e-limbo, e-zine de informacion y analasis de modos de vida actual
21.04.2018 / Sesión no Iniciada 

 _enviar articulo

e-mail emisor
e-mail receptor
Ayúdanos a evitar contactos automáticos
Anti Spam

En estos tiempos de hipercomunicación bastaría la invitación de enviar a un amigo cualquiera de los textos que consideres interesantes algo redundante: demasiada comunicación, demasiados textos y , en general, demasiado de todo.
Es posible que estemos de acuerdo... pero cuando encuentras algo interesante en cualquier sitio, la red, la calle, tu casa, o un lugar escondido y remoto, compartirlo no sólo es un acto (acción, hecho) de amistad o altruismo, también es una manera de ahorrar tiempo a los demás (y de que te lo ahorren a ti (si eres afortunado) a costa del tiempo que tu has podido derrochar (emplear) y el gustazo de mostrar que estuviste ahí (o donde fuera ) un poco antes (el tiempo ya no es más el que era).
Comparte con tus conocidos aquello que encuentras, es evolución.
 The new information ecosystem 
18-02-07 opendemocracy.net  


Siva Vaidhyanathan, author of the forthcoming The Anarchist in the Library and a true scholar of the internet age, presents a compelling, five-part panorama of the implications of electronic peer-to-peer networks for culture, science, security, and globalisation.

His provocative argument registers peer-to-peer as a key site of contest over freedom and control of information.

Part 1: It's a peer-to-peer world (here in limbo 4AY)
In the first of his five-part series, Siva Vaidhyanathan maps the fluid new territory of electronic peer-to-peer networks that are transforming the information ecosystem. Is this a landscape of enlarging freedoms where citizens shape the forms and meanings of social communication, or does it offer an invitation to entrenching state surveillance and closure?

Part 2: 'Pro-gumbo': culture as anarchy
Peer-to-peer technologies have precedents in the anarchistic and hybrid processes by which cultures have always been formed. Decoding anxious cultural preservationists from Matthew Arnold to Samuel Huntington, the second instalment of Siva Vaidhyanathan's five-part series reframes p2p in the light of other technologies and practices – cassettes, creolisation, world music – which likewise reveal the energetic promiscuity of culture. Any attempt to censor or limit this flow would leave cultures stagnant.

Part 3: The anarchy and oligarchy of science
Science is knowledge in pursuit of truth that can expand human betterment. But part three of Siva Vaidhyanathan's powerful series sees the free information flows at the heart of science being pressured by the copyright economy, the post-9/11 security environment, proprietary capture of genetic databases, and science policies of governments and universities. If commerce and control defeat openness and accumulation, what happens to science impacts on democracy itself.

Part 4: The nation-state vs. networks
In the last decade, the nation-state has survived three challenges to its hegemony – from the Washington Consensus, the California Ideology, and Anarchy. The promise of a borderless globalisation unified by markets and new technology has been buried. The fourth part of Siva Vaidhyanathan's compelling series asks: what then remains of the utopian vision of global peer-to-peer networks that would bypass traditional structures of power?

Part 5: Networks of power and freedom
The use by non-state networks of new communication technologies is challenging ideas about citizenship, security, and the nation-state. In response, the impulse to restrict or suppress is shared by states as different as the United States and the People's Republic of China. In concluding his five-part openDemocracy series, Siva Vaidhyanathan maps an issue that will define the landscape of 21st century politics.

Here we have for all of you the full part one... the entire 5 parts are able to be read at OPEN DEMOCRACY...  & don't give up the fight

Part 1: It's a peer-to-peer world

by Siva Vaidhyanathan

visit the SV's Blog SIVACRACY.NET

The rise of electronic peer-to-peer networks has thrown global entertainment industries into panic mode. They have been clamouring for more expansive controls over personal computers and corporate and university networks. They have proposed radical re-engineering of basic and generally open communicative technologies. And they have complained quite loudly – often with specious data and harsh tones that have had counterproductive public relations results – about the extent of their plight.

But the future of entertainment is only a small part of the story. In many areas of communication, social relations, cultural regulation, and political activity, peer-to-peer models of communication have grown in influence and altered the terms of exchange.

What is at stake?

This is the story of clashing ideologies: information anarchy and information oligarchy. They feed off of each other dialectically. Oligarchy justifies itself through "moral panics" over the potential effects of anarchy. And anarchy justifies itself by reacting to the trends toward oligarchy.

The actors who are promoting information anarchy include libertarians, librarians, hackers, terrorists, religious zealots, and anti-globalisation activists. The actors who push information oligarchy include major transnational corporations, the World Trade Organisation, and the governments of the United States of America and the Peoples' Republic of China.

Rapidly, these ideologies are remaking our information ecosystem. And those of us uncomfortable with either vision, and who value what we might call "information justice", increasingly find fault and frustration with the ways our media, cultural, information and political systems are changing.

The most interesting thing about these challenges and battles is that we can observe how ideologies alter our worlds. Ideologies are, to use a phrase from Pierre Bourdieu, "structuring structures". Ideologies are lenses, ways of thinking and seeing, that guide our perceptions and habits. They are permeable and malleable. They are not determinative. But they make a difference in the judgments we make and the habits we develop.

In recent years we have seen the rise of anarchy as a relevant ideology in many areas of life. Our ideologies affect the technologies we choose to adopt. And using certain technologies can alter our ideologies. Anarchy is not just a function of small political groups and marginal information technologies any more. Anarchy matters.

This is more than a battle of ideologies. It is also the story of specific battles. There are dozens of examples of recent and current conflicts that arose out of efforts to control the flows of information:

  • The story of the "Locust Man," an imprisoned dissident democratic activist in China who distributed political messages by attaching them to the backs of locusts.

  • The ordeal of the public library in Arlington, Virginia, at which two of the hijackers of 11 September 2001 used public terminals in the days preceding their attack. An increasing number of American librarians have had to endure federal law enforcement agencies asking them to violate their code of ethics and their patrons' privacy since this incident.

  • The controversy over the complaint that some Canadian women can no longer get tested for genes that indicate a predisposition for breast cancer because an American company has patented those genes and charges too much for the test.

Through such incidents, we can examine the following issues:

  • The battle to control democratic sources of information such as public libraries, which are suddenly considered dens of terrorism and pornography. Libraries are under attack through technological mandates and legal restrictions.

  • Efforts to radically re-engineer the personal computers and networks to eliminate the very power and adaptability that makes these machines valuable.

  • The cultural implications of allowing fans and creators worldwide sample cultural products at no marginal costs through peer-to-peer computer networks.

  • Futile attempts to restrict the use and distribution of powerful encryption technology out of fear that criminals and terrorists will evade surveillance.

  • Commercial and governmental efforts to regulate science and mathematics, including control over the human genome.

  • Attempts to stifle the activities of political dissidents and religious groups.

  • The information policy implications of recent United States policies including the USA Patriot Act, Total Information Awareness, and the Department of Homeland Security.

This essay is the first of a series for openDemocracy that will consider these battles for control of information. This introductory piece will examine the proliferation of peer-to-peer systems.

The nature of peer-to-peer

Peer-to-peer electronic networks such as Napster, KaZaa, and Gnutella, solve two communicative problems and create two more.

The first problem is somewhat trivial. Where do we find a convenient index to files on other people's hard drives? Or, in the case of Napster founder Sean Fanning, a Boston-area university student, how can I find music on other people's computers without asking them to expose themselves to threats by copyright holders?

The second problem is more substantial. How do we exploit two of the great underused resources of the digital age: surplus storage space and surplus processing power? More significantly, how do we do this in a way that is effectively anonymous and simple?

Fundamentally, peer-to-peer file-sharing systems such as KaZaa, Gnutella, Freenet, and the dearly-departed Napster attempt to recapture or at least simulate the structure and function of the original internet, when all clients were servers and all servers were clients.

This original vision of the internet, call it Internet 1.0, arose in the 1970s and devolved around 1994 with the rise of ISPs and dynamic Internet Protocol (IP) numbers. The handful of netizens of Internet 1.0 worked with mainframe computers linked to each other through the Domain Name System (DNS), which helped direct packets of data to the proper destination. Each sender and each destination had a discreet and constant IP number that identified it to the network hubs.

But as Internet Service Providers (ISPs) proliferated in the mid-1990s and connected millions of personal computers to networks for only several minutes or hours at a time, it became clear that rotating and re-using IP numbers would allow many more users to share the internet.

Thus began Internet 2.0, in which increasingly personal computers allowed their users to receive and consume information, but allowed limited ability to donate to the system. This extension of the network cut off personal computers from the server business. Most users donated information only through e-mail. And it became clear that while the internet once seemed like a grand bazaar of homemade goods and interesting (albeit often frightening) texts generated through community dynamics, it would soon seem more like a shopping mall than a library or bazaar.

Two new problems

Peer-to-peer file-sharing technology is a set of protocols that allow users to open up part of their private content to public inspection, and thus, copying. In the digital world, one cannot access a file without making a copy of it. From this fact arose the first peer-to-peer problem: there is no way to enforce scarcity on these systems. The popularity and common uses of these protocols produce massive anxiety within the industries that rely on artificial scarcity to generate market predictability.

The second problem is less well understood because there is no special interest constituency complaining about it. So states have stepped up to take the lead in confronting it. That problem is irresponsibility. Because most of what happens over peer-to-peer networks is relatively anonymous, servers and clients are not responsible for the ramifications of their communicative acts. Using widely available forms of encryption or networks that assure privacy, one may traffic in illicit material such as child pornography with almost no fear. In many places in the world, the availability of adult pornography or racist speech through peer-to-peer systems undermines a decade of efforts to cleanse the more visible and therefore vulnerable World Wide Web.

This second problem is actually a solution to another communicative problem that exists primarily in illiberal communicative contexts. Many of the same states that hope to quash pornography also want to quash the speech and organisational communications of democratic activists. So the very existence of these communicative technologies creates moral panics throughout the illiberal world as well as the liberal world. While some worry about the erosion of commerce, others worry about the erosion of power. And the same technologies that liberal societies would use to protect commerce might find more effective uses in Burma or China.

Listening to Napster

But most of the popular discussion about the rise and effects of peer-to-peer technology has read like a sports story: who is winning and who is losing? Some has read like a crime story: how do we stop this thievery? I am more interested in looking at peer-to-peer communication in its most general sense. How do we explain the peer-to-peer phenomenon? How do we get beyond the sports story or the crime story?

Peer-to-peer communication is unmediated, uncensorable, and virtually direct. It might occur between two computers sitting on different continents. It might occur across a fence in a neighborhood in Harare, Zimbabwe. What we are hearing when we listen to peer-to-peer systems are "bruits publics", or public noises – not the reasonable, responsible give and take of the bourgeois public sphere.

This is very old. What we call 'p2p' communicative networks actually reflect and amplify – revise and extend – an old ideology or cultural habit. Electronic peer-to-peer systems like Gnutella merely simulates other, more familiar forms of unmediated, uncensorable, irresponsible, troublesome speech; for example, anti-royal gossip before the French Revolution, trading cassette tapes among youth subcultures such as punk or rap, or the distribution of illicit Islamist cassette tapes through the streets and bazaars of Cairo.

Certain sectors of modern society have evolved with and through the ideology of peer-to-peer. Academic culture and science rely on an ideal of raw, open criticism: peer-to-peer review, one might call it. The difference, of course, is that academia and science generally require a licensing procedure to achieve admission to the system. The Free Software movement is the best example of what legal theorist Yochai Benkler calls "peer production", but what we might as well, for the sake of cuteness and consistency, call "peer-to-peer production".

This form of speech has value. But it has different value in different contexts. And while peer-to-peer communication has an ancient and important, although under-documented, role, we are clearly seeing both an amplification and a globalisation of these processes.

That means that what used to occur only across fences or on park benches now happens between and among members of the Chinese diaspora who might be in Vancouver and Singapore, Shanghai and Barcelona. As cultural groups disperse and reify their identities, they rely more and more on the portable elements of their collective culture which are widely available through electronic means.

The clampdown strategy

Several technological innovations have enabled this amplification and globalisation of peer-to-peer communication:

  • The protocols that makeup the internet (i.e. TCP/IP) and the relative openness of networks that make up the internet.
  • The modularity, customisability, portability, and inexpense of the personal computer.
  • The openness, customisability, and insecurity of the major personal computer operating systems.
  • The openness, insecurity, and portability of the digital content itself.

Understandably, states and corporations that wish to impede peer-to-peer communication have been focusing on these factors. These are, of course, the very characteristics of computers and the internet that have driven this remarkable – almost revolutionary – adoption of them in the past decade.

