<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Alex</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Alex"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Alex"/>
		<updated>2026-05-01T13:39:49Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=9712</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=9712"/>
				<updated>2019-06-06T08:13:25Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;bloc-news&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Check out our [https://en.gendersec.train.tacticaltech.org/ Gendersec training curricula available in English and Spanish]&lt;br /&gt;
* Check out the documentation and evaluation of the last [https://tacticaltech.org/news/roundup-gti-uruguay/ Gender and Technology Institute for Land Defenders  here]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_and_Technology_Institute,_Uruguay&amp;diff=9701</id>
		<title>Gender and Technology Institute, Uruguay</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gender_and_Technology_Institute,_Uruguay&amp;diff=9701"/>
				<updated>2019-03-10T15:29:52Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Gender and Technology Institute, Uruguay&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/06/18&lt;br /&gt;
|End when ?=2018/06/22&lt;br /&gt;
|Number of hours if only one day ?=40&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Who organize it=Tactical Technology Collective&lt;br /&gt;
Mama cash&lt;br /&gt;
FRIDA The Young Feminist Fund&lt;br /&gt;
|organisation(s) website=https://tacticaltech.org/news/roundup-gti-uruguay/&lt;br /&gt;
|For whom is it organized=Women and trans land defenders&lt;br /&gt;
|How many people trained=70&lt;br /&gt;
|Motivations for organizing training=This one was the fifth “Gender and Technology Institute” and it was organized in collaboration with FRIDA and Mama Cash. They attended the preparatory gathering on February 2018 in Mexico DF and brought logistic support doing outreach and giving support in the selection of participants, as well as covering the costs of 10 of the 49 participants selected. They also brought a small fun to economically support follow up actions and trainings by the participants and facilitators to the GTI, between July and December 2018. On the other hand, Amnesty International economically supported two participants and one person from Fondo de Acción Urgente LAC covered her costs to attend this GTI.&lt;br /&gt;
This GTI was held during five days and had several objectives:&lt;br /&gt;
Bring new skills and knowledge to its participants for them to be able to improve their strategies of mitigation as well as update their security protocols;&lt;br /&gt;
Be able to train their own networks, organizations and communities about the topics learned once they are back home;&lt;br /&gt;
Improve the synergy and collaboration between the different collectives and organizations attending the gathering.&lt;br /&gt;
&lt;br /&gt;
During two previous events specific curricula and methodologies were created for this specific GTI:&lt;br /&gt;
A preparatory gathering in February 2018 with 20 participants that represented several organizations related to land rights defenders and/or with digital and holistic security with gender perspective.&lt;br /&gt;
A gathering for the development of curricula content in April 2018 with 20 participants with the focus in developing of workshops and activities based on past GTIs. We are going to publish this repository of curricula in Spanish and english.&lt;br /&gt;
 The GTI brought 70 people including 50 participants and a team of 20 facilitators and organizers (3 from Tactical Tech, 1 representative from Mama Cash, 1  representative from the local organization Cotidiano Mujer, 1 person supporting logistics, 1 translator, 12 external facilitators). Among the participants were 40 women right land defenders and allies and 10 participants who were involved in feminist activism. The countries represented were Uruguay, Chile, Argentina, Colombia, Peru, Brazil, Bolivia, Honduras, Guatemala, Mexico, Nicaragua, Ecuador, El Salvador and Venezuela. However, it should be noted that for many participants this identification does not make sense. For those who represent their territory and community claiming an identity dissociated from the borders imposed by the nation states. The states maintain direct conflicts with women land rights defenders, criminalizing and actively pursuing them.&lt;br /&gt;
&lt;br /&gt;
About the roles of the participants in their own communities and organizations, we had the following profiles: &lt;br /&gt;
- In charge of the management of Information and Communication Technologies (ICT) for their organization or collective (responsible for communication, campaigns, data collection and collective memory, others).&lt;br /&gt;
- Activist who collectively manages ICTs (feminist activism, intense use of social networks, etc.)&lt;br /&gt;
- Project and/or funding coordinator (director, programs, spokesperson, etc)&lt;br /&gt;
- Profiles with sophisticated use or development of technologies (free software/hardware, geodata, system administrators)&lt;br /&gt;
- Legal Defenders/Lawyers&lt;br /&gt;
And about the audience that their communities, organizations and collectives work with we found the following distribution represented by a word cloud.&lt;br /&gt;
&lt;br /&gt;
Among the women that are object of gender based violence and hate speech online and offline, the women land rights defenders, indigenous communities leaders, environmental activists are specially under risk. During the preparatory event we spent some time to put on the same page several studies, analysis and reports related to the risks that they have. Other example of this is the big response we got to the convocation to the GTI. Although it was only open during 3 weeks and we didn’t distribute the call for applications further from the networks and organizations that were mapped during the preparatory event, we received more than 220 applications and most of the ones coming from land rights defenders showed  people under hight risk. When analyzing the applications, we gave priority to the participantes that were exposed to the higher levels of risk as explained here:&lt;br /&gt;
&lt;br /&gt;
Attacks, hate speech through social networks (RRSS)&lt;br /&gt;
Dealing with sensitive data, Manejo de datos sensibles, intervention risks&lt;br /&gt;
Identity and account theft&lt;br /&gt;
Computer theft&lt;br /&gt;
Tracking of communication and cellphones &lt;br /&gt;
Campaigns of discredit and fake news and defaming&lt;br /&gt;
Attacks to their web pages&lt;br /&gt;
Monitoring and surveillance&lt;br /&gt;
Lack of security protocols in the organization&lt;br /&gt;
Blackmail and criminalization&lt;br /&gt;
Legal pitfalls&lt;br /&gt;
Police visits to house, work place, etc&lt;br /&gt;
Raids of offices and personal houses&lt;br /&gt;
Threats to close family members&lt;br /&gt;
Non-consensual dissemination of intimate content (“Revenge porn”)&lt;br /&gt;
Sexual violence&lt;br /&gt;
Discrimination&lt;br /&gt;
Harassment&lt;br /&gt;
Disappearances &lt;br /&gt;
Murders&lt;br /&gt;
&lt;br /&gt;
Related to their motivations to attend the GTI, we can see that the participants want to improve their skills and get methodologies and tools to defend the rights of the communities they work in. On one side they want to be able to improve their visibility and advocacy, know how to manage and care about the data they generate, as well as to reduce the risks of attacks and violence. On other side, they want to acquire concepts and tools to be able to improve their levels of security and skills when creating mitigation strategies. Those motivations get combined with their goals of being able to share this knowledge with their own organizations, communities and networks.&lt;br /&gt;
&lt;br /&gt;
The gathering allowed many of the participants to meet face to face and create new networks based on trust that can only be obtained in presential gatherings. Many of them brought to our attention that being able to be a whole week with other comrades learning about their experiences and realities, questioning and learning about technical topics that usually are not easy to access, brought them a lot of strength and empowerment. They were able to gather in a safe space where they could relax, eat, laugh, cry and dance and that allowed them to center in themselves and that is in itself an act of political rebellion. And finally the institute brought them the opportunity to better understand how to defend the territory in other contexts and how to navigate their own specific context to fight against criminalization, to organize campaigns, document proofs, create collective memories, develop cartographic processes, etc&lt;br /&gt;
&lt;br /&gt;
You can read about the follow up activities organised by GTI participants in the follwoing reports:&lt;br /&gt;
&lt;br /&gt;
ENG: https://gendersec.tacticaltech.org/wiki/images/2/2a/-Public_Sharing-_report_grant_land_defenders.pdf&lt;br /&gt;
&lt;br /&gt;
Report of follow up activities organised by participants of the GTI oriented at land defenders December 2018&lt;br /&gt;
- “Caring for life on earth: Holistic, digital and self care security”&lt;br /&gt;
&lt;br /&gt;
SPA: https://gendersec.tacticaltech.org/wiki/images/e/e2/InformeDefensoras_delatierra.pdf&lt;br /&gt;
&lt;br /&gt;
Informe de las actividades de seguimiento organizadas por las participantes del IGT orientado a defensoras de la tierra Febrero 2019  - “Cuidando de la vida en la tierra: Seguridad holística, digital y autocuidado”&lt;br /&gt;
|Topics addressed=defending territories, security, holistic, self care; ancestral technologies&lt;br /&gt;
|Links about the activity=https://tacticaltech.org/news/roundup-gti-uruguay/&lt;br /&gt;
|Upload content=Evaluation GTI Uruguay English.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Through the event, the participants attended different sessions distributed in the following big topics: digital security, security in mobiles, privacy, data politics, gender and technology, replication and training. They were developed across the following sessions:&lt;br /&gt;
- Digital security: basic concepts about security, how to take control of the browser, malware’s attacks, server’s attacks, web hosting, anonymity, encryption, TOR, TAILS and deep web.&lt;br /&gt;
