Metaviews: Future of Authority
Subscribe
Sign in
Home
Notes
Hacking
Authoritarianism
Commons
Archive
Leaderboard
About
Hacking
Latest
Top
Discussions
245: Are Today’s Militaries Able to Fight Today’s Wars?
Not without new leadership, culture, and structure
Nov 8
•
Jesse Hirsh
6
1
214: Sovereignty Is a Simulation
What the Chinese hack of Russia reveals about the myths modern states still tell themselves
Jul 7
•
Jesse Hirsh
7
1
196: Jailbreaking Tesla
The Autonomous Revolution After Musk
Jun 8
•
Jesse Hirsh
8
185: Dead Drops in the Chatbox
Spycraft, smuggling, sabotage—encoded not in ciphertext, but in small talk.
May 22
•
Jesse Hirsh
12
4
183: The Algorithm Does Not Exist
Radical emancipation through collective struggle.
May 20
•
Jesse Hirsh
13
5
155: Reprogramming Sovereignty
Hacker Democracy Meets Indigenous Resurgence
Apr 14
•
Jesse Hirsh
13
3
146: Free Aubrey Cottle!
Hacktivism Is Civil Disobedience
Apr 4
•
Jesse Hirsh
13
3
135: Canada's Future as a Hacker Democracy
An Ecology of Mind for the 21st Century
Mar 19
•
Jesse Hirsh
17
3
127: The End of the Five Eyes
OSINT is the Future
Mar 11
•
Jesse Hirsh
13
113: Lazarus Group: Hacking for the Regime
How North Korea’s Elite Hackers Stole $1.5 Billion
Feb 23
•
Jesse Hirsh
6
1
105: Are We About to Be FUCT?
A Libertarian Fever Dream Meets AI-Driven Governance
Feb 15
•
Jesse Hirsh
13
3
101: The Back Door State: Who Really Controls Digital Infrastructure?
The Rise of the Hacker Class in Government
Feb 11
•
Jesse Hirsh
3
1
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts