[UPDATE] [WANTED] Language Technology / Electric Word Magazine

A little while ago, I was contacted by a gentleman by the handle of jonur who saw my post and decided to upload some scans of Language Technology / Electric Word magazine that he has done.

This is truly awesome, and we now have seven issues to browse through currently! Though this is not the entire collection, it is an awesome start.

The issues are:

Language Technology Issue 3 (September/October 1987)
Language Technology Issue 6 (March/April 1988)
Language Technology Issue 9 (September/October 1988)
Electric Word Issue 13 (May/June 1989)
Electric Word Issue 15 (September/October 1989)
Electric Word Issue 16 (November/December 1989)
Electric Word Issue 20 (July/August 1990)


The Hermicity Interview – Drones, DAO, & Deliverable Soylent

This article was originally written for and published at N-O-D-E (since removed) on May 20th, 2016. It has been posted here for safe keeping.




I recently spoke with John Dummett, the creator of H E R M I C I T Y, a project aiming to send packages of Soylent by drone to hermits living in remote areas who pay via smart contract through Ethereum.

John and I started exchanging messages on Reddit after I spotted a link he posted about his project in a decentralization-themed subreddit. Speaking with John, I could immediately pick up that he was a person who valued his privacy and his relationships. He was not, however, a shy person regarding his passions. Every question I posed was answered with an enthusiastic, complete explanation, welcome to assorted follow-ups and forgiving to my novice understanding of select technologies.

We waxed rhapsodic about the project and its bright potential. Often late at night for me in a dark room lit only by monitor glow, early afternoon for him the next day, I picked his brain and explored the radical concepts that seemed to ebb and flow organically without inhibition.

An 18-year-old Australian native, John already has professional work experience with block chain technology and a dream to change the world. He believes that the future we have been waiting for is now, and he doesn’t want anyone to miss it.

[N-] Could you explain what H E R M I C I T Y is for those who may not have heard of it?

[JD] H E R M I C I T Y is going to allow people to live alone. Up until very recent technological advancements, we were social creatures by necessity as living alone was costly, unsafe and uncomfortable. We’re going to make living alone accessible.

As for some concrete details, here is part of our general road-map and practical details section that will be revealed on the upcoming revamped website. We are going to develop a parent DAO to all the Hermicites. Members of the community will be able to submit proposals for a Hermicity to this DAO. They will use a standardised template that we will develop. The proposal will require information on where the Hermicity will be, how the land will be acquired (rent or buy, etc.), proof that the current custodian of that land is willing to have a Hermicity built on it, what type of micro-dwellings will be built on said land, how much they will cost, how many residencies to said Hermicity are up for grabs, the cost of the drones and other things to be delivered (Soylent, water, etc.)

From here, the total cost of the project is divided by the amount of residencies up for grabs and then there is a time-frame given for the project to be funded. Through multi-sig addresses we are going to build an auctioning system for people to bid on the residencies inside given Hermicities.

For instance, say I go and arrange for someone with a huge, beautiful and remote farm to let me have four hermits living on it for a cost of $20,000 a year. Then I find a company that can build a simple shack-like microdwelling for $20,000 each. (I haven’t done the modelling yet but [say] Soylent, water, other items for delivery cost $20,000 and then the drone itself is $10,000. Total cost to run the Hermicity for 1 year is $70,000. The cost of the residencies is $17,500.) I’d fill out the proposal form and submit it to the parent DAO.

The parent DAO then generates an array of ether addresses for this given proposal, of which the top 4 will be successful (as long as they each hold at least $17,500) and the rest of the addresses will be refunded. The ether funds then move from those addresses to begin paying for the Hermicity to be built and the winners get their residencies.

Unless the proposal for the relevant Hermicity has a plan of what to do with the extra funds (for instance you could say that if someone bids $25,000 then they can get a “better” microdwelling) then the extra funds will simply go to the parent DAO in order to fund the continued development of the entire project. Some of these excess funds could also be used for our team to sponsor people looking to create proposals.

We hope the community is passionate enough about this that they go out and try to create Hermicities all over the world. The new site revamp will include a forum section so we can start discussing what these first proposed Hermicities may look like.

It’s important to have this proposal process rather than me and my team making them all ourselves. By getting out of the way, the free market will ensue – we are not going to stop people from making any kind of proposal they like. Perhaps a Hermicity with more expensive residencies may allow for hot cooked meals to be drone-lifted to the hermits.

The reason I used Soylent as the example on the site is that it is nutritionally complete and cost effective, and [I] imagine that the first Hermicities will probably be as cost efficient and accessible as possible. Although there will probably eventually be more elaborate and fancy Hermicities like I described above, initially I think the market for Hermicities will mostly be asking for the most cost effective yet complete package as possible so Soylent’s nutritional balance and low cost seems perfect.

Furthermore, the same can be said for other parts of the Hermicity. Initial Hermicities may be hand-made shacks with limited features, whereas eventually you will see proper microdwellings with full blown heating and cooling, solar power, fast Internet connection, etc. It will be interesting to see at what comfort point the market starts at, though. The beauty is that what we are trying to build will allow other people to figure this out for us – [I] imagine we could have many Hermicities popping up all over the world before long.