These are the sites of the battle. States and media corporations wish to:

  • Monitor and regulate every detail of communication and shift liability and regulatory responsibility to the Internet Service Providers.
  • Redesign the protocols that run the internet.
  • Neuter the customisability of the personal computer and other digital devices.
  • Impose "security" on the operating systems so that they might enable "trust" between a content company and its otherwise untrustworthy users.

These efforts involve both public and private intervention, standard setting by states and private actors. The United States Congress, the Federal Communication Commission, the Motion Picture Association of America, Microsoft and Intel have all been involved in efforts to radically redesign our communicative technologies along these lines. And they are appealing for complementary legal and technical interventions by the European Union and the World Trade Organisation.

These moves would create Internet 3.0, although it would not actually look like the internet at all. It would not be open and customisable. Content – and thus culture - would not be adaptable and malleable. And what small measures of privacy these networks now afford would evaporate. These are the dangers that Lawrence Lessig warned us about in 1998 in his seminal work Code and Other Laws of Cyberspace. Only now are we coming to understand that Lessig was right.

These regulatory efforts have sparked an arms race. The very suggestion of such radical solutions generated immediate reactions by those who support anarchistic electronic communication. Every time a regime rolls out a new form of technological control, some group of hackers or "hacktivists" break through it or evade it in a matter of weeks. The only people who really adhere to these controls are those not technologically proficient: most of the world.

It might surprise casual observers of these battles that the important conflicts are not happening in court. The Napster case had some interesting rhetorical nuggets. But basically this was classic contributory infringement by a commercial service. KaZaa is a bit more interesting because it is a distributed company with assets under a series of jurisdictions and a technology that limits its ability to regulate what its clients do. KaZaa might collapse and only fully distributed, voluntary networks might remain: namely, Gnutella and Freenet.

The real conflicts will be in the devices, the networks, and the media products themselves. And there seems to be few areas of healthy public discussion or critique about the relationships between technology and culture.

Meanwhile, the strategies and structures that limit peer-to-peer communication also quash dissent, activism, and organisation in illiberal contexts – that is, oppressive, totalitarian and authoritarian states. And for this reason, p2p systems like Freenet – encrypted, completely anonymous, and unquenchable – are essential tools for democratic activists in places like Saudi Arabia, Cuba, Zimbabwe, Burma and China.

The lessons for the public sphere

Where there is no rich, healthy public sphere we should support anarchistic communicative techniques. Where there is a rich, healthy public sphere, we must take an honest, unromantic account of the costs of such anarchy. And through public spheres we should correct for the excesses of communicative anarchy.

Still, we must recognise that poor, sickly, fragile public spheres are more common than rich, healthy public spheres. And the battles at play over privacy, security, surveillance, censorship and intellectual property in the United States right now will determine whether we will count the world's oldest democracy as sickly or healthy.

Anarchy is radical democracy. But it is not the best form of democracy. But as a set of tools, anarchy can be an essential antidote to tyranny.

Coming from OD


Rating: 4 - 1 voto(s).

No existen comentarios.
Comentario / Comment:
  atención: para realizar comentarios tienes que ser usuario registrado.


13-10-12_ Ivan Krastev: ¿Puede existir la democracia sin confianza?
09-10-11_ Habrá violencia, enfrentamientos y conflicto * Toni Negri
25-12-10_ La Zona Prohibida [NoGoZone]
28-03-10_ Historia de un desafuero
07-11-09_ Ginecidio y anticristo (y el devenir femenino del capitalismo identitario)
22-09-09_ Der Baader Meinhof Komplex
21-06-09_ Why do the people desire walls???
14-06-09_ Los enemigos de la SGAE
13-09-09_ Los piratas desembarcan en Venezia
17-09-09_ TEXTO CAPITAL DE LA TEORÍA QUEER. Treinta y siete años después en castellano (!)
01-01-09_ COMMUNE
14-09-08_ SARAH PALIN: Operation "Castration" * Jacques Alain Miller
09-08-08_ El complejo poético-militar
06-07-08_ Necesito matarte, majestad
25-06-08_ La directiva de la VERGÜENZA
25-06-08_ The bank of common knowledge
12-04-08_ Tragic Extremes * Nietzsche and the Politics of Security
23-04-08_ The governance of Spain: between rock and hard place
09-04-08_ Elecciones y políticas culturales
25-03-08_ Tres apuntes sobre política cultural
02-03-08_ ¿Adónde va España?
10-08-08_ La encrucijada. Acción política, arte y comisariado.
20-02-08_ Lessig al Congreso???
24-01-08_ Made in L.A. * Hecho en los Ángeles
02-03-08_ Campaña del corazón
18-01-08_ Las primera batallas para suceder a RAJOY... OY....OY
25-12-07_ Lo cultural es político
16-04-08_ La producción biopolítica.* (Toni Negri y Michael Hardt)
15-06-08_ Malcolm X en Play Boy (1963)
30-08-07_ Shinzo Abe: out of time
01-01-08_ Gary Grant. El estilo como arte marcial
18-09-07_ El fin de la crítica???
01-08-07_Responsibility and neo-liberalism
26-08-07_ ¿Hay alguien que mole?
31-07-07_ Lo que Bush nos enseña cada día
24-07-07_ "Terror doctors": anatomy of a void concept
10-06-08_ Toni Negri * NoWork Festival 2004 (trans)
07-07-07_ Soldado de la Cyber resistencia
13-07-07_ Éxodo a ningún lugar
11-07-07_ La guerra de la informacion
30-06-07_ ¡Oh No Coronado!
26-06-07_ Como darse de baja de la SGAE
06-06-07_ Neutralidad en la red
11-05-07_ El nuevo pensamiento (que viene / que viene!)
08-05-07_Jihad: Idea and History
16-04-07_ ¿Campaña "antiparatería con doble sentido?
12-04-07_ La SGAE quiere ser el SHERIFF de la RED
12-04-07_ A liberal Muslim's letter to the west
27-03-07_  Jurassic Left: the strange death of France's "deuxième gauche"
24-03-07_ Jesus Camp
13-03-07_ Pedro J. censura a elmundo.es
11-03-07_ Conspiradores del futuro
24-02-07_ Major news: FAIR USE and FILM
23-02-07_ El misterio Gordon Thomas
20-02-07_ El Mundo y la verdad
18-02-07_  The new information ecosystem 
11-02-07_ The four faces of World Economic Forum
09-02-07_ El búnker judicial
30-01-07_ ¿Sirve de algo el boicot cultural?
28-01-07_ Revolution or Resistance
23-01-07_ Demagogo e injusto...
22-01-07_ Is another world possible without the women's perspective? 
19-01-07_ Bush TV
18-01-07_ Bush's White Whale
16-01-07_ Pequeños detalles clave
16-01-07_ Contra el fatalismo económico
11-01-07_ El papelito... el papelón...
09-01-07_ Flujos antagonistas * geografías de la multitud
09-01-07_  Is this how humans behave? 
01-01-07_ Aberrante (vídeo íntegro de la ejecución de Sadam)
30-12-06_ El índice de corrupción de los diplomáticos multados.
26-12-06_ La amenaza de la paradoja del control
20-12-06_ Nueva campaña de adoctrinamiento
14-12-06_ Adios al ASESINO
05-12-06_ Information liberation
05-12-06_ Let the IP debate begin.......
27-11-06_  Mahfouz's grave, Arab liberalism's deathbed
18-11-06_ A curse on difference: gays vs zealots in Israel 
13-11-06_ Climate change: the global test 
29-10-07_ TAZ * Chaos
08-11-06_ Un pequeño análisis sobre el éxito de Ciutadans (actualizado 8 _11_06)

