Difference between revisions of "Main Page"

From Networked Mortality
Jump to: navigation, search
m
(Dealing with Data)
 
(44 intermediate revisions by 3 users not shown)
Line 1: Line 1:
<br><br>вот здесь, [http://lovinjewmag.com/biznes-kredit-moskva.php http://lovinjewmag.com/biznes-kredit-moskva.php]. Кредитная карта МТС Деньги 2013-02-26 Банковские кредитные карты пользуются все возрастающей популярностью у рядовых потребителей. С нед[http://www.britannica.com/search?query=%D0%B0%D0%B2%D0%BD%D0%B5%D0%B3%D0%BE авнего] времени МТС Банк начал выпуск новой кредитной карты, получить которую можно в любом салоне сети МТС.<br><br>Карты выпускаются в платежной системе MasterCard, являющейся одним из лидеров отечественного и европейского рынка. МТС Деньги –  это кредитная карта, по которой сумма доступного лимита для ее держателя может составлять до 600 тысяч рублей. Дополнительным плюсом для держателей карты является возможность участия в бонусной программе накопления баллов, которые могут использоваться для пополнения счета или иные услуги мобильного оператора МТС.<br><br>Уже при оформлении кредитки каждый клиент получает в качестве подарка 3 тысячи баллов МТС. Оформить карту МТС Деньги может каждый клиент салонов связи. В большинстве случаев оформление кредитки осуществляется только по предъявлению паспорта гражданина.<br><br>Неименная карта МТС Деньги выдается клиенту в течение нескольких минут прямо в салоне. Лимит по такой карте составляет 40 тысяч рублей. Для получения именного пластика необходимо подождать 1-2 суток и предоставить подтверждение уровня платежеспособности. Расчет кредитной картой можно осуществлять сразу же после активации продукта.<br><br>Оплата с ее помощью принимается за любой товар салона сотовой связи, а также за товары и услуги в торговых точках, как на территории России, так и за рубежом. Начисление бонусов происходит в автоматическом режиме, за каждые потраченные 30 рублей с карты на бонусный счет поступает 1 балл.<br><br>Кредитная карта МТС банка обеспечивает своим держателям удобную возможность использования интернет и мобильного банкинга. В случае необходимости клиентом сервиса может подключаться услуга автоматического пополнения счета мобильного телефона. Отзывы о кредитной карте МТС Деньги Вы можете оставлять в комментариях.<br><br>Кредитная карта МТС Деньги - СМС банк Кредитный лимит до 600&thinsp;000 рублей; Процентная ставка от 23% годовых; Предоставляется с 18 лет. Как узнать остаток на счёте Кредитная карта, независимо каким банком выпущенная, имеет существенное неудобство в виде уточнения доступного остатка.<br><br>Как вариант, можно обратиться в банк, позвонив по горячей линии и узнать баланс. Но порой, ответ оператора заставляет ждать около десяти минут, а для сообщения доступного остатка нужно предоставить паспортные данные, которых под рукой нет. Наличие поблизости банкомата не решает проблему, поскольку кредитная карта содержит определённый кредитный лимит, одобренный банком, а банкомат может отобразить только остаток собственных средств на счёте.<br><br><br>\ոСитуация решается банально просто. Нужно ввести в банкомате сумму на выдачу, заведомо превышающую сумму кредитного лимита. В операции по снятию наличных будет отказано, а на мобильный телефон придёт информация о сумме незавершённой транзакции и об остатке на счёте.