[N-] How did you get the idea for H E R M I C I T Y?

[JD] For a long time I have been interested in making the hermit lifestyle more accessible and now that it looks like the technology is finally here to do it – for the first time in human history – it just made sense to execute this idea and try to get this done.

I’ve always been interested in the idea of living alone. This keen interest is really the result of a heap of things that have happened in my life. But really H E R M I C I T Y is at the intersection of a lot of really interesting technology and social movements. There is a lot of fascinating potential [for] this project when we think about it. What will [allow] people to easily spend time alone untapped? How low can we get the price of a residency, and how many people will be interested? If we no longer need each other to survive and people are satisfied living alone and comfortably with an Internet connection, what is the future of the nation state? (This last point is in my eyes the logical final state of Ethereum – technology autonomously running everything in a fashion that no human has to work or gets left behind.) Could the first settlement on Mars be a Hermicity?

Although I am sure we will be able to implement a lot of these ideas successfully – H E R M I C I T Y as a project is already satisfying the Ethereum community just as a thought piece that symbolizes what we are doing, what we value, and [what we] envision the future of the world could look like.

Outside of web development and design – I am an artist, writer and philosopher and I think this project reflects that.

[N-] Do you yourself have interest in living in solitude as a hermit? What advantages do you see with this lifestlye?

[JD] Human beings are social creatures – by necessity. For some of us, we are not social just by necessity, we are extroverts and enjoy each other’s company and being actively engaged with the people around us. Other people [are] only social by necessity, prefering to be alone and do not [enjoy] direct contact with other people.

The necessity part comes in because until very recently we have not had the technological capability to easily, comfortably and safely live alone. New technology makes the hermit lifestyle accessible.

The question Hermicity poses is, “how many people are interested in this now, and how many more people will be interested in this in the future?”

Almost every great thinker has spent much time alone. I know [that] the time I have spent alone has made me a wiser, more intelligent person. Perhaps by making [secclusion] more accessible we can unlock a lot of human potential that is standing idle at the moment, locked away in bodies that are too distracted by the other bodies around them and are therefore unable to look in and unlock their unique ideas and energy.

[N-] Where is H E R M I C I T Y in the development cycle? How far away would you say we are from seeing a deliverable?

[JD] Admittedly it’s still very early days, but I am working hard on the revamped site which will better explain what we are trying to do, how we will do it, and why it is important.

I have had a lot of people contacting me over the last week and will be looking to put together a proper team and road-map. Eventually I would like to work on this full time. Once the parent DAO has been developed along with the other technical framework and proposal template work completed, it will be up to the community we have built up to start delivering. Obviously we will be pretty instrumental in supporting them with this.

[N-] How many people are working on the project, what are their backgrounds?

[JD] At the moment we have three people working on the project. I am a front-end web developer and designer. We have another web developer and community manager who has extensive experience running events and managing communities. Finally, we have a cloud rapper and philosopher – we believe it is important to build a really optimistic and positive culture around our DAO because otherwise success will be much harder to attain. (Anything is possible, optimism and energy is what allows you to push harder and further.)

As I said before many more people have reached out. I will be contacting these people to try to build a small and efficient dev team. Thankfully I have been contacted by people with skills across a wide range of areas, most importantly in decentralised programming. We should be able to get that parent DAO up and running soon.

[N-] How did you get your start with blockchain technologies?

[JD] Last year I worked for one year with CoinJar, which is Australia’s largest bitcoin exchange. Working on the team there, we were constantly thinking about what to do next and a huge part of that is thinking about what’s possible using the blockchain.

The bitcoin blockchain and its potential is too limited, of course it’s always going to be amazing given that it was the first and it kicked started this whole movement – but Ethereum is superior in terms of technology and [the] core developer team so it’s where the best blockchain projects are going to happen, not bitcoin.

[N-] Tell me more about the technology, what are the advantages of adopting the DAO (decentralized autonomous organisations) and smart contracts? How will you interact with the drones?

[JD] Utilising Ethereum as the backbone of this project is so important, we couldn’t do this without Ethereum. DAOs offer interdependance – a perfect middle ground where individuals voluntarily interact with each other on terms that suit them, but still [tapping that] magic of when we work together. The beauty of DAOs is that they allow people to work together without compromising on their independence. Therefore, DAOs are the future – I believe a world run on DAOs is one that offers scalable order by allowing people to indirectly work together and to automate sharing of resources so that no one is left behind.

The parent DAO that I spoke of earlier with its world first actioning code will be a groundbreaker. The drone deliveries will be triggered by ether transactions as seen here -> https://www.youtube.com/watch?v=V_3rcP2Duv0

When people submit proposals to the parent DAO it will be up to perspective residents to look through the proposal and ensure that everything is up to scratch. If the proposal is successful the proposer will then build the Hermicity. We intend that we will provide DAPP (decentralized app) code to run the drone deliveries of Soylent (and other needs as specified in the proposal) in an autonomous fashion. Live by the DAO.

[N-] I’m wondering how this model would work with self-sufficiency. Would each hermit be beholden to whomever set up the Hermicity for a location, or could the actual inhabitants pool their resources on the drones/deliveries themselves? For example, could there be a situation where after you receive a delivery, you then charge the drone up for the next person, and then be rewarded for doing so automatically?

[JD] Each Hermicity will work differently depending on the proposal that was at the root of it being built. Some will be bare bones, others will be more sophisticated. It will be up to the proposers and the wants and needs of the market of hermits that develop.

I could tell you what I think will happen, but I would prefer to encourage the community to stay as open minded as possible. I’m looking forward to the different ideas that develop and what becomes de facto standards. I’m imagining there will be a competitive marketplace of Hermicity proposals.

[N-] Alot of people bring up how young you are? Do you find your age to be advantageous to working on this project?

[JD] Being young is crucial to the success of this project and that’s why I am a big fan of things like the Thiel Fellowship because they realize how important it is for young people with big ideas and a lot of energy (but lacking the right circumstance) to be able to have a crack.

It’s advantageous to be young because you generally have a more open mind and scope of possibility than older people in that you’ve had less time to develop prejudices and had less time to compromise on your own beliefs, etc. It’s important to start working really hard on these things now while I am young and not wait. When these projects and activities work out (which they do) and I progress, it allows me to keep being myself and to not stop compromising on my own ideas and beliefs.

I hope that either the community or movement around this project will grow large enough that I can be financially supported to work on this full time or that if that doesn’t happen, I will be able to get into a program like the Thiel Fellowship.

[N-] What are some of the biggest obstacles or barriers to entry you are facing right now? Are there any legalities you are worrying about with regards to operating drones?

[JD] The biggest barrier to entry is personal. I work full time so [I] don’t have as much time as I’d like to work on this, but hopefully these circumstances will change soon. In the meantime I am just working as hard as I can.

As far as legalities, by opening up the process so that anyone can propose a drone anywhere in the world, I envision that many teams of people will be working to get Hermicities set up all over the earth. Some jurisdictions will be easier to find arrangements with than others, but as I said before, large remote farms or other large privately owned lands would be a great starting spot I imagine. It will be interesting to see what proposals people come up with.

[N-] Will you be operating your own fleet of drones, or adopting a model like Uber/Lyft where you use or share time controlling drones owned by others?

[JD] Once again it’s simply up to the proposers. I imagine that for the sake of more secure deliveries it would be better for the drones to be owned by the DAO, if they have an autonomous solar/battery charging station, human interaction would be very rare and eventually completely unnecessary. [It] will be great to watch the proposers innovate in this area in particular.

[N-] Have you considered users besides hermits such as digital nomads? Any thought of a potential use for humanitarian aid?

[JD] There are many different potential use cases for this idea and the associated technology that will be developed. It will absolutely be up to the proposers to come up with the practicalities of executing these ideas. We will offer the technology and other framework based support for people to get started and then we will get out of their way.

[N-] How has feedback been so far since you have announced H E R M I C I T Y? Has anything surprised you?

[JD] The responses have been overwhelmingly positive and some of them really funny. I’ve had well over 100 responses now over email, and many people have inboxed via the HERMICITY Reddit account.

Vitalik’s (Co-Founder of Ethereum) tweet was really great, he got it.

His second in command also emailed me saying the concept was art, so he got it too which was great.

I haven’t received negative feedback, though there have been half a dozen or so emails from people who don’t get it.

The amount of people who want to help out is really high as well.

[N-] Do you currently have any specific roles on your team that need to be filled? How can people contribute?

[JD] We have been contacted by so many people (via http://offline.computer/hermicity), we are still trying to go though all the emails so we can start responding. Once we have a solid roadmap we can start advertising positions. There aren’t any major skill shortages at this [point], but I am looking forward to expanding the team when we get to that stage.



I Wrote An App

I’ve been putting off this post for a while. Not for any reason in particular, I just like to have things arranged in a certain way before I push them out to people.

This is analogous to the mobile app project this post refers to as a whole. In 2013, with the idea of a friend, I created a mobile application that allows a user to send a random insulting text to someone on their contacts list. It was for fun of course, and we called it BitchyTexts. It was (and still is) Android-only, and was developed over the course of a few weeks on the little time I had between classes. I distributed it to my friends, who distributed it to their friends, and the results were mostly positive. It was crude, and thrown together, but it worked and did its job well.

The next logical step of course was a Play Store release. However, I needed to clean my code up, get things under version control. and brave the submission process. I worked a little here and there, but ultimately getting the app out the door fell to the bottom of my priority list. In late 2015, two years after I decided I wanted to do a Play Store release, I picked development back up again and started knocking out little pieces here and there to reach my desired outcome.

This became one of my 2016 goals, and I was chomping at the bit to release something. There was no use sitting on it, store releases are an iterative process and I could always improve here and there after the application was live.

So, I submitted it. It was approved, and it’s out there for anyone to download and use. There are changes I want to make, and there are other things I want to work on for it (An improved website, back-end services, etc.) but those can come at any time. There is a lot of planning to do, but nothing too crazy.

BitchyTexts in action!

BitchyTexts in action!

