# Technological Rewritings β˜”πŸͺ΄βœοΈπŸŽ¨ --- ## What are we doing today? - Reflect on alternative, non-hegemonic forms that have generated situated technological rewritings and in their own terms. --- - The rewriting of technologies can be a part of digital "defense" and resilience process. - This can involve modifying existing software or hardware to improve its security, or ??? --- - Digital Self Defense - Security - Safety & Resilience Case studies: comun.al --- ### [Cyberwomen digital security](https://cyber-women.com/en/) --- #### Exercise 1 Collectively build shared participation and co-existence agreements for today's session and for your group work. 10 minutes ⚠️ Please turn off translation apps - Etherpad link πŸ‘‰ --- ### Exercise 2 **Objective**: Understand the principles of participatory threat modelling and the implications of incorporating marginalized and personal experiences into cybersecurity. - **Duration**: 1.30 hours - **Format**: Group presentations followed by a class discussion. --- TODO: Get into groups of 4 πŸ§‘πŸ½β€πŸ€β€πŸ§‘πŸ½πŸ§‘πŸΌβ€πŸ€β€πŸ§‘πŸΌ --- ## Groups - Group 1: Introduction and Abstract - Group 2: Methods (3.0, 3.1, and 3.2) - Group 3: Findings (4.0) - Group 4: Solutions beyond new tools (4.2) - Group 5: Discussion and Conclusion --- **Task**: 45 min Each group will prepare a 5-minute presentation. You should cover the key points of your segment, how it relates to broader cybersecurity concerns, and reflect on any relevant personal or observed experiences that resonate with the themes. --- Use creative presentation methods such as: **role-plays**, simulations, or creating quick **infographics** or **diagrams** --- <iframe src="https://giphy.com/embed/iigcSmBaMUC5FoSUlu" width="480" height="480" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/BareTreeMedia-btm-bare-tree-media-iigcSmBaMUC5FoSUlu"> Let's take a BREAK</a></p> See you in 15 min --- Each group should formulate at least **1 question** to ask to each group presentation. Add questions to this pad so that we can populate all together later. --- Each group presents own segment. <iframe src="https://giphy.com/embed/IsoosPni8brLa" width="480" height="270" frameBorder="0" class="giphy-embed" allowFullScreen></iframe><p><a href="https://giphy.com/gifs/infographic-IsoosPni8brLa"></a></p> --- ## Personal perceptions of security **Objective(s): ** Here we will introduce the concept of holistic security, all of us carry our own personal motivations, resistances, barriers and pre-conceived notions related to digital security, gender and technology - this part of the session will encourage you to identify what these could be, and to consider what the idea of β€œsecurity” means to you individually. --- ### Holistic Security Triad ![](https://i.imgur.com/znQGZKb.png) --- ### Digital Security, Gender and Technology Myths β€œDigital security is hard.” β€œDigital security about learning how to use a β€˜bunch of new tools’ that none of my friends or colleagues are using.” β€œDigital security tools are expensive.” β€œI don’t know anything about digital security!” --- ## Affirmations ✨ How can we overcome the obstacle of thinking β€œtechnology and me, we just don’t get along quite well”? ✨ Tools and technology don’t have magic superpowers over us! We are the ones who decide what we give them access to - and if something happens, we can always reset them! --- ✨ We are the only ones who know which digital security practices are most appropriate for us, and we alone are the ones who can best decide which are the best and most practical to implement. --- Some useful references: πŸ‘‰ https://myshadow.org/es/tracking-so-what πŸ‘‰ https://ssd.eff.org/en/module/seven-steps-digital-security --- # 😎 Anonymity 😎 **Objective(s):** To introduce you to the concept of online anonymity, along with relevant tools and practices that can help preserve this anonymity. --- ### Why be anonymous? Protection πŸͺ¬πŸͺ¬πŸͺ¬πŸͺ¬πŸͺ¬ Access ☁️☁️☁️ Empowerment πŸ”‹πŸ”‹πŸ”‹ Creativity 🎭🎭🎭 Collaboration πŸ”„πŸ”„πŸ”„ --- ** Zine making...** in particular, has a long history of using anonymity as a means of creative expression and political activism. Many zine makers use **pseudonyms** or **anonymous identities** to create content that ***challenges*** dominant cultural narratives and promotes alternative perspectives. --- #### Identifying Data and Preserving Anonymity What is an IP address? ![](https://i.imgur.com/doZHN4j.png) --- ⭐⭐ Resource: https://digitaldefensefund.org/ddf-artwork-zines/browsing-zine --- ### Activity - Open [What's my IP address](https://whatismyipaddress.com/) to find out your individual IP addresses - What other sensitive or identifying information does this reveal? --- ## Tools βš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈβš’οΈ - Tor Browser - Virtual Private Network (VPN) - [Tails (The Amnesiac Incognito Live System)](https://tails.boum.org/) - HTTPS Everywhere --- ### Tor Browser 1. Download and install the Tor Browser from the official website: https://www.torproject.org/download/ 2. Once the installation is complete, launch the Tor Browser. --- 3. The Tor Browser will automatically connect to the Tor network, which is a network of servers that anonymize your internet connection by bouncing your data through a series of servers around the world. 