<br><br>Если СМС информирование не подключено, то для уточнения баланса ничего не остаётся как звонить в банк, а клиенты программы от МТС деньги могут воспользоваться информационной услугой от МТС &ndash; СМС банк. Использование услуги МТС деньги - СМС банк Кредитная карта МТС деньги (тарифы на обслуживание и условия оформления ) позволяет узнать состояние счёта в режиме реального времени, посредством отправляемых СМС запросов, а так же: Справки о доступном платёжном лимите Мини &ndash; выписки Справки о статусе Информацию о зарегистрированных услугах Уведомления об успешных авторизациях Информацию о зачисл[http://Photobucket.com/images/%D0%B5%D0%BD%D0%B8%D0%B8 ении] средств Запросы направляются в виде СМС сообщений на номер +7 (916) 777 333 1.<br><br>Стоимость СМС зависит от оператора и его тарифного плана (как обычное СМС). Нужно помнить, что запросы необходимо отправлять, непосредственно с номера телефона, который был указан при оформлении договора на кредит. Банк онлайн подключается бесплатно, впоследствии оплата составляет 30р.<br><br>в месяц. Кредитная карта МТС деньги предоставляет достаточно информационный и удобный сервис для получения информации о состоянии счёта. СМС запросы для использования услуги СМС банк. Кредитная карта МТС Деньги Вскоре после открытия широкой сети салонов крупнейшая российская компания связи заимела собственный банк.<br><br>И где-то с февраля 2012-го начала эмитироваться кредитная карта МТС Деньги. Практически сразу же после переименования Московского банка реконструкции и развития. Нужно отметить, что с самого начала упомянутый банковский продукт стал одним из самых доходных в продуктовой линейке эмитента.<br><br>В настоящее время выпускаются следующие варианты карт: с льготным периодом и лимитом на уровне 40 000 рублей; Gold; с лимитом более 40-ка тысяч рублей; с лимитом 5 000 рублей. Но как оформить кредитную карту МТС Деньги? Для получения одной из перечисленных разновидностей &laquo;пластика&raquo; требуется предоставить только лишь гражданский паспорт.<br><br>Правда, для карты с лимитом более 40 000 рублей кредитор затребует и справку, подтверждающую уровень официальных доходов. Примечательно, что процент за пользование средствами во всех четырех случаях одинаков: 23%-55% годовых. Как и льготный период, размер которого &mdash; 50 дней.<br><br>Любая из карт выдается клиенту в день его обращения. Подробный анализ кредитной карты Прежде, чем заявка на кредитную карту МТС будет подана, нужно очень внимательно ознакомиться с особенностями этого продукта. Во-первых, следует понимать, что &laquo;пластик&raquo;, о котором идет речь, одновременно является и кредитным, и дебетовым.<br><br>То есть, если клиент сохраняет кредитный лимит в целости и сохранности, а также пополняет карту собственными средствами, то на остаток последних ему начисляется дополнительный доход в размере 5% годовых. Будем честны, подобная ставка весьма приятна.<br><br>Особенно для карточного счета. За каждые тридцать рублей, потраченные клиентом в ходе оплаты товаров и услуг, он получает определенное количество баллов от МТС. Кстати, это чистой воды плагиат: иностранные банковские учреждения аналогичным образом стимулируют своих клиентов к тратам при помощи &laquo;пластика&raquo;.<br><br>Российские же держатели имеют право потратить полученные бонусы либо в салонах МТС, либо партнеров компании. Выше было сказано о карте с лимитом более 40 000 рублей. Верхняя его граница четко не регламентирована, так как зависит от информации, содержащейся в справке 2-НДФЛ, которую приносит держатель.<br><br>Или не приносит, если такой размер лимита его устраивает.
+
'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''
 +
 
 +
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].
 +
 
 +
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help].
 +
 
 +
==Digital artifacts==
 +
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:
 +
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.
 +
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.
 +
You '''need to tell people where your physical will is.'''
 +
 
 +
===Passwords and online accounts===
 +
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.
 +
 
 +
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].
 +
 
 +
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!
 +
 
 +
===Heir Rights and Digital Property===
 +
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics
 +
 
 +
==A more individualized way to notify folk==
 +
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.
 +
 
 +
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].
 +
 
 +
==Failure Modes==
 +
===Control Systems are Delicate===
 +
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a "hey how does this work?", triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a "can you trust the message that triggered this?" prompt.
 +
 
 +
===Threat Model===
 +
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a "threat model." What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as "more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory]." Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.
 +
 
 +
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:
 +
====[[Death Drill|Yearly Test]]====
 +
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.
 +
 
 +
==[[Open Source Cadavers|A body]]==
 +
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.
 +
 
 +
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.
 +
 
 +
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.
 +
 
 +
===[[Historical examples of how corpses are handled]]===
 +
 
 +
===Pledge to donate===
 +
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.
 +
 
 +
==Completion==
 +
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.
 +
 
 +
=Other Awesome Groups, Writeups, Etc=
 +
==Relevant Writeups and Comics==
 +
* [http://digitalpublic.io/drafts/reading Digital Public's reading list], covering fiduciary law, intellectual property, trust law, corporate governance, + data law.
 +
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ "Death and the Social Network: the Persistence of Digital Identity"], in collaboration with Facebook
 +
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]
 +
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]
 +
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]
 +
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]
 +
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]
 +
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]
 +
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]
 +
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]
 +
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]
 +
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]
 +
* [https://docs.google.com/document/d/1p-oBHuHbUcWneWZLlZcw_fphQ2NBleKVAmNjF7uGBEE/edit Digital Death syllabus]
 +
 
 +
==Rad External Goings On==
 +
===Digital Commemoration===
 +
* [http://timenesia.org Timenesia]
 +
* [https://github.com/fin/memorial-page Memorial Page]
 +
 
 +
===Dealing with Data===
 +
* [http://digitalpublic.io/ Digital Public]
 +
* [http://www.thedigitalbeyond.com/ The Digital Beyond]
 +
* [http://getyourshittogether.org/ Get Your Shit Together]
 +
* [http://get.digi.me DigiMe]
 +
 
 +
===Bodies===
 +
* [http://www.personalgenomes.org/ Personal Genome Project]
 +
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]
 +
 
 +
===Events and Groups===
 +
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]
 +
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death & Society]
 +
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]
 +
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]
 +
 
 +
==Mentions of note==
 +
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]
 +
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]
 +
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]
 +
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]
 +
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]
 +
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]
 +
 
 +
==Get Involved==
 +
* Jump on the FAQ and start to answer some questions
 +
* Edit this wiki
 +
* Other general [[To Dos]]

Latest revision as of 07:53, 12 August 2017

Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.

Components are divided up into documents, accounts, notifications, and people. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in one place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also what other people might want or need.

It should be possible to speak about death without fear. If you are in danger of harming yourself, please say as such directly, and get help.

Digital artifacts

Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:

I devise, bequeath, and give my technology to my relationship, name. If name is unable or unwilling to accept, I bequeath the technology to my relationship, second name.
I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my relationship, name. If name is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my relationship, second name.

You need to tell people where your physical will is.

Passwords and online accounts

Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in secret sharing and this writeup from Cory Doctrow. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.

The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with accounts.

But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!

Heir Rights and Digital Property

A more individualized way to notify folk

The mailing list might include both people who simply need to know as well as those who have agreed to take on certain responsibilities at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.

Send each of these people a request for involvement, and then (if they agree to be on the list) instructions on how to use mailing lists in general and this one specifically. Then set up an auto-responder to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in the template section of the wiki.

Failure Modes

Control Systems are Delicate

This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a "hey how does this work?", triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the Mailing List Auto Response template is a "can you trust the message that triggered this?" prompt.

Threat Model

In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a "threat model." What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as "more Murphy, less Mallory." Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people do need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.

Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in mitigation and fall-backs into the structure of this control system. Here's one example:

Yearly Test

Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.

A body

Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.

Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a Henrietta Lacks. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.

This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.

Historical examples of how corpses are handled

Pledge to donate

Be a part of open source cadavers by pledging to donate your body. As the list grows, more attention will be paid to this as a viable model.

Completion

Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means doing it. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.

Other Awesome Groups, Writeups, Etc

Relevant Writeups and Comics

Rad External Goings On

Digital Commemoration

Dealing with Data

Bodies

Events and Groups

Mentions of note

Get Involved

  • Jump on the FAQ and start to answer some questions
  • Edit this wiki
  • Other general To Dos