leaking in Dekker & Barok 2017


ed Media programme
from 2010–2012, which combined art, design, software,
and theory with support in the philosophy of open source
and prototyping. While there, I was researching aspects of
the networked condition and how it transforms knowledge,
sociality and economics: I wrote research papers on leaking
as a technique of knowledge production, a critique of the
social graph, and on the libertarian values embedded in the
design of digital currencies. I was ready for more practice.
When Aymeric Mansoux, one of the tutors, encouraged me
to develop my then side-project Monoskop into a graduation
work, t


leaking in Elbakyan 2016


have a recent addition to our lineup of speakers that
we'll start off the day with: Alexandra Elbakyan. As many of you know,
Alexandra is a Kazakhstani graduate student, computer programmer, and the
creator of the controversial Sci-Hub site. The New York Times has compared her
to Edward Snowden for leaking information and because she avoids American law,
but Ars Technica has compared her to Aaron Swartz--so a controversial figure.
We thought it was very important to include her in the dialog about open
access because we want, in this symposium series, to include all the different
perspectives on copyr


leaking in Liang 2012


rnal #37 - September 2012

# Shadow Libraries

Over the last few monsoons I lived with the dread that the rain would
eventually find its ways through my leaky terrace roof and destroy my books.
Last August my fears came true when I woke up in the middle of the night to
see my room flooded and water leaking from the roof and through the walls.
Much of the night was spent rescuing the books and shifting them to a dry
room. While timing and speed were essential to the task at hand they were also
the key hazards navigating a slippery floor with books perched till one’s
neck. At the end of the rescue mis


AIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7)

Over the last few monsoons I lived with the dread that the rain would
eventually find its ways through my leaky terrace roof and destroy my books.
Last August my fears came true when I woke up in the middle of the night to
see my room flooded and water leaking from the roof and through the walls.
Much of the night was spent rescuing the books and shifting them to a dry
room. While timing and speed were essential to the task at hand they were also
the key hazards navigating a slippery floor...

Metahaven

## [Captives of the Cloud: Part I](/journal/37/612


leaking in Sollfrank 2018


of the meta library Sci-Hub is Kazakh programmer Alexandra
Elbakyan, who has been sued by large publishing houses and was convicted twice
to pay almost 20 million US$ in compensation for the losses her activities
allegedly have caused, which is why she had to go underground in Russia. For
illegally leaking millions of documents the _New York Times_ compared her to
Edward Snowden in 2016: “While she didn’t reveal state secrets, she took a
stand for the public’s right to know by providing free online access to just
about every scientific paper ever published, ranging from acoustics to
zymology.”


leaking in Stalder 2018


he most
famous platform for this is WikiLeaks, which since 2006 has attracted
international attention to this method with dozens of spectacular
publications -- on corruption scandals, abuses of authority, corporate
malfeasance, environmental damage, and war crimes. As a form of
resistance, however, leaking entire databases is not limited to just one
platform. In recent years and through a variety of channels, large
amounts of data (from banks and accounting firms, for instance) have
been made public or have been handed over to tax investigators by
insiders. Thus, in 2014, for instance, the *Süddeutsc


this information, for even the most secret
databases have to be maintained by someone, and this also involves
copying data. Thus, it is far easier today than it was just a few
decades ago to smuggle large volumes of data out of an
institution.[^65^](#c3-note-0065){#c3-note-0065a}

This new form of leaking, however, did not become an important method of
resistance on account of technical developments alone. In the era of big
data, databases are the central resource not only for analyzing how the
world is described by digital communication, but also for generating
that communication. The power of netwo


leaking in Weinmayr 2019


elf: Some
Feminist Lessons for Copyright Law’, American University Journal of Gender,
Social Policy & the Law 15.2, 207–68.

Di Franco, Karen (2014) ‘The Library Medium’, in Andrea Francke and Eva
Weinmayr (eds.), Borrowing, Poaching, Plagiarising, Pirating, Stealing,
Gleaning, Referencing, Leaking, Copying, Imitating, Adapting, Faking,
Paraphrasing, Quoting, Reproducing, Using, Counterfeiting, Repeating,
Translating, Cloning (London: AND Publishing), pp. 77–90.

Fitzpatrick, Kathleen (2018) ‘Generous Thinking The University and the Public
Good’, Humanities Commons,


with anything like “cultural piracy”. They are, through
usership, enriching what would otherwise fall prey to cultural piracy.’ Email
to the author, 1 August 2012.

See also: Andrea Francke and Eva Weinmayr (eds.), Borrowing, Poaching,
Plagiarising, Pirating, Stealing, Gleaning, Referencing, Leaking, Copying,
Imitating, Adapting, Faking, Paraphrasing, Quoting, Reproducing, Using,
Counterfeiting, Repeating, Translating, Cloning (London: AND Publishing,
2014).

[83](ch11.xhtml#footnote-443-backlink) Richard Prince’s ‘Catcher in the Rye’
forms part of the Piracy Collection. Not the book copy

 

Display 200 300 400 500 600 700 800 900 1000 ALL characters around the word.