{"id":1976,"date":"2024-01-31T11:43:00","date_gmt":"2024-01-31T11:43:00","guid":{"rendered":"https:\/\/blog.nitteknalogik.net\/?p=1976"},"modified":"2025-02-04T09:28:38","modified_gmt":"2025-02-04T09:28:38","slug":"ciberactivismo-sobre-usos-politicos-y-sociales-de-la-red","status":"publish","type":"post","link":"https:\/\/blog.nitteknalogik.net\/en\/ciberactivismo-sobre-usos-politicos-y-sociales-de-la-red\/","title":{"rendered":"Cyberactivism. On political and social uses of the net"},"content":{"rendered":"\n<p>In 2006, <em><strong><a href=\"https:\/\/viruseditorial.net\/ca\/libreria\/ciberactivismo\/\">Ciberactivismo. Sobre usos pol\u00edticos y sociales de la red<\/a><\/strong><\/em>, a book that brings together different texts compiled and written expressly for this book, carried out by ROE (Reuni\u00f3n de Ovejas Electr\u00f3nicas) published by Virus and edited by Jordi Claramonte and Carolina Garc\u00eda.<br>This work is the continuation of the already mythical <em><a href=\"https:\/\/archive.org\/details\/guerrilladelacomunicacion\">Manual de guerrilla de la Comunicaci\u00f3n<\/a><\/em> which for years has been a reference for thousands of cyberwarriors.<br>We decided to make this compilation because the whole cyberactivist sphere was very active and introduced hacktivism in Spain, and what better than the protagonists themselves telling the story.<br>So this volume features a dozen activists with works on counter-information, hacktivism, free software, wireless networks, P2P, viral activism and electronic civil disobedience. More than three hundred pages with texts by \u2018 Stefan Wray, from the \u201c Critical Art Ensemble, \u201d Txipi, \u201c Xabier Barandiar\u00e1n, Manuel Campos, Eric Raymond, \u201d Sara L\u00f3pez, \u201c Gustavo Roig, Merc\u00e9 Molist (who interviews \u201d Ricardo Dom\u00ednguez), Enrique Mat\u00edas S\u00e1nchez, Raquel Mezquita \u201c Del tam-tam al doble click \u201d is the first of the fourteen articles that make up the book.<br>Published under <a href=\"https:\/\/www.gnu.org\/licenses\/copyleft.en.html\">copyleft<\/a> license and which, almost 20 years later, represents a small piece of the history of hacktivism in Spain.<\/p>\n\n\n\n<p><a href=\"https:\/\/blog.nitteknalogik.net\/wp-content\/uploads\/2025\/02\/virus-ciberactivismo-sobre_usos_politicos_y_sociales_de_la_red.pdf\">Download PDF (ES)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2006, Ciberactivismo. Sobre usos pol\u00edticos y sociales de la red, a book that brings together different texts compiled and written expressly for this book, carried out by ROE (Reuni\u00f3n de Ovejas Electr\u00f3nicas) published by Virus and edited by Jordi Claramonte and Carolina Garc\u00eda.This work is the continuation of the already mythical Manual de guerrilla de la Comunicaci\u00f3n which for [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1977,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-1976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications"],"translation":{"provider":"WPGlobus","version":"3.0.1","language":"en","enabled_languages":["fr","en","es"],"languages":{"fr":{"title":true,"content":true,"excerpt":false},"en":{"title":true,"content":true,"excerpt":false},"es":{"title":true,"content":true,"excerpt":false}}},"jetpack_featured_media_url":"https:\/\/blog.nitteknalogik.net\/wp-content\/uploads\/2025\/01\/ciberactivismo.gif","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/posts\/1976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/comments?post=1976"}],"version-history":[{"count":10,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/posts\/1976\/revisions"}],"predecessor-version":[{"id":1992,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/posts\/1976\/revisions\/1992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/media\/1977"}],"wp:attachment":[{"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/media?parent=1976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/categories?post=1976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.nitteknalogik.net\/en\/wp-json\/wp\/v2\/tags?post=1976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}