- Mobile security: Understand infrastructure and mobiles, security and privacy settings for mobiles, telephony alternatives with VOIP.&lt;br /&gt;
- Data politics: Metadata, create and protect databases, free mapping processes, technology sovereignty, collective memory.&lt;br /&gt;
- Campaigns: Creative uses of social media, planning of  campaign considering privacy and security, search engine optimization, push profiles of land right defenders under risk, hate speech and feminist counter-speech.&lt;br /&gt;
- Holistic security: Technology in demonstrations, documenting violence, preparing an event or training in an unknown  context, emotions and addictions using social media.&lt;br /&gt;
&lt;br /&gt;
And at the end of the day there were two labs that people could attend: the feminist hackerspace and the self-care lab. We noticed that many of the participants went to the hackerspace, even when that activity was not required for the institute. It shows us that digital security, privacy and self-learning are activities that they understand are relevant for their own work. Some of them didn’t have any previous experience with free software and privacy tools, but they were looking to learn about this options and use them as soon as they could.&lt;br /&gt;
In the self-care lab, one facilitator was providing methodologies to deal with stress and anxiety as well as to learn to relax and ground in front of fear and trauma. She provided a space to share methods of collective and individual care. &lt;br /&gt;
&lt;br /&gt;
About the schedule, the first day we worked with all the participants to clarify the goals of the GTI, the shared agreements, media protocols and documentation, as well as all important logistic information. There was also a symbolic action to begin the institute and connect between all of us. In the afternoon the participants shared in small groups about knowledge that comes from their ancestors and their first memories of technology as well as how their relationship with technology has been influenced by their gender as well as other intersectional dimensions like geographic origin, social class, access to education, opportunities to education and so on.&lt;br /&gt;
Based on those conversations we moved on into a first collective session about what integral security means, detailing many areas that can be protected as well as strategies of mitigation that exist. The participants shared some of their security strategies linking the relationship between physical integrity, digital security and psychosocial well-being. &lt;br /&gt;
&lt;br /&gt;
The last session allowed us all to visibilize the diversity of knowledge and security practices that the participants and their networks already have. It also let us see that the participants were already applying security practices that we also use in digital environments, strategies known like “fortification”, “reduction”, “obfuscation” and &amp;quot;compartmentalization&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
That first day allowed the participants to understand that technologies are diverse and  broad and that ancestral technologies are valuable technical knowledge that we need to reclaim, showing how all of them have an expert relationship with many technical knowledges. It also allowed us to all of us to start from a shared vocabulary as well as to have a better understanding of the diversity of contexts, challenges and strategies.&lt;br /&gt;
&lt;br /&gt;
About the schedule during the GTI, it usually was 3 different sessions in parallel that allowed the participants to find the session that better accommodate their interests. All the sessions were facilitated by 2 or 3 facilitators and one additional person was taking notes.  Finally, all the facilitators were meeting at the end of the day to evaluate how everything went, what was the evaluation of their sessions by the participants and which changes they needed to implement the next day.&lt;br /&gt;
&lt;br /&gt;
The last day was designed for the participants to have strategical conversations about topics they needed to go deep in. And at the end we had a closing session where we discussed next steps after the GTI, which activities, trainings, or facilitations they were planning, how they wanted to keep in touch and how to manage the documentation of the sessions.&lt;br /&gt;
&lt;br /&gt;
The next steps will be to create a mailing list for participants, share reviewed documentation, update the curricula as well as to create this document. We will also do a follow up of each participant to understand which are the trainings and awareness raising activities they are planning in their own networks and communities, and see what is the best way that we can support their efforts.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:InformeDefensoras_delatierra.pdf&amp;diff=9700</id>
		<title>File:InformeDefensoras delatierra.pdf</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:InformeDefensoras_delatierra.pdf&amp;diff=9700"/>
				<updated>2019-03-10T15:28:38Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Este informe presenta un análisis de los 16 proyectos con actividades de seguimiento
