Welcome to Constant Etherpad!
These pads are archived each night (around 4AM CET) @
http://etherdump.constantvzw.org/
An RSS feed from the etherdump also appears on
http://constantvzw.org/
To prevent your public pad from appearing in the archive and RSS feed, put or just leave the following (including the surrounding double underscores) anywhere in the text of your pad:
__NOPUBLISH__
Changes will be reflected after the next update at 4AM.
Questions:
Testbed: what does this name suggest? Allows for? (and Dowse?)
Dowsing vs testing: different vocabularies, different practices.
What could
/should/would
a testbed do?
What do you want to visualize? What are is the significance of the network analysis
?
Making material, making visible, making interrogible?
What does it mean to be observed?
What does it mean to look at traffic, what does observ
ing
the network
mean?
Where is IoT and what does it mean to look in relation to setting its limits?
If it looks at medical tools for example, does it mean to look at bodies too? What does it mean to situate our vision in this situation?
How to look with discretion? Whitelists and blacklists. Other practices of what you look at (or not); looking sets up a relationship.
tcp-dump-style inspectors (wireshark etc.): The inspector needs to become a node in the network, relies on the horizontality of the
IP
local network
, ie you already have access to the network you want to inspect.
The observer is situated within what is observed. This is only possible in IP-based IoT scenarios. Different approaches ("simple" observing vs re-routing of the whole network..)
What happens after, what can be done with this data, how to act upon it differs per project.
It is where IoT is also most vulnerable
because of its promiscuity
When IoT is
set up as
an ad hoc network of machines
(
M2M
: beacon,
LoRa,
bluetooth ...)
which then offer some different access to passive "users" for example via bluetooth,
then
the inspector
cannot enter that network, the M2M machines
communicate with each other via
a closed network
to which you do not have access.
Actually this type of IoT has no Internet
"proper"
involved.
You can see that data is being sent, and from what device is exchanging between what.
https://image.slidesharecdn.com/10-160913103418/95/jonathan-carter-iot-living-lab-glimworm-iot-the-city-24-638.jpg
Reliance on parallel structures
and different networks.
Proprietary protocols
No user-facing interfaces.
https://www.shodan.io
https://thingful.net
intersections of dependencies and vocabularies
network-sovereignty
governance
versus governement
surveillance
versus information
appropriation
versus education
creative use
versus practice
making it 'useful'
final word
Catalog
OpenSensors.io
'In OpenSensors, you can connect all kinds of devices like sensors, gateways or even your phone. Each device is authenticated and has meta data such as location and the type of data it is sending. You can set alerts to get notified when data reaches certain thresholds. Mobile or web applications can connect to our APIs to get data. They can also send messages back to the devices (e.g. turn your lights on and off using your mobile phone).'
https://www.opensensors.io/how-to-publish
Goal is to publish data from your devices. See also: Patchhub (same idea)
----
Live Wire (or Dangling String)
“Dangling String” is one of the earliest expamles for Ambient Interfaces. Those interfaces lie in the periphery of our perception.
It consists of an 8 foot piece of plastic spaghetti that hangs from a small electric motor mounted in the ceiling. The motor is electrically connected to a nearby Ethernet cable, so that each bit of information that goes past causes a tiny twitch of the motor. A very busy network causes a madly whirling string with a characteristic noise; a quiet network causes only a small twitch every few seconds.
Placed in an unused corner of a hallway, the long string is visible and audible from many offices without being obtrusive.
She completed the project while working as a Consultant Research Scientist at the Computer Science Lab, Xerox Palo Alto Research Center (1994–96).
----
Network analysis tools, in different packagings, for different publics. Often using Wireshark or Tshark
tcpdump
Wireshark
'Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998.'
https://www.wireshark.org/
Hovelbot
Hovelbot is a computer program that, just like Frankenstein’s monster, quietly observes how humans live, in order to learn and be able to share its stories with them. The visitor is asked to connect her phone to a local network. By doing so, the visitor can observe how the hidden activity happening on her device is giving form to Hovelbot. In turn Hovelbot takes its unintentional “teachers” on a journey that, even though it might remind us of the 19th century romantic pursues, will rather be a confrontation between our networked self and the artificial beings that make this network.
http://www.constantvzw.org/site/On-Journey-with-Hovelbot,2661.html
Dowse
'The Privacy Hub for the Internet of ThingsTo perceive and affect all devices in the local sphere'
Inspects wireless traffic only, this means you need to be already inside a network to be able to observe
http://dowse.equipment/
http://www.iot-inspector.com/
'detect vulnerabilities in the firmware of IoT devices, no source code required, instant results, comprehensive reporting and alerting, covers a broad range of IoT devices, including IP Cameras, Routers, Printers and many more, ISP specific solution for CPE devices available'
Inspection as a service.
