# Technological Rewritings
βπͺ΄βοΈπ¨
---
## What are we doing today?
- Reflect on alternative, non-hegemonic forms that have generated situated technological rewritings and in their own terms.
---
- The rewriting of technologies can be a part of digital "defense" and resilience process.
- This can involve modifying existing software or hardware to improve its security, or ???
---
- Digital Self Defense
- Security
- Safety & Resilience
Case studies: comun.al
---
### [Cyberwomen digital security](https://cyber-women.com/en/)
---
#### Exercise 1
Collectively build shared participation and co-existence agreements for today's session and for your group work.
10 minutes
β οΈ Please turn off translation apps
- Etherpad link π
---
### Exercise 2
**Objective**:
Understand the principles of participatory threat modelling and the implications of incorporating marginalized and personal experiences into cybersecurity.
- **Duration**: 1.30 hours
- **Format**: Group presentations followed by a class discussion.
---
TODO:
Get into groups of 4
π§π½βπ€βπ§π½π§πΌβπ€βπ§πΌ
---
## Groups
- Group 1: Introduction and Abstract
- Group 2: Methods (3.0, 3.1, and 3.2)
- Group 3: Findings (4.0)
- Group 4: Solutions beyond new tools (4.2)
- Group 5: Discussion and Conclusion
---
**Task**: 45 min
Each group will prepare a 5-minute presentation.
You should cover the key points of your segment, how it relates to broader cybersecurity concerns, and reflect on any relevant personal or observed experiences that resonate with the themes.
---
Use creative presentation methods such as:
**role-plays**, simulations, or creating quick **infographics** or **diagrams**
---
<iframe src="https://giphy.com/embed/iigcSmBaMUC5FoSUlu" width="480" height="480" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/BareTreeMedia-btm-bare-tree-media-iigcSmBaMUC5FoSUlu"> Let's take a BREAK</a></p>
See you in 15 min
---
Each group should formulate at least **1 question** to ask to each group presentation.
Add questions to this pad so that we can populate all together later.
---
Each group presents own segment.
<iframe src="https://giphy.com/embed/IsoosPni8brLa" width="480" height="270" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/infographic-IsoosPni8brLa"></a></p>
---
## Personal perceptions of security
**Objective(s):
**
Here we will introduce the concept of holistic security, all of us carry our own personal motivations, resistances, barriers and pre-conceived notions related to digital security, gender and technology - this part of the session will encourage you to identify what these could be, and to consider what the idea of βsecurityβ means to you individually.
---
### Holistic Security Triad

---
### Digital Security, Gender and Technology Myths
βDigital security is hard.β
βDigital security about learning how to use a βbunch of new toolsβ that none of my friends or colleagues are using.β
βDigital security tools are expensive.β
βI donβt know anything about digital security!β
---
## Affirmations
β¨ How can we overcome the obstacle of thinking βtechnology and me, we just donβt get along quite wellβ?
β¨ Tools and technology donβt have magic superpowers over us! We are the ones who decide what we give them access to - and if something happens, we can always reset them!
---
β¨ We are the only ones who know which digital security practices are most appropriate for us, and we alone are the ones who can best decide which are the best and most practical to implement.
---
Some useful references:
π https://myshadow.org/es/tracking-so-what
π https://ssd.eff.org/en/module/seven-steps-digital-security
---
# π Anonymity π
**Objective(s):**
To introduce you to the concept of online anonymity, along with relevant tools and practices that can help preserve this anonymity.
---
### Why be anonymous?
Protection πͺ¬πͺ¬πͺ¬πͺ¬πͺ¬
Access βοΈβοΈβοΈ
Empowerment πππ
Creativity πππ
Collaboration πππ
---
**
Zine making...**
in particular, has a long history of using anonymity as a means of creative expression and political activism.
Many zine makers use **pseudonyms** or **anonymous identities** to create content that ***challenges*** dominant cultural narratives and promotes alternative perspectives.
---
#### Identifying Data and Preserving Anonymity
What is an IP address?