4. When the Tor Browser is open, you can use it to browse the internet like you would with any other web browser. --- ### How tor works ![](https://i.imgur.com/NABR4CQ.png) --- ### Am I totally anonymous if I use Tor? - Generally it is impossible to have perfect anonymity, even with Tor. - Use Tor Browser and software specifically configured for Tor - Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects applications that are properly configured to send their Internet traffic through Tor. --- Web browsing: Safe: Tor Browser Unsafe: Any other browser configured to use Tor as a proxy File sharing: Safe: OnionShare Unsafe: BitTorrent over Tor --- ### Virtual Private Network (VPN) ![](https://i.imgur.com/4o4iAKw.png) --- Both VPN and Tor provide ways to protect your online privacy, they have some key differences: - VPN provides a more straightforward way to encrypt and protect your internet traffic, while Tor is more complex and may slow down your internet connection. --- - VPN can hide your IP address and location from websites and other online entities, while Tor can help to protect your identity and location from a wider range of potential adversaries, including government agencies and hackers. --- - VPN is typically used for general online browsing and accessing geo-restricted content, while Tor is often used for more sensitive activities, such as whistleblowing and journalism. --- ### HTTPS Everywhere - HTTPS Everywhere is a browser extension that helps to ensure that your web browsing is as secure as possible by automatically redirecting you to the HTTPS version of a website whenever possible. https://www.eff.org/https-everywhere --- ![](https://i.imgur.com/1eaHFC3.png) --- Learn how to turn it on if you haven't yet: https://www.eff.org/https-everywhere/set-https-default-your-browser --- ### Hands-On Practice 1. check your IP again on [What's my IP address](https://whatismyipaddress.com/) 2. do this once while using a VPN 3. a second time while using Tor Browser --- * Do you notice a difference in the IP address, or with anything else? * What do you think it will happen if you try in incognito mode? - Go ahead and try --- #### [Tails (The Amnesiac Incognito Live System)](https://tails.boum.org/) ![](https://i.imgur.com/az0dDCD.png) --- ## β˜” Safer browsing practices β˜” **Objective(s)** Provide an introduction to safe web browsing practices, including an overview of plug-ins and other utilities that can be used to create a safer browsing environment. --- #### Example practices - Google search alternatives (such as Duck Duck Go) - Who implements online tracking and why? (Both https://trackography.org and https://www.mozilla.org/es-MX/lightbeam/ are good resources about this); --- ## Tools and Extensions for Safer Browsing #### Desktop Browser Tools πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’»πŸ’» * [No Script](https://noscript.net/) * [Adblock Plus](https://adblockplus.org/) * [Privacidad Badger](https://privacybadger.org/) * [HTTPS Everywhere](https://www.eff.org/https-everywhere) * [Click & Clean](https://www.hotcleaner.com/) * [Tor browser](https://www.torproject.org/download/) * [uMatrix](https://addons.mozilla.org/es/firefox/addon/umatrix/) --- #### Mobile Browser Tools πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“±πŸ“± * HTTPS Everywhere * [Recursos de My Shadow](https://myshadow.org/resources) * Orfox * Orbot * [Tor for iPhone](https://onionbrowser.com/) --- ### Safe Wi-Fi Practices * Changing the default password of the modem * Monitor which devices are connected to your WiFi network - https://www.fing.com - https://www.openvas.org/ --- ### Self care - Self-care is an essential part of a holistic digital security practice, and is important to consistently reinforce and encouraged. --- #### Exercise: building feminist self-care Objective(s): To give us an opportunity to reflect on the importance of self-care in our daily lives, allowing us to build a definition of self-care. --- - What is self-care for you? What is collective care? How are they different? - Is self-care an issue addressed in your organizations, groups or collectives? - Do you practice self-care? What are your self-care practices? ---- - Do you find it difficult to think of yourself as a person who deserves care? - Do you find difficult to think in yourself as a person whom deserves care? - Do you feel that you’re aware of what your body and soul needs? --- ### Zen and the art of making tech work for you https://xyz.informationactivism.org/en/zen-art-making-tech-work-for-you/ --- ### Safe spaces https://xyz.informationactivism.org/en/see-me-digital-space-as-means-creating-community-and-self/
{"metaMigratedAt":"2023-06-18T02:10:39.788Z","metaMigratedFrom":"YAML","breaks":false,"description":"View the slide with \"Slide Mode\".","title":"Technological Rewritings","slideOptions":"{\"slideOptions\":{\"transition\":\"fade\",\"theme\":\"white\"}}","contributors":"[{\"id\":\"144251f5-10fa-4492-aada-15c1b1857887\",\"add\":16432,\"del\":6149}]"}
    686 views