Check it out here, https://play.google.com/store/apps/details?id=com.bt.bitchytexts

Let me know what you think!


I2P 101 – Inside the Invisible Internet

This article was originally written for and published at N-O-D-E on May 1st, 2016. It has been posted here for safe keeping.


The Invisible Internet Project (more commonly known as I2P) is an older, traditional darknet built from the ground up with privacy and security in mind. As with all darknets, accessing an I2P site or service is not as simple as firing a request off from your web browser as you would with any site on the traditional Internet (the clearnet). I2P is only accessible if you are running software built to access it. If you try to access an I2P service without doing your homework, you won’t be able to get anywhere. Instead of creating all new physical networking infrastructure, I2P builds upon the existing Internet to take care of physical connections between machines, creating what is known as an overlay network. This is similar to the concept of a virtual private network (VPN) wherein computers can communicate with one another comfortably, as though they were on a local area network, even though they may be thousands of miles apart.



I2P was first released in early 2003 (only a few months after the initial release of Tor), and was designed as a communication layer for existing Internet services such as HTTP, IRC, email, etc. Unlike the clearnet, I2P focuses on anonymity and peer-to-peer communications, relying on a distributed architecture model. Unlike Tor which is based around navigating the clearnet through the Tor network, I2P’s goal from the start was to create a destination network and was developed as such. Here, we see that the focus is on community and anonymity within it as opposed to anonymity when using the clearnet.


When you connect to I2P, you are automatically set up to be a router. If you are a router, you exist as a node on the network and participate in directing or relaying the flow of data. As long as you are on the network, you are always playing a part in keeping the traffic flowing. Other users may choose to configure their nodes as inproxies. Think of an inproxy as a way to get to an I2P service from the clearnet. For example, if you wanted to visit an eepsite (An anonymous site hosted on I2P, designated by a .i2p TLD) but we’re not on I2P, you could visit an inproxy through the clearnet to provide you access. Other users may choose to operate outproxies. An outproxy is essentially an exit node. If you are on I2P and want to visit a clearnet site or service, your traffic is routed through an outproxy to get out of the network.


There are numerous advantages to using I2P over another darknet such as Tor depending upon the needs of the user. With I2P, we see a strong focus on the anonymity of connections as all I2P tunnels are unidirectional. This means that separate lines of communication are opened for sending and receiving data. Further, tunnels are short-lived, decreasing the amount of information an attacker or eavesdropper could have access to. We also see differences in routing as I2P uses packet switching as opposed to circuit switching. In packet switching routing, messages are load balanced among multiple peers to get to the destination instead of a single route typical of circuit switching. In this scenario, I2P sees all peers participating in routing. I2P also implements distributed dissemination of network information. Peer information is dynamically and automatically shared across nodes instead of living on a centralized server. Additionally, we also see low overhead for running a router because every node is a router instead of a low percentage of those who choose to set one up.


I2P implements garlic routing as opposed to the more well known onion routing. Both garlic routing and onion routing rely on the technique of layered encryption. On the network, traffic flows through a series of peers on the way to its final destination. Messages are encrypted multiple times by the originator using the peers’ public keys. When the message is sent out on the path and decrypted by the proper corresponding peer in the sequence, only enough information to pass the message to the next node is exposed until the message reaches its destination where the original message and routing instructions are revealed. The initial encrypted message is layered and resembles an onion that has its layers peeled back on transit.

Garlic routing extends this concept by grouping messages together. Multiple messages referred to as “bulbs” are bound together, each with its own routing instructions. This bundle is then layered just like with onion routing and sent off to peers on the way to the destination. There is no set size for how many messages are included in one bundle, providing another level of complexity in message delivery.


Hundreds of sites and services exist for use within the I2P network, completely operated by the community. For example, Irc2P is the premier IRC network for chat. We see search engines like eepSites & Epsilon, and torrent trackers like PaTracker. Social networks like Id3nt (for microblogging) and Visibility (for publishing) are also abundant. If you can think of a service that can run on the network, it may already be operational.


I2P remains in active development with many releases per year and continues to be popular within its community. While I2P is not as popular as other darknets such as Tor, it remains to be a staple of alternative networks and is often praised for its innovative concepts.Though I2P does not focus on anonymous use of the clearnet, it is seeing active use for both peer-to-peer communication and file-sharing services.


While many may view I2P as just another darknet, it has many interesting features that aren’t readily available or implemented on other networks. Due to the community and regular updates, there is no reason to think that I2P will be going anywhere anytime soon and will only continue to grow with more awareness and support.

Over time, more and more people have embraced alternative networks and we are bound to see more usage on the horizon. However one of the points I2P maintainers express is that the network’s small size and limited adoption may be helpful at this point in time. I2P is not as prominent in the public’s field of view, possibly protecting it from negative publicity and potential attackers.

Whether or not I2P will keep hold of its core community or expand and change with time is unknown, but for now it proves to be a unique darknet implementation with a lot of activity.





It’s Warm, Like Flesh

This article was originally written for and published at Exolymph on April 28th, 2016. It has been posted here for safe keeping.

