friction tools, we believe they can get their devices into a more secure state without heavy-handed policy enforcement.'
http://techblog.netflix.com/2017/02/introducing-netflix-stethoscope.html

Who is looking? Users (employees)
What is being looked at? 
How is it done?

Dowsing happens in the house
Testing as a research prop

IoT Monitoring
https://www.opensensors.io/


-----------------------

WHAT IS /WHERE IS IoT , an inventory:

What different flows, frequencies and protocols are used for IoT?

Low-Power Wide-Area Network
https://en.wikipedia.org/wiki/LPWAN
Of the available ISM frequency bands, LoRaWAN uses the 863-870 MHz and 433 MHz bands in EU; US 902-928 MHz; Australia 915-928 MHz; China 779-787 MHz and 470-510 MHz


What different instrumental and ideological uses of IoT can be seen at the horizon?

IoT + Smart City=
https://glimwormbeacons.com/
found specimen of https://itunes.apple.com/nl/app/amsterdam-beacon-mile-explorer/id1030668251?mt=8&ign-mpt=uo%3D4
part of https://www.thethingsnetwork.org/
"We use a long range and low power radio  frequency protocol called LoRaWAN and for short range Bluetooth 4.2."
https://www.lora-alliance.org/what-is-lora/technology
https://www.slideshare.net/NurayGokalp/jonathan-carter-iot-living-lab-glimworm-iot-the-city
https://image.slidesharecdn.com/10-160913103418/95/jonathan-carter-iot-living-lab-glimworm-iot-the-city-24-638.jpg

https://en.wikipedia.org/wiki/LPWAN