organizadas por las participantes del quinto &amp;quot;Instituto de Género y Tecnología&amp;quot; (IGT) dirigido
a defensoras de la tierra de América Latina.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Este informe presenta un análisis de los 16 proyectos con actividades de seguimiento&lt;br /&gt;
organizadas por las participantes del quinto &amp;quot;Instituto de Género y Tecnología&amp;quot; (IGT) dirigido&lt;br /&gt;
a defensoras de la tierra de América Latina.&lt;br /&gt;
== Licensing ==&lt;br /&gt;
{{cc-by-nc-sa-3.0}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:-Public_Sharing-_report_grant_land_defenders.pdf&amp;diff=9699</id>
		<title>File:-Public Sharing- report grant land defenders.pdf</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:-Public_Sharing-_report_grant_land_defenders.pdf&amp;diff=9699"/>
				<updated>2019-03-10T15:24:27Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: This report presents an analysis of the 16 projects with follow up activities organised by participants of the fifth “Gender and Technology Institute” (GTI) targeted at women land defenders from Latin America.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
This report presents an analysis of the 16 projects with follow up activities organised by participants of the fifth “Gender and Technology Institute” (GTI) targeted at women land defenders from Latin America.&lt;br /&gt;
== Licensing ==&lt;br /&gt;
{{cc-by-nc-sa-3.0}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Raperas_Feministas_LAC&amp;diff=9698</id>
		<title>Raperas Feministas LAC</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Raperas_Feministas_LAC&amp;diff=9698"/>
				<updated>2019-03-09T13:28:23Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Una lista de hip hoperas y raperas feministas compiladas por Lucia!! Completen y complementen...&lt;br /&gt;
&lt;br /&gt;
A&lt;br /&gt;
&lt;br /&gt;
Afromega (México)&lt;br /&gt;
https://www.youtube.com/watch?v=AzndEYEqKlw&lt;br /&gt;
&lt;br /&gt;
Aid (España)&lt;br /&gt;
https://www.youtube.com/watch?v=sl5JgmqvmRA&lt;br /&gt;
&lt;br /&gt;
Akelarre (Cataluña)&lt;br /&gt;
https://www.facebook.com/Akelarre-645397822204323/&lt;br /&gt;
https://www.youtube.com/watch?v=U37ZPuDkzgY&lt;br /&gt;
&lt;br /&gt;
Alika (Argentina)&lt;br /&gt;
https://www.youtube.com/watch?v=giOWXLeBMbg&lt;br /&gt;
&lt;br /&gt;
Alix Toxik (México)&lt;br /&gt;
https://www.youtube.com/watch?v=2tKMSfOsFdc&lt;br /&gt;
&lt;br /&gt;
Anarkía Ruíz (Venezuela)&lt;br /&gt;
https://www.facebook.com/search/str/Anarkia%2BRuiz%2BII/keywords_top&lt;br /&gt;
https://www.youtube.com/watch?v=-T2bY3wmKRs&lt;br /&gt;
&lt;br /&gt;
Anita Tijoux (Chile)&lt;br /&gt;
http://anitatijoux.cl/&lt;br /&gt;
https://es.wikipedia.org/wiki/Ana_Tijoux&lt;br /&gt;
https://www.youtube.com/watch?v=S-ZGljqUqWM&lt;br /&gt;
&lt;br /&gt;
Apolonia (Venezuela)&lt;br /&gt;
https://www.youtube.com/watch?v=_MnVCRXphPQ&lt;br /&gt;
&lt;br /&gt;
Arianna Puello (República Dominicana/Girona, España)&lt;br /&gt;
https://www.youtube.com/watch?v=irUNdhWg5Cc&lt;br /&gt;
&lt;br /&gt;
Audry Funk (Puebla, México)&lt;br /&gt;
http://es.rap.wikia.com/wiki/Audry_Funk&lt;br /&gt;
https://www.youtube.com/watch?v=6j9qgixo-Hg&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/5-mascaras-audry-funk?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
B&lt;br /&gt;
&lt;br /&gt;
Barna bitches (Reddie+Niña Marmota) (Catalunya)&lt;br /&gt;
https://www.youtube.com/watch?v=dFJ2NbyA2E0&lt;br /&gt;
&lt;br /&gt;
Bastet (España)&lt;br /&gt;
https://www.youtube.com/watch?v=tnOzEzWxM9w&lt;br /&gt;
&lt;br /&gt;
Batallones femeninos (Ciudad Juárez, México)&lt;br /&gt;
https://www.facebook.com/CandyBatallonesFemeninos&lt;br /&gt;
https://soundcloud.com/batallonesfemeninos&lt;br /&gt;
&lt;br /&gt;
BellaDona (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?v=oOc7UZT9Xdo&lt;br /&gt;
&lt;br /&gt;
Belona MC (Chile)&lt;br /&gt;
https://www.youtube.com/watch?v=2tKMSfOsFdc&lt;br /&gt;
&lt;br /&gt;
Bittah (Cataluña)&lt;br /&gt;
http://rimasfemeninas.wixsite.com/rimasfemeninas/bittah&lt;br /&gt;
http://tintaroja.es/cultura/musica-y-revolucion/1312-entrevista-a-bittah-mc-de-barcelona&lt;br /&gt;
https://www.youtube.com/watch?v=RvOZuiP0wFM&lt;br /&gt;
&lt;br /&gt;
BKC (España)&lt;br /&gt;
https://www.youtube.com/watch?v=VAAhbYJLovc&lt;br /&gt;
&lt;br /&gt;
BOCAdeBABA (Catalunya)&lt;br /&gt;
https://soundcloud.com/bocadebaba/&lt;br /&gt;
&lt;br /&gt;
C&lt;br /&gt;
&lt;br /&gt;
Caye Cayejera (Ecuador)&lt;br /&gt;
https://www.youtube.com/watch?v=e5VW7jhlf9E&lt;br /&gt;
&lt;br /&gt;
Caroliina (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?feature=player_embedded&amp;amp;v=w8i0L1ySwMw&lt;br /&gt;
&lt;br /&gt;
Charlotte Darat (Chile)&lt;br /&gt;
https://www.youtube.com/watch?v=r-B2l28AK-A&lt;br /&gt;
&lt;br /&gt;
Cru Canija de Toluca (México)&lt;br /&gt;
https://www.youtube.com/watch?v=34UQVsmAXpk&lt;br /&gt;
&lt;br /&gt;
D&lt;br /&gt;
&lt;br /&gt;
Danay Suárez (Cuba)&lt;br /&gt;
https://www.youtube.com/watch?v=GqLhLDbm0d8&lt;br /&gt;
&lt;br /&gt;
