There is no justice in following unjust laws. It's time to come into
the light and, in the grand tradition of civil disobedience, declare
our opposition to this private theft of public culture.
2. Welcome changing requirements, even late in development. Agile
processes harness change for the customer's competitive advantage.
Using Sweden as a template for numbers, assuming that these numbers
are similar across other European countries with Pirate Parties, there
are 300k university students. 100k votes are needed to get into the
European Parliament. This means that we would need 33% of the votes of
the university students, which is not a realistic number. Therefore,
we must regard universities all across Europe as a recruiting ground for
activists and ambassadors, who recruit voters in their turn. For example,
there are another 125k 18-year-olds not yet in university, but who usually
have friends there. There are friends, relatives, and social circles.
Governments derive their just powers from the consent of the governed. You
have neither solicited nor received ours. We did not invite you. You do
not know us, nor do you know our world. Cyberspace does not lie within
your borders. Do not think that you can build it, as though it were a
public construction project. You cannot. It is an act of nature and it
grows itself through our collective actions.
I am a Hacker, enter my world....
In the seminal essay ‘The Californian Ideology’, Barbrook and Cameron
effectively pointed out how the development of an Internet economy is
far from being a purely economic and technological shift. It is entwined
with ideological statements that have been the basis for a new kind of
liberalism, one that puts the individual, and a certain idea of personal
freedom, at its centre.
We come to you from the years of the Web’s beginning. We have grown
old together on the Internet. Time is short.
Surrendering privacy and other rights in this way may seem to many people
a trivial thing and a small price to pay for the sake of convenience
that these Internet services bring.
11. Destruction is a variant of done.
21. Unlike a medium, you and I leave our fingerprints, and sometimes
bite marks, on the messages we pass. We tell people why we’re sending
it. We argue with it. We add a joke. We chop off the part we don’t
like. We make these messages our own.
9. The Critical Engineer notes that written code expands into social
and psychological realms, regulating behaviour between people and the
machines they interact with. By understanding this, the Critical Engineer
seeks to reconstruct user-constraints and social action through means
of digital excavation.
Secondly, Post Fail also signifies that our art should be understood as
taking place after acknowledging the failure of many of the post-whatever
theories of the last decades. Many of the discourses that have been trying
to make sense of contemporary art through a post-whatever condition,
that we should all allegedly be sharing, have been hiding many of the
contradictions and complexities of the present moment, of the when and
where of their formulation. We want to investigate the complexities of
the present more than anything else, including our own involvement in
the production of discourses about such notion of the present. We find
it difficult not to consider that what we do happens in a specific time,
and that even if we talk about the future or the past we always do it from
a specific temporal, cultural and geographical context. Post Fail means,
as it will be argued, acknowledging the temporality of enunciation and
the bodies it solicits and involves.