---
ββ Resource:
https://digitaldefensefund.org/ddf-artwork-zines/browsing-zine
---
### Activity
- Open [What's my IP address](https://whatismyipaddress.com/) to find out your individual IP addresses
- What other sensitive or identifying information does this reveal?
---
## Tools
βοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈβοΈ
- Tor Browser
- Virtual Private Network (VPN)
- [Tails (The Amnesiac Incognito Live System)](https://tails.boum.org/)
- HTTPS Everywhere
---
### Tor Browser
1. Download and install the Tor Browser from the official website: https://www.torproject.org/download/
2. Once the installation is complete, launch the Tor Browser.
---
3. The Tor Browser will automatically connect to the Tor network, which is a network of servers that anonymize your internet connection by bouncing your data through a series of servers around the world.
4. When the Tor Browser is open, you can use it to browse the internet like you would with any other web browser.
---
### How tor works

---
### Am I totally anonymous if I use Tor?
- Generally it is impossible to have perfect anonymity, even with Tor.
- Use Tor Browser and software specifically configured for Tor
- Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects applications that are properly configured to send their Internet traffic through Tor.
---
Web browsing:
Safe: Tor Browser
Unsafe: Any other browser configured to use Tor as a proxy
File sharing:
Safe: OnionShare
Unsafe: BitTorrent over Tor
---
### Virtual Private Network (VPN)

---
Both VPN and Tor provide ways to protect your online privacy, they have some key differences:
- VPN provides a more straightforward way to encrypt and protect your internet traffic, while Tor is more complex and may slow down your internet connection.
---
- VPN can hide your IP address and location from websites and other online entities, while Tor can help to protect your identity and location from a wider range of potential adversaries, including government agencies and hackers.
---
- VPN is typically used for general online browsing and accessing geo-restricted content, while Tor is often used for more sensitive activities, such as whistleblowing and journalism.
---
### HTTPS Everywhere
- HTTPS Everywhere is a browser extension that helps to ensure that your web browsing is as secure as possible by automatically redirecting you to the HTTPS version of a website whenever possible.
https://www.eff.org/https-everywhere
---

---
Learn how to turn it on if you haven't yet:
https://www.eff.org/https-everywhere/set-https-default-your-browser
---
### Hands-On Practice
1. check your IP again on [What's my IP address](https://whatismyipaddress.com/)
2. do this once while using a VPN
3. a second time while using Tor Browser
---
* Do you notice a difference in the IP address, or with anything else?
* What do you think it will happen if you try in incognito mode?
- Go ahead and try
---
#### [Tails (The Amnesiac Incognito Live System)](https://tails.boum.org/)

---
## β Safer browsing practices β
**Objective(s)**
Provide an introduction to safe web browsing practices, including an overview of plug-ins and other utilities that can be used to create a safer browsing environment.
---
#### Example practices
- Google search alternatives (such as Duck Duck Go)
- Who implements online tracking and why? (Both https://trackography.org and https://www.mozilla.org/es-MX/lightbeam/ are good resources about this);
---
## Tools and Extensions for Safer Browsing
#### Desktop Browser Tools
π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»π»
* [No Script](https://noscript.net/)
* [Adblock Plus](https://adblockplus.org/)
* [Privacidad Badger](https://privacybadger.org/)
* [HTTPS Everywhere](https://www.eff.org/https-everywhere)
* [Click & Clean](https://www.hotcleaner.com/)
* [Tor browser](https://www.torproject.org/download/)
* [uMatrix](https://addons.mozilla.org/es/firefox/addon/umatrix/)
---
#### Mobile Browser Tools
π±π±π±π±π±π±π±π±π±π±π±π±π±π±
* HTTPS Everywhere
* [Recursos de My Shadow](https://myshadow.org/resources)
* Orfox
* Orbot
* [Tor for iPhone](https://onionbrowser.com/)
---
### Safe Wi-Fi Practices
* Changing the default password of the modem
* Monitor which devices are connected to your WiFi network
- https://www.fing.com
- https://www.openvas.org/
---
### Self care
- Self-care is an essential part of a holistic digital security practice, and is important to consistently reinforce and encouraged.
---
#### Exercise: building feminist self-care
Objective(s): To give us an opportunity to reflect on the importance of self-care in our daily lives, allowing us to build a definition of self-care.
---
- What is self-care for you? What is collective care? How are they different?
- Is self-care an issue addressed in your organizations, groups or collectives?
- Do you practice self-care? What are your self-care practices?
----
- Do you find it difficult to think of yourself as a person who deserves care?
- Do you find difficult to think in yourself as a person whom deserves care?
- Do you feel that youβre aware of what your body and soul needs?
---
### Zen and the art of making tech work for you
https://xyz.informationactivism.org/en/zen-art-making-tech-work-for-you/
---
### Safe spaces
https://xyz.informationactivism.org/en/see-me-digital-space-as-means-creating-community-and-self/
{"metaMigratedAt":"2023-06-18T02:10:39.788Z","metaMigratedFrom":"YAML","breaks":false,"description":"View the slide with \"Slide Mode\".","title":"Technological Rewritings","slideOptions":"{\"slideOptions\":{\"transition\":\"fade\",\"theme\":\"white\"}}","contributors":"[{\"id\":\"144251f5-10fa-4492-aada-15c1b1857887\",\"add\":16432,\"del\":6149}]"}