As technology evolves, the line between science and science fiction starts to blur. At one point, the thought of space travel or even micro-computing was only a dream of the future, yet it became a reality within or before our lifetimes. More and more, we find ourselves questioning if something is real or only exists in thought — a pie-in-the-sky dream of hopefuls or holdouts. We are starting to find that the future is now, whether we are ready for it or not.

A video about a modular life-form grown from human cells made its rounds on the Internet only a few weeks ago. In the video, you are first presented with a couple of slabs of meat on a stainless steel counter. Cut to a scientist who introduces you to “OSCAR”, a modular human-like organism. We see Oscar get assembled: a brain module (literally a black box of electronic components) is plugged into a heart module is plugged into a lung module is plugged into a kidney module. With each insertion, we see the creature twitch, pulsate, or squirm. Then limb modules are added and Oscar awkwardly crawls around in search of warmth.

This Cronenberg-esque video was both terrifying and fascinating. With imagery straight out of eXistenZ (1999) or Naked Lunch (1991), we watch this organic creature struggle and writhe as it gains access to new organs; this is body horror from our fever dreams and darkest nightmares. It seems real, real enough, and a large number of people believed that the video was legitimate. After making the rounds on Facebook, it was eventually discovered to be content from a science fiction web series — not a promotional video from a medical lab deep in the bowels of some no-name organization.

What does this say about the state of our society? Is it not too far-fetched to believe that someone can grow living organs, link them together, and have the resulting life-form instinctively move around the room? For years we have been influenced by news on advancements in scientific fields such as biomedical and biomolecular engineering. From the infamous WWII Soviet propaganda film Experiments in the Revival of Organisms (1940), where a dog’s head was kept alive independent of a body, all the way up to the famed 1997 Vacanti mouse, with what looks like a human ear on its back, we have been shocked and mystified by the promises of science, especially its perversions. Even today we see cables from the relatively new field of tissue engineering with scientists poring over lab-grown meat cultures to be used as food or refining bioartificial liver devices constructed from animal cells.

Are we going to see this type of work packaged and sold to the consumer in a glossy box anytime soon? I don’t think so. I will admit, it would be incredibly interesting if I could head down to my local Best Buy and pick up Samsung’s new bio-hacking kit so I could grow my own cells and build a life-form as casually as I would order Sea-Monkeys from the back of a comic book. Imagine an organic branch of littleBits, selling you packs of organ and tissue for $99.95. What about a biopunk hacker who wants to grow himself a new eyeball with better night vision? This opens things up to more political and philosophical controversy.

While the video wasn’t real, we may not be lagging too far behind the concept of a modular body, speaking technologically. As the line between fact and fiction flickers and fades, we see the potential for groundbreaking scientific advancements for the human race, and unhinged scientific experiments stemming from the simple question, “What if?”

Our world may not be ready for Oscar.

Not yet.


Hyperboria 101 – Moving Through The Mesh

This article was originally written for and published at N-O-D-E on February 14th, 2016. It has been posted here for safe keeping.


Hyperboria is a network built as an alternative to the traditional Internet. In simple terms, Hyperboria can be thought of as a darknet, meaning it is running on top of or hidden from the existing Internet (the clearnet). If you have ever used TOR or I2P, it is a similar concept. Unlike the Internet, with thousands of servers you may interact with on a day-to-day basis, access to Hyperboria is restricted in the sense that you need specific software, as well as someone already on the network, to access it. After configuring the client, you connect into the network, providing you with access to each node therein.



Hyperboria isn’t just any alternative network, it’s decentralized. There is no central point of authority, no financial barrier of entry, and no government regulations. Instead, there is a meshnet; peer-to-peer connection with user controlled nodes and connected links. Commonly, mesh networks are seen in wireless communication. Access points are configured to link directly with other access points, creating multiple connections to support the longevity of the network infrastructure and the traffic traveling over it. More connections between nodes within the network is better than less here. With this topology, all nodes are treated equally. This allows networks to be set up inexpensively without the infrastructure needed to run a typical ISP, which usually has user traffic traveling up several gateways or routers owned by other companies.

But what is the goal of the Hyperboria network? With roots in Reddit’s /r/darknetplan, we see that the existing Internet has issues with censorship, government control, anonymity, security, and accessibility. /r/darknetplan has a lofty goal of creating a decentralized alternative to the Internet as we know it through a scalable stack of commodity hardware and open source software. This shifts the infrastructure away from physical devices owned by internet service providers, and instead puts hardware in the hands of the individual. This in itself is a large undertaking, especially considering the physical distance between those interested in joining the network, and the complexities of linking them together.

While the ultimate idea is a worldwide wireless mesh connecting everyone, it won’t happen overnight. In the meantime, physical infrastructure can be put in place by linking peers together over the existing Internet through an overlay network. In time with more participation, wireless coverage between peers will improve to the point where more traffic can flow over direct peer-to-peer wireless connections.