IoT Inspector
Inspects wireless traffic only, this means you need to be already inside a network to be able to observe.
The transparency grenade
Xively
'Xively by LogMeIn offers an Internet of Things (IoT) platform as a service, business services, and partners that enable businesses to quickly connect products and operations to the Internet. It is pronounced "zively" (rhymes with lively).'
Usman Haque
based Xively on Patchube, an
early network monitoring project it has been bought over
.
https://en.wikipedia.org/wiki/Xively
-----------------------
GetGee
www.getgee.xyz
Relational database for social media helping to relate information to their sources and make sense of environmental noise.
"G is a powerful social media platform that allows people to easily use graph databases to build collaborative knowledge repositories.
G will instantly show the context and impact of news in complex systems. Every grain of information will build a bigger picture.
G provides a tool currently missing from the social media environment, and is also a breakthrough for all data mapping and collaborative environments, from school group projects to corporate data analysis.
G is the wiki of the future and a new way to use social media."
If we start analyzing our networks we will need to make sense of the information then collected and find citizen based platforms to share information about processes and sources.
Netflix Stethoscope
'Netflix is pleased to announce the open source release of Stethoscope, our first project following a User Focused Security approach. The notion of “User Focused Security” acknowledges that attacks against corporate users (e.g., phishing, malware) are the primary mechanism leading to security incidents and data breaches, and it’s one of the core principles driving our approach to corporate information security. It’s also reflective of our philosophy that tools are only effective when they consider the true context of people’s work.
Stethoscope is a web application that collects information for a given user’s devices and gives them clear and specific recommendations for securing their systems. If we provide employees with focused, actionable information and low-friction tools, we believe they can get their devices into a more secure state without heavy-handed policy enforcement.'
http://techblog.netflix.com/2017/02/introducing-netflix-stethoscope.html
Who is looking? Users (employees)
What is being looked at?
How is it done?
Dowsing happens in the house
Testing as a research prop
IoT Monitoring
https://www.opensensors.io/
-----------------------
WHAT IS
/WHERE IS
IoT
, an inventory:
-
-Smart Home
-
Coffee machine (not sure about it) wifi?
-
Smart Grid - reselling energy production wifi
-
Smart Building control (heat- light- alarm) zigbee and ethernet
-
-
- Smart City
-
Smart car (full discussion list) wifi
-
Connected Trafic Light zigbee
-
Sensors zigbee
-
Emergency calls wifi
-
-
- Smart Agriculture
-
Ambient light sensors zigbee
-
Small motors zigbee
-
Irigation systems zigbee
-
Central control wifi
-
-
-Smart Health
-
What different flows, frequencies and protocols are used for IoT?
Low-Power Wide-Area Network
https://en.wikipedia.org/wiki/LPWAN
Of the available ISM frequency bands, LoRaWAN uses the 863-870 MHz and 433 MHz bands in EU; US 902-928 MHz; Australia 915-928 MHz; China 779-787 MHz and 470-510 MHz
What different instrumental and ideological uses of IoT can be seen at the horizon?
IoT + Smart City=
https://glimwormbeacons.com/
found specimen of
https://itunes.apple.com/nl/app/amsterdam-beacon-mile-explorer/id1030668251?mt=8&ign-mpt=uo%3D4
part of
https://www.thethingsnetwork.org/
"We use a long range and low power radio frequency protocol called LoRaWAN and for short range Bluetooth 4.2."
https://www.lora-alliance.org/what-is-lora/technology
https://www.slideshare.net/NurayGokalp/jonathan-carter-iot-living-lab-glimworm-iot-the-city
https://image.slidesharecdn.com/10-160913103418/95/jonathan-carter-iot-living-lab-glimworm-iot-the-city-24-638.jpg
https://en.wikipedia.org/wiki/LPWAN