Dania Neko (Chile)&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/4-libre-y-salvaje-dania-neko?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
De Loto Mc (Medellín, Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=xhld5x5KDnk&lt;br /&gt;
&lt;br /&gt;
Diana Avella (Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=xJhSJmwGbms&lt;br /&gt;
&lt;br /&gt;
Diktadora (México)&lt;br /&gt;
https://www.youtube.com/watch?v=vlaX1ykAts4&lt;br /&gt;
&lt;br /&gt;
Dinamita (Costa Rica)&lt;br /&gt;
https://www.youtube.com/watch?v=TVp3R6HpjC8&lt;br /&gt;
&lt;br /&gt;
Dnoe (España)&lt;br /&gt;
https://www.youtube.com/watch?v=e_0o4xjpMN0&lt;br /&gt;
&lt;br /&gt;
Doble Fea (Argentina)&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/cielo-y-tierra-doble-fea?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
Dona (Haiti)&lt;br /&gt;
https://www.youtube.com/watch?v=REfDCnPoAng&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
E&lt;br /&gt;
&lt;br /&gt;
Elektra (Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=OO3LhTJBvPE&lt;br /&gt;
&lt;br /&gt;
F&lt;br /&gt;
&lt;br /&gt;
Furia Soprano (Euskadi)&lt;br /&gt;
https://lafuria.bandcamp.com/&lt;br /&gt;
&lt;br /&gt;
G&lt;br /&gt;
&lt;br /&gt;
Gabry E (México)&lt;br /&gt;
https://www.youtube.com/watch?v=ZzuKcEEgFiw&lt;br /&gt;
&lt;br /&gt;
Garee (Venezuela)&lt;br /&gt;
https://www.youtube.com/watch?feature=player_embedded&amp;amp;list=PL97VwWgyu0cXVII7qalCsYJKjtqu46rDV?rel=0&amp;amp;v=FSbiY9UE0Vo&lt;br /&gt;
http://www.guaridahiphop.com/2015/03/garee-carpe-diem-album-venezuela-2015.html&lt;br /&gt;
&lt;br /&gt;
Garzía (México)&lt;br /&gt;
https://www.youtube.com/watch?v=3L76Hm4j_FE#t=139&lt;br /&gt;
&lt;br /&gt;
Gata Cattana (España)&lt;br /&gt;
https://soundcloud.com/gatacattana&lt;br /&gt;
&lt;br /&gt;
Golpe de coño (España)&lt;br /&gt;
https://www.youtube.com/watch?feature=player_embedded&amp;amp;v=fG3oO67CZA8&lt;br /&gt;
&lt;br /&gt;
H&lt;br /&gt;
&lt;br /&gt;
Hispana (México)&lt;br /&gt;
https://www.youtube.com/watch?v=j-Yje5Wq0fI&lt;br /&gt;
&lt;br /&gt;
I&lt;br /&gt;
&lt;br /&gt;
Indomitamorfosis (Chile)&lt;br /&gt;
https://mutarnunkatermina.noblogs.org/&lt;br /&gt;
&lt;br /&gt;
Invasorix (México)&lt;br /&gt;
http://invasorix.tumblr.com&lt;br /&gt;
http://invasorix.tumblr.com/about&lt;br /&gt;
http://invasorix.tumblr.com/videos&lt;br /&gt;
&lt;br /&gt;
J&lt;br /&gt;
&lt;br /&gt;
Jezzy P (México)&lt;br /&gt;
https://www.youtube.com/watch?v=WM0XnqVnits&lt;br /&gt;
&lt;br /&gt;
K&lt;br /&gt;
&lt;br /&gt;
Kahuay - Sipas Crew (Perú)&lt;br /&gt;
https://www.youtube.com/watch?v=y2rAZcXLh_8&lt;br /&gt;
&lt;br /&gt;
Kim Mc (Venezuela)&lt;br /&gt;
https://www.youtube.com/watch?v=j66XNrL2kus&lt;br /&gt;
&lt;br /&gt;
Knela Palacios (Venezuela)&lt;br /&gt;
https://www.youtube.com/watch?v=_Lj0vWxBO8E&lt;br /&gt;
&lt;br /&gt;
Krudas Cubensi (Cuba)&lt;br /&gt;
www.krudascubensi.com&lt;br /&gt;
https://en.wikipedia.org/wiki/Krudas_Cubensi&lt;br /&gt;
https://soundcloud.com/krudas-cubensi&lt;br /&gt;
&lt;br /&gt;
L&lt;br /&gt;
&lt;br /&gt;
La Fina (Cuba)&lt;br /&gt;
https://www.youtube.com/watch?v=DCLqowkdyOM&lt;br /&gt;
&lt;br /&gt;
La Jeka (Perú)&lt;br /&gt;
https://www.youtube.com/watch?v=cQXuuws3cec&amp;amp;index=18&amp;amp;list=PL88C5D74028299C45&lt;br /&gt;
&lt;br /&gt;
La Kayros (Chile)&lt;br /&gt;
https://soundcloud.com/user-856795893&lt;br /&gt;
&lt;br /&gt;
La materialista (República Dominicana)&lt;br /&gt;
https://www.youtube.com/watch?v=Vm_QVzTREds&lt;br /&gt;
&lt;br /&gt;
La Prinz (Perú)&lt;br /&gt;
https://www.youtube.com/watch?v=Iw-IqP7wNB4&lt;br /&gt;
&lt;br /&gt;
La Reyna y La Real (Cuba)&lt;br /&gt;
https://www.youtube.com/watch?v=hcvkncQ315U&lt;br /&gt;
&lt;br /&gt;
La Saya (Cali, Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=cA6U1IOr8_c&lt;br /&gt;
&lt;br /&gt;
Lady Crash (Uruguay)&lt;br /&gt;
https://www.youtube.com/watch?v=Qf-3yJF1U9k&lt;br /&gt;
&lt;br /&gt;
Lady Yako (España)&lt;br /&gt;
https://www.youtube.com/watch?v=1-9RCoQXKzM&amp;amp;list=PLQ7uL1ckVQC8QA_hcMiX0LsWmgWfWkbtv&lt;br /&gt;
&lt;br /&gt;
Las Conchudas (Argentina)&lt;br /&gt;
&lt;br /&gt;
Las Damas (Perú)&lt;br /&gt;
https://www.youtube.com/watch?v=7UnPfWVFXdo&lt;br /&gt;
&lt;br /&gt;
Las Vvitch (España)&lt;br /&gt;
https://www.youtube.com/watch?v=hkimUDkUArc&lt;br /&gt;
https://soundcloud.com/lasvvitch&lt;br /&gt;
&lt;br /&gt;
Leazzy (Guadalajara, México)&lt;br /&gt;
https://soundcloud.com/leazzy&lt;br /&gt;
https://www.youtube.com/watch?v=4DaGK3AKREA&lt;br /&gt;
&lt;br /&gt;
Lenys Merkdo (Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=5W1E-gPpkJM&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/2-mi-tiempo-lenys-merkdo?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
Li Saumet (Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=hQp7gWDu8i4&lt;br /&gt;
&lt;br /&gt;
Lucía Vargas (Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=B9Z50F1YMtQ&lt;br /&gt;
&lt;br /&gt;
Luz Reality (México)&lt;br /&gt;
https://www.youtube.com/watch?v=EH8BfPCJupk&lt;br /&gt;
&lt;br /&gt;
M&lt;br /&gt;
&lt;br /&gt;
Magia López (Cuba)&lt;br /&gt;
https://www.youtube.com/watch?v=2t85qPK2Fbc&lt;br /&gt;
https://www.youtube.com/watch?v=E-plLD6IEPQ&lt;br /&gt;
&lt;br /&gt;
Maluca Mala (República Dominicana)&lt;br /&gt;
https://www.youtube.com/watch?v=j5cQLrPxupo&lt;br /&gt;
&lt;br /&gt;
Mare Advertencia Lírika (México)&lt;br /&gt;
https://soundcloud.com/mare-advertencia-lirika&lt;br /&gt;
mare advertencia lirica v/s rabia&lt;br /&gt;
https://www.youtube.com/watch?v=iM2xamCNeE4&lt;br /&gt;
&lt;br /&gt;
Maya La Insana (México)&lt;br /&gt;
https://www.youtube.com/watch?v=v5y-nljcFYs&lt;br /&gt;
&lt;br /&gt;
MC Adi (México)&lt;br /&gt;
https://www.youtube.com/watch?v=kqkPGQjjxMQ&lt;br /&gt;
&lt;br /&gt;
MC Flaca (México)&lt;br /&gt;
https://www.youtube.com/watch?v=xRWEXdCttFM&lt;br /&gt;
&lt;br /&gt;
MC Grace (México)&lt;br /&gt;
https://www.youtube.com/watch?v=Hmuf_onNr_s&lt;br /&gt;
&lt;br /&gt;
MC Luana Hansen (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?v=UWe4d_5FQjg&amp;amp;feature=share&lt;br /&gt;
&lt;br /&gt;
MC Jana (Colombia)&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/6-el-show-debe-continuar-mc-jana?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
https://www.youtube.com/watch?v=lzaGL0KhUZU&lt;br /&gt;
&lt;br /&gt;
Mc Rasta Negra (México)&lt;br /&gt;
https://www.youtube.com/watch?v=87PP2A9w-tQ&lt;br /&gt;
https://soundcloud.com/rasta-negra&lt;br /&gt;
&lt;br /&gt;
Mc Romika (Argentina)&lt;br /&gt;
https://www.youtube.com/watch?v=0wFFfiSezcQ&lt;br /&gt;
&lt;br /&gt;
MC Zad (México)&lt;br /&gt;
https://www.youtube.com/watch?v=tss8w_7MWGI&lt;br /&gt;
&lt;br /&gt;
Michu Mc (Chile)&lt;br /&gt;
https://www.youtube.com/watch?v=TWIiR-hYYrs&lt;br /&gt;
&lt;br /&gt;
Miss Bolivia (Argentina)&lt;br /&gt;
https://es.wikipedia.org/wiki/Miss_Bolivia_(cantante)&lt;br /&gt;
https://missbolivia.bandcamp.com/&lt;br /&gt;
&lt;br /&gt;
Moyenei (Chile)&lt;br /&gt;
https://www.youtube.com/watch?v=AypAoz3dpEQ&lt;br /&gt;
&lt;br /&gt;
Ms Krazie (México)&lt;br /&gt;
https://www.youtube.com/watch?v=59X04oTPRA4&lt;br /&gt;
&lt;br /&gt;
N&lt;br /&gt;
&lt;br /&gt;
Nakuri del Campo (Costa Rica)&lt;br /&gt;
https://www.facebook.com/NakuryMC&lt;br /&gt;
https://www.youtube.com/watch?v=Pnvj44z0XnM&lt;br /&gt;
&lt;br /&gt;
Nativa (Costa Rica)&lt;br /&gt;
https://www.youtube.com/watch?v=XqOBLJcfbYc&lt;br /&gt;
&lt;br /&gt;
Nefftys (Nogales, Sonora, México)&lt;br /&gt;
https://www.youtube.com/watch?v=uDodHibIlPc&lt;br /&gt;
&lt;br /&gt;
Nina Uma (Bolivia)&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/7-osssea-subliminal-nina-uma?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
https://www.youtube.com/watch?v=qpZWqNVZO2k&lt;br /&gt;
&lt;br /&gt;
Niña Dioz (México)&lt;br /&gt;
https://www.youtube.com/watch?v=6E5nM7Iox_M&lt;br /&gt;
&lt;br /&gt;
O&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
P&lt;br /&gt;
&lt;br /&gt;
Pearls Negras (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?v=rAisOJvLLU8&lt;br /&gt;
&lt;br /&gt;
Petra Rara (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?v=F0vaedHpHps&lt;br /&gt;
&lt;br /&gt;
Pollos Rudos (México) *relacionado con Jezzy P&lt;br /&gt;
https://www.youtube.com/channel/UCLkS_XQ9lsevHEj3MXsd5MQ&lt;br /&gt;
&lt;br /&gt;
Por razones de estado (México)&lt;br /&gt;
https://www.youtube.com/watch?v=I2g4nqPxEzc&lt;br /&gt;
&lt;br /&gt;
Q&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
R&lt;br /&gt;
&lt;br /&gt;
Rabia Rivera (México)&lt;br /&gt;
https://www.youtube.com/watch?v=11kknj1omL8&lt;br /&gt;
&lt;br /&gt;
Rebeca Lane (Guatemala)&lt;br /&gt;
http://www.rebecalane.com/&lt;br /&gt;
https://es.wikipedia.org/wiki/Rebeca_Lane&lt;br /&gt;
https://soundcloud.com/rebeca-lane&lt;br /&gt;
&lt;br /&gt;
Rima Roja En Venus (Quito, Ecuador) *relacionado con Venus Castillo&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/3-mi-estrella-rima-roja-en-venus?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
S&lt;br /&gt;
&lt;br /&gt;
Sara Hebe (Argentina)&lt;br /&gt;
http://sarahebe.com/&lt;br /&gt;
https://es.wikipedia.org/wiki/Sara_Hebe&lt;br /&gt;
https://sarahebe.bandcamp.com/&lt;br /&gt;
&lt;br /&gt;
Saye Skye (Iran/Germany)&lt;br /&gt;
https://www.youtube.com/channel/UCP0jkvpp9igaK5kAoDCcfUQ&lt;br /&gt;
&lt;br /&gt;
Sipas Crew (Perú)&lt;br /&gt;
https://soundcloud.com/somosmujeressomoshiphop/11-kutipakuy-sipas-crew?in=somosmujeressomoshiphop/sets/latinoamerica-unida&lt;br /&gt;
&lt;br /&gt;
Sista Eyerie (México)&lt;br /&gt;
https://www.youtube.com/watch?v=e5yz8AMrmEY&lt;br /&gt;
&lt;br /&gt;
Somadamantina (España)&lt;br /&gt;
https://www.youtube.com/watch?v=0aj2rCT2eeI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
T&lt;br /&gt;
&lt;br /&gt;
Tarja-Preta (Brasil)&lt;br /&gt;
https://www.youtube.com/watch?v=MB2LQlWVWKU&lt;br /&gt;
&lt;br /&gt;
U&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
V&lt;br /&gt;
&lt;br /&gt;
Venus Castillo (Ecuador)&lt;br /&gt;
&lt;br /&gt;
W&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
X&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Y&lt;br /&gt;
&lt;br /&gt;
Yela Quim (Bogotá, Colombia)&lt;br /&gt;
https://www.youtube.com/watch?v=ZvdjCTQirLc&amp;amp;feature=youtu.be&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Z&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9697</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9697"/>
				<updated>2019-03-08T08:02:05Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://temboinalinha.org/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas.&lt;br /&gt;
Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência.&lt;br /&gt;
Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.&lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
Spa: https://donestech.net/files/kitviolencies2019_cast.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan, Spanish&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Hiperderechos- 'Tecnoresistencias'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hiperderecho.org/tecnoresistencias/&lt;br /&gt;
&lt;br /&gt;
Licenseː   Creative Commons Atribución 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.&lt;br /&gt;
&lt;br /&gt;
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Protection International- 'Protection of LGBTI Defenders''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
* '''Podcasts Señoras de internet'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://soundcloud.com/tristanaproducciones/sets/senoras-de-internet&lt;br /&gt;
 &lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Señoras de internet es un podcast ciberfeminista acerca de los futuros porvenires tecnológicos. Es, también, una invitación en formato de podcast a un té radial en el que se degustan las agridulces contradicciones del presente tecnopolítico.&lt;br /&gt;
&lt;br /&gt;
Ladies of the Internet is a cyberfeminist podcast about future technological achievements. It is also an invitation in podcast format to a radio tea in which the bittersweet contradictions of the technopolitical present are tasted.&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9696</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9696"/>
				<updated>2019-03-08T07:55:48Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://temboinalinha.org/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas.&lt;br /&gt;
Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência.&lt;br /&gt;
Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.&lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
Spa: https://donestech.net/files/kitviolencies2019_cast.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan, Spanish&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Hiperderechos- 'Tecnoresistencias'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hiperderecho.org/tecnoresistencias/&lt;br /&gt;
&lt;br /&gt;
Licenseː   Creative Commons Atribución 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.&lt;br /&gt;
&lt;br /&gt;
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Protection International- 'Protection of LGBTI Defenders''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9695</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9695"/>
				<updated>2019-03-07T17:23:52Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://temboinalinha.org/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas.&lt;br /&gt;
Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência.&lt;br /&gt;
Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.&lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Hiperderechos- 'Tecnoresistencias'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hiperderecho.org/tecnoresistencias/&lt;br /&gt;
&lt;br /&gt;
Licenseː   Creative Commons Atribución 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.&lt;br /&gt;
&lt;br /&gt;
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Protection International- 'Protection of LGBTI Defenders''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9694</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9694"/>
				<updated>2019-02-23T12:28:19Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://temboinalinha.org/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas.&lt;br /&gt;
Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência.&lt;br /&gt;
Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.&lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Hiperderechos- 'Tecnoresistencias'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hiperderecho.org/tecnoresistencias/&lt;br /&gt;
&lt;br /&gt;
Licenseː   Creative Commons Atribución 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.&lt;br /&gt;
&lt;br /&gt;
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9692</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9692"/>
				<updated>2019-02-11T12:54:45Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Hiperderechos- 'Tecnoresistencias'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hiperderecho.org/tecnoresistencias/&lt;br /&gt;
&lt;br /&gt;
Licenseː   Creative Commons Atribución 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.&lt;br /&gt;
&lt;br /&gt;
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9691</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9691"/>
				<updated>2019-02-11T12:38:04Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fight Cyberstalking'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.fightcyberstalking.org&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Portuguese&lt;br /&gt;
&lt;br /&gt;
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Stalking Resource Center'' National Center for Victims of Crime '' &lt;br /&gt;