01-11-06_Bienal NO, ARTE todos los días
01-11-06_Señores de la SGAE
25-10-06_Information between old and new worlds
22-10-06_T.A.Z.: The Temporary Autonomous Zone (1993)
17-10-06_Getting colder * climate change and America's elections
25-10-06_Orhan Pamuk’s epic journey
08-10-06_Sexo, China y la SGAE
09-10-06_Latin America’s new left: dictators or democrats?
30-09-06_Stanford Prison Experiment
28-09-06_¿Cuál es mi cámara?
24-09-06_Y Dios en el bolsillo de todos
20-09-06_Wired on OpenBusiness and Free Beer
18-09-06_The Free Voice of Labor: The Jewish Anarchists
13-09-06_Gallardón, 'el Artista'
14-03-10_ TAZ * Utopías piratas
08-09-06_L'Monde Diplomatique * Tele-Encuentro Iberoamericano
06-09-06_Trashorras * Un buen chico
30-08-06_Anonymity on the net
20-08-06_Lebanon, Israel and the “greater west Asian crisis”
15-08-06_Carta de Ho Chi Min a Lyndon B. Johnson
15-08-06_An unfinished war
13-08-06_The levels of democracy
11-08-06_France and Lebanon: diplomacy of tragedy
01-08-06_México fragmentado
13-03-07_ En marcha el partido pirata español
20-07-06_Killing a nation, one airstrike at a time
06-07-06_El 'software' libre planta cara a las patentes...
01-07-06_Stopping the Big Giveaway * by John Kerry
30-06-06_Torture teachers
18-06-06_Planet Basel * La madre de todas las batallas
12-06-06_The Vietnam Obsession
09-06-06_Disinformation TV (Things you're not supposed to know)
30-05-06_Por una buena causa
19-05-06_S.O.S. Baronesa
06-06-06_Why Drunks Make Better Politicians
06-06-06_The Hackocracy * Why a MBA president can't manage the government
06-05-06_Entrevista * Catherine David
04-05-06_Interview with José Luis de Vicente
19-04-06_El pequeño Losantos y el Gran Wyoming
13-03-07_ Play Fuckin' Loud: Zizek Versus the Left •
09-04-06_¿La política controla al arte?
09-04-06_Manual de comportamineto...
06-04-06_La Próxima invasión
01-04-06_What Price Art?
01-04-06_ Letter of Resignation...
25-03-06_Political Games: conciencia política online
28-03-06_Los barones del PP buscan esperanza
18-03-06_Starship troopers
14-03-06_Entrevista | Toni Negri & Michael Hardt
13-03-06_Entrevista | J. G. Ballard
12-03-06_Nueva estrategia hiperpolítica
04-03-06_Methamphetamine Propaganda
27-09-07_ Francis Fukuyama: The acceptable face of the neo-cons?
01-03-06_Europe vs. Radical Islam
25-02-06_El sí de las niñas
03-08-07_ La postguerra de los movimientos
12-02-06_Derrick De Kerckhove: «soy global y ustedes también»
11-02-06_Intelligence, Policy,and the War in Iraq
07-02-06_El arte de los anfitriones
07-02-06_Las dos fotografías de Susan Sontag
03-02-06_¿Qué España?
03-02-06_Same old song
29-01-06_Déclassement : quand l'ascenseur social descend
29-01-06_Warriors and wusses
23-01-06_Carta a América
20-01-06_Fog of Secrecy
20-01-06_The Impeachment of George W. Bush
13-01-06_Why Drunks Make Better Politicians
06-01-06_What's in a hat?
06-01-06_Abramoff won't go down alone
17-12-05_In Speech, Bush Says He Ordered Domestic Spying
08-12-05_Discurso íntegro de Harold Pinter de aceptación del Nobel de Literatura
25-11-05_The political as a truth procedure
12-11-05_Variaciones del discurso sobre la integración
07-11-05_NO al cierre de la Sala Montcada de Barcelona
28-10-05_Prosecutor to Speak Soon; No Indictment for Rove Today
15-10-05_La Creación, según Bush
08-10-05_Creative Commons pide ayuda
20-09-05_¡BIENVENIDO A EE.UU.!
08-06-05_Arte, Instituciones y Democracia
23-07-07_ La Cultura del Mal



Regístrate y disfruta de utilidades de administración y gestión de los contenidos de e-limbo*
Recibe las novedades en tu correo electronico.
El futuro está escrito en las estrellas... Horóscopo creado por J.G. Ballard y dedicado a todos vosotros.
Aplicaciones y herramientas necesarias para navegar y utilizar los contenidos del limbo electrónico e internet (www).
Artículos de e-limbo* en formato PDF preparados para viajar y aportar información allá donde estés. (y seguir salvando árboles)

_e-limbo * apoya



Mais uma edição do podcast Música Livre para o Archivo Vivo, do Centro Cultural da Espanha/AECID. ...
Ante preguntas de oyentes y amigos, puedo responder ahora que Vía Límite continuará en Radio ...
SORPRESA¡!¡! An unreleased version of Talking Heads' "Psycho Killer" with Arthur Russell on cello
Optimizado: Firefox, Safari, Mozilla, Netscape, Konqueror, Explorer. Resolución óptima: 1024x768
ISSN: 1885-5229    Aviso Legal e-limbo.org*