The Hyperboria network relies upon a piece of software called cjdns to connect nodes and route traffic. Cjdns’ project page boasts that it implements “an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.” Essentially, the application will create a tunnel interface on a host computer that acts as any other network interface (like an ethernet or wifi adapter). This is powerful in the way that is allows any existing services you might want to face a network (HTTP server, BitTorrent tracker, etc.) to run as long as that service is already compatible with IPv6. Additionally, cjdns is what is known as a layer 3 protocol, and is agnostic towards how the host connects to peers. It doesn’t matter much if the peer we need to connect to is over the internet or a physical access point across the street.

All traffic over Hyperboria is encrypted end-to-end, stopping eavesdroppers operating rogue nodes. Every node on the network receives a unique IPv6 address, which is derived from that node’s public key after the public/private keypair is generated. This eliminates the need for additional encryption configuration and creates an environment with enough IP addresses for substantial network expansion. As the network grows in size, the quality of routing also improves. With more active nodes, the number of potential routes increases to both mitigate failure and optimize the quickest path from sender to receiver.

Additionally, there are no authorities such as the Internet Assigned Numbers Authority (IANA) who on the Internet control features like address allocation and top level domains. Censorship can easily be diminished. Suppose someone is operating a node hosting content that neighboring nodes find offensive, so they refuse to provide access. As long as that node operator can find at least one person somewhere on the network to peer with, he can continue making his content accessible to the whole network.


One of the main differences between Hyperboria and networks like TOR is how connection to the network is made. Out of the box, running the cjdns client alone will not provide access to anything.

To be able to connect to the network, everyone must find someone to peer with; someone already on Hyperboria. This peer provides the new user with clearnet credentials for his node (an ip address, port number, key, and password) and the new user enters them into his configuration file. If all goes to plan, restarting the client will result in successful connection to the peer, providing the user access to the network.

However, having just one connection to Hyperboria doesn’t create a strong link. Consider what would happen if this node was experiencing an outage or was taken offline completely. The user and anyone connecting to him as an uplink into the network would lose access. Because of this, users are encouraged to find multiple peers near them to connect to.

In theory, everyone on the network should be running their node perpetually. If a user only launched cjdns occasionally, other nodes on the network will not be able to take advantage of routing through the user’s node as needed.

With the peering system, there is no central repository of node information. Nobody has to know anyone’s true identity, or see who is behind a particular node. All of the connections are made through user-to-user trust when establishing a new link. If for any reason a node operator were to become abusive to other nodes on the network, there is nothing stopping neighboring nodes from invalidating the credentials of the abuser, essentially kicking them off of the network. If any potential new node operator seemed malicious, other operators have the right to turn him away.


The most important aspect of growing the Hyperboria network is to build meshlocals in geographically close communities. Consider how people would join Hyperboria without knowing about their local peers. Maybe someone in New York City would connect to someone in Germany, or someone in San Franscisco to someone in Philadelphia. This creates suboptimal linking as the two nodes in each example are geographically distant from each other.

The concept of a meshlocal hopes to combat this problem. Users physically close together are encouraged to form working groups and link their nodes together. Additionally, these users work together to seek new node operators with local outreach to grow the network. Further, meshlocals themselves can coordinate with one another to link together, strengthening regional areas.

Meshlocals can also offer more in-person communication, making it easier to configure wireless infrastructure between local nodes, or organize actions via a meetup. Many meshlocals have gone on to gain active followings in their regions, for example NYC Mesh and Seattle Meshnet.


After connecting to Hyperboria, a user may be at a loss as to what he is able to do. All of these nodes are connected and working together, but what services are offered by the Hyperboria community, for the Hyperboria community? Unlike the traditional Internet, most services on Hyperboria are run non-commercially as a hobby.

For example, Hyperboria hosts Uppit: a Reddit clone, Social Node: a Twitter-like site,and HypeIRC: an IRC network. Some of these services may additionally be available on the clearnet, making access easy for those without a connection to Hyperboria. Others are Hyperboria-only, made specifically and only for the network.

As the network grows, more services are added while some fade away in favor of new ones or disrepair. This is all community coordinated after all; there is nothing to keep a node operator from revoking access to his node on a whim for any reason.


As previously mentioned, the ultimate goal of Hyperboria is to offer a replacement for the traditional Internet, built by the users. As it stands now, Hyperboria has established a core following and will see more widespread adoption as meshlocals continue to grow and support users.

Additionally, we see new strides in the development of cjdns with each passing year. As time has gone on, setup and configuration have becomes simpler for the end-user while compatibility has also improved. The more robust the software becomes, the easier it will be to run and keep running.

We also see the maturation of other related technologies. Wireless routers are becoming more inexpensive with more memory and processing power, suitable for running cjdns directly. We also see the rise of inexpensive, small form factor microcomputers like the Raspberry Pi and Beaglebone Black, allowing anyone to buy a functional, dedicated computer for the price of a small household appliance like an iron or coffee maker. Layer 2 technologies like B.A.T.M.A.N. Advanced are also growing, making easily-configurable wireless mesh networks simple to set up and work cooperatively with the layer 3 cjdns.


Hyperboria is an interesting exercise in mesh networking with an important end goal and exciting construction appealing to network professionals, computer hobbyists, digital activists, and developers alike.

It’ll be interesting to see how Hyperboria grows over the next few years, and if it is indeed able to offer a robust Internet-alternative for all. Until then, we ourselves can get our hands dirty setting up hardware, developing software, and helping others do the same. With any luck, we will be able to watch it grow. One node at a time.





irssi-hilighttxt.pl – An irssi Plugin That SMS Messages You On Hilight

A few months ago after configuring irssi with all the IRC channels I wanted, I ran into the problem of being late to a conversation. Every few days I would check my channels only to see people reaching out to me when I wasn’t around. Sometimes I was able to ping someone to talk, other times the person left and never came back.

I had been using the faithful hilightwin.pl plugin to put all my hilights in a separate window I could monitor. I figured that with my limited knowledge of perl I could rig up something to send me an SMS text message instead of writing the hilight line to a different window in irssi where i may not get to it in time.

Using TextBelt’s free API, I was able to call a curl command from inside perl to send the message triggering my hilight to my mobile phone. It isn’t perfect, as there is some garbled text at the front of the message, but I get the message quickly and I can see not only who sends it but also the channel they are in.

Sensible text messages delivered!

Sensible text messages delivered!

I’ve put the code up on GitHub for anyone to use or improve upon. TextBelt’s API is a little limited in how many messages you can receive in a short period of time (as it should be to prevent abuse) and doesn’t support many carriers outside of the USA, so there is definitely room for improvement if another suitable API was found.

Check it out and let me know what you think!


[WANTED] Language Technology / Electric Word Magazine

Language Technology / Electric Word was a technology magazine running from 1987 to 1990, edied by Louis Rossetto who later went on to start Wired Magazine.

Unfortunately, I can’t find any issues of these publications, and little is available online beyond the Wikipedia page which states:

Electric Word was a bimonthly, English-language magazine published in Amsterdam between 1987 and 1990 that offered eclectic reporting on the translation industry, linguistic technology, and computer culture. Its editor was Louis Rossetto.

The magazine was launched under the title Language Technology by a translation company in Amsterdam, INK International. It was later renamed Electric Word and sold to a small Dutch media company. The magazine was terminated in 1990 due to insufficient revenues.

Electric Word was one of the first magazines published using desktop publishing software. It featured avant-garde graphics by the Dutch graphic designer Max Kisman.

After the failure of Electric Word, Rossetto and his partner Jane Metcalfe moved to San Francisco, California and established Wired Magazine.

Luckily, there is a defunct website located at http://rynne.org/electricword. Though the website is dead, we can see some cached information with the help of the Wayback Machine. Looking at this cached version of the site, https://web.archive.org/web/20100308041827/http://www.rynne.org/electricword, we can see some information about the publication and also note that some issues were released for PDF download. These are: #3, #5, #7, #20.

The PDFs were originally hosted at:


Now long gone, I can find no trace of these PDFs or even any issues online for sale.

Any help or information about locating any issues would be extremely helpful! We’re looking at a lost prototype for Wired magazine.


[WANTED] Chromed Pork Radio

Recently, I’ve been on the hunt for cyberpunk podcasts. Between the sci-fi dramas and current news shows, I found a surprising amount of references to Chromed Pork, an interesting podcast by a group of phone phreaks and hackers that ran for 22 episodes from early 2008 to early 2009.

Chromed Pork seems to have started out as a group of friends on IRC. They came together (originally or later I don’t know) on Binary Revolution, a hacking website which previously ran the popular Binary Revolution Radio show and published its own zine. The radio show has since been merged into Hacker Public Radio, though BinRev is kept alive through forums and IRC. I have been a member of the BinRev forums for 10 years now and missed this show when it first premiered. In 2008, the podcast scene was more immature but still well established. There was an explosion of content and it proved hard to keep up.

Chromed Pork Radio Logo

Chromed Pork Radio Logo

The BinRev forums do have archival posts, and I can find accounts for three hosts of Chromed Pork Radio: Multi-Mode, tacomaster, and Inode. Communication with them seems difficult. The most recent login date for any of these three accounts is 2010, and tacomaster’s email address on his profile returns as unreachable if you try to push to it.

I did a little more digging on Chromed Pork’s old blogspot site which contains old number scans and podcast show notes. I found links to episodes that have since died, apparently hosted on a “mobile-node.net” domain. This domain now points to yet another domain, but I’m not sure of that domain owner’s involvement if any. I’ve reached out to him and still hope to hear back one way or the other, but no word yet. I also found an old Chromed Pork general email address, but this too is deactivated.

Later, I reached out to /u/r3dk1ng on Reddit whom I saw posting about Chromed Pork, and he was able to get me a good amount (15/22) of episodes which I have since put on the Internet Archive here.

For reference, here is a list of the files I am still looking for:


And here is a description of the podcast from the defunct radio.chromedpork.net site:

Chromed Pork Radio is an open information security “podcast”, featuring a variety of security related topics, such Info and Comms Sec, Telephony, Programming, Electronics and Amateur Radio. We do our best to work on an open contribution model, meaning any listener is a potential host. We do not censor our shows but do ask that contributors keep all contributions purely informational or hypothetical. Contributions should consist only of material the contributor is legally entitled to share.
Given our open uncensored model, the views and opinions expressed in this “podcast” are strictly those of the contributor. The contents of this “podcast” are not reviewed or approved by Chromed Pork Media.
If you would like to contribute, or provided feedback please visit our contribute section for details.

My trail has gone cold, and I’m still on the lookout for the remaining episodes or anyone who may have them.


(Re)Hacking a Boxee Box

I recently purchased an Amazon Fire TV Stick and love that it allows the ability to sideload applications like Kodi (I still hate that name, long live XBMC!) for media streaming. I mainly use Samba/SMB shares on my network for my media, with most of my content living on an old WDTV Live Hub. The WDTV Hub works great and is still pretty stable after all of these years (except for a few built-in apps like YouTube, I wish they kept going with updates), and the Fire TV will gladly chug away, playing any video over the network. However, I had the need to have my media stream to a third television and I didn’t want to uproot an existing device and carry it from room to room.

So I needed a third device. I already have a second generation Roku kicking around, but it doesn’t appear to be able to run anything other than the stock software at this time. I also considered a Raspberry Pi and wifi dongle, but this puts the price up to around $50 (which is more than the Fire TV Stick. I do want something cheap). I looked for a less expensive option with older media streamers and found a lot of information about the Boxee Box appliance put out by D-Link in 2008, discontinued in 2011. I first encountered this box in around 2012 when I was tasked to do some reverse engineering on it, but that’s another story. In the time since, a Google TV hacking team figured out they could do simple shell command injection when setting the Box’s host name, which eventually evolved into a group developing Boxee+Hacks, a replacement operating system. Since Boxee+Hacks, other developers have been working on a port of Kodi which you can install onto the Boxee to give you more options and better compatibility over the operating system’s built in features.

After some eBaying, I was able to get a Boxee for around $15, shipping included (Make sure you get model DSM-380!). The item description said that the box already had Boxee+Hacks installed and upgraded to the latest version, so I figured I was on my way to a quick installation of Kodi and could get up and running in minutes.

When I first booted the Boxee and checked out the Boxee+Hacks settings, I noticed that the device only had version 1.4 installed while the latest available was 1.6. The built-in updater did not work anymore, so the box never reported that there was an available Boxee+Hacks update.Navigating the Boxee+Hacks forums was a little cumbersome, but I eventually found the steps I needed to get updated and launch Kodi. I’ve outlined them below to help any other lost travelers out there.

First, though, go through your Boxee settings and clear any thumbnail caches, local file databases, etc. We need all the free space we can get and there will be installation errors if you don’t have enough free space. The installation script we will run later automatically clears the device’s temp directory, but doesn’t remove these cached files.

On the Boxee, go to Settings –> Network –> Servers and enable Windows file sharing.

If you already have Boxee+Hacks, connect the box and your computer to your home network and check the IP address for the box on either the Boxee’s settings page or by checking for a new device on your router’s console.

To make things really easy, telnet to your Boxee on port 2323 using your box’s IP address (Mine is

 telnet 2323

Once there, we need to download and run the installer script.

curl -L http://tinyurl.com/boxeehacks | sh

If you DO NOT have Boxee+Hacks installed already, never fear. On the same Settings –> Network –> Servers page on your Boxee, locate the Hostname filed and enter the following into it.

boxeebox;sh -c 'curl -L tinyurl.com/boxeehacks | sh'

Then, navigate away from the Settings page.

After executing the command through telnet, or through the Boxee settings page, the logo should glow red on the front of the box and you should receive on-screen instructions to perform an installation.

Boxee+Hacks installation screen, from http://boxeed.in/forums/viewtopic.php?f=5&t=1216

Boxee+Hacks installation screen, from boxeed.in forums.

The installation guide works pretty well. Here, you will be prompted to install Kodi in addition to Boxee+Hacks. At this point I chose NOT to install Kodi. From what I read, once you install it though the script, it can be difficult to remove, and I didn’t want to deal with the possibilities of a difficult upgrade.

Instead, I decided to install Kodi on a flash drive. I’ve had a cheap 512MB drive that has been kicking around for close to ten years, and it is perfect for fitting Kodi. To setup the flash drive, I formatted it as FAT32 and labeled the drive as MEDIA. I’m not sure if either of these matter, but this configuration worked for me. I downloaded the latest Kodi release built for Boxee from the boxeebox-xbmc repository (Version KODI_14.2-Git-2015-10-20-880982d-hybrid at the time of this writing) and unzipped it onto my flash drive. Make sure that the all of the Kodi files are in the root directory of the drive, and not within the KODI_14.2-Git-2015-10-20-880982d-hybrid directory you get from extracting the archive.

It might also help to label the drive

It might also help to label the drive

That’s all there is to it, just plug the flash drive into the back of the Boxee and it is good to go. If you leave the flash drive in, whenever you boot the Boxee it will go right into Kodi. Leave it out and it will boot to standard Boxee+Hacks. If you boot into Boxee+Hacks and then want to load up Kodi, just plug in the flash drive and it loads automatically.

This turns a seemingly unassuming and thought-obsolete device into a pretty powerful media center, and is a quick inexpensive solution to streaming your content to yet another television.