&lt;br /&gt;
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9690</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9690"/>
				<updated>2019-02-07T11:05:22Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
* '''Luchadoras- 'La clicka libres en linea'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.libresenlinea.mx/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9688</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9688"/>
				<updated>2019-01-30T15:43:49Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'Digital Security Helpline Community Documentation'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html&lt;br /&gt;
&lt;br /&gt;
Licenseː  (CC BY 3.0 US) 2019 Access Now. &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9687</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9687"/>
				<updated>2019-01-30T07:30:24Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Licencia Creative Commons Atribución  Compartir Igual 2.5 Colombia&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.&lt;br /&gt;
&lt;br /&gt;
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9685</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9685"/>
				<updated>2019-01-26T13:09:53Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'KIT contra les violències masclistes on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Catalan&lt;br /&gt;
&lt;br /&gt;
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.&lt;br /&gt;
&lt;br /&gt;
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9684</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9684"/>
				<updated>2019-01-08T16:05:41Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y&lt;br /&gt;
experiencias.&lt;br /&gt;
&lt;br /&gt;
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder&lt;br /&gt;
continuar construyendo caminos de resistencia y esperanza.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Jornadas_de_autocuidado_feminista._Cuidado_f%C3%ADsico,_emocional_y_digital,_Colombia&amp;diff=9679</id>
		<title>Jornadas de autocuidado feminista. Cuidado físico, emocional y digital, Colombia</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Jornadas_de_autocuidado_feminista._Cuidado_f%C3%ADsico,_emocional_y_digital,_Colombia&amp;diff=9679"/>
				<updated>2018-12-20T16:14:39Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Jornadas de autocuidado feminista. Cuidado físico, emocional y digital |Category=Privacy Advocacy, Digital Security, Gender and Tech |Star...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Jornadas de autocuidado feminista. Cuidado físico, emocional y digital&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/17&lt;br /&gt;
|End when ?=2018/11/18&lt;br /&gt;
|Number of hours if only one day ?=16&lt;br /&gt;
|Where is located the activity ?=Regional&lt;br /&gt;
|Geo-localization of the activity ?=3.738200500148563, -74.73097193872786&lt;br /&gt;
|Who organize it=Crisálidas &lt;br /&gt;
Corporación Otra Escuela &lt;br /&gt;
CENSAT Agua Viva&lt;br /&gt;
|organisation(s) website=https://www.facebook.com/Crisalidas666/&lt;br /&gt;
www.otraescuela.org&lt;br /&gt;
https://censat.org/&lt;br /&gt;
|For whom is it organized=Mujeres activistas de los derechos de las mujeres y del territorio, organizadas en colectivas afro, indígenas, campesinas y populares del Norte del Cauca, en los municipios de Santander de Quilichao, Suárez, Buenos Aires, Caloto, Toribio. Mujeres entre los 25 y 35 años que viven en los cascos urbanos de estos municipios o en zona rural. Es importante mencionar que quienes viven en zonas rurales, no tienen acceso a dispositivos electrónicos o señal de internet permanente para manejar sus comunicaciones.  Específicamente la convocatoria se hará entre las organizaciones del Colectivo Mujeres Diversas y Paz de Santander de Quilichao, el Proceso de Comunidades Negras -PCN, el Tejido Mujer de la Asociación de Cabildos Indígenas del Norte del Cauca -ACIN, la Escuela de la Sustentabilidad de CENSAT, y la Escuela de formación en incidencia política que adelanta Otra Escuela.&lt;br /&gt;
|How many people trained=33&lt;br /&gt;
|Motivations for organizing training=Las Jornadas de autocuidado feminista surgieron en el marco de la convergencia de los colectivos Crisálidas, CENSAT Agua Viva y Otra Escuela. Estas organizaciones desde diferentes campos de trabajo, impulsamos iniciativas feministas para la construcción de paz en el departamento del Cauca. El contexto en el que se llevó a cabo, fue justamente 8 días antes de la movilización del 25 de noviembre,  día internacional de la No violencia hacia las mujeres. En el Cauca, las mujeres negras, campesinas, indígenas, LBTI y urbanas nos movilizamos por la vía Panamericana. &lt;br /&gt;
&lt;br /&gt;
Algunos elementos de contexto que hacían necesaria esta marcha, es que a pesar de la firma del “Acuerdo Final para la Terminación del Conflicto y la Construcción de una Paz Estable y Duradera” el avance sobre la implementación del mismo ha sido lento y los problemas centrales que produjeron la guerra aún no se desactivan. Del mismo modo, aunque las mujeres hemos resaltado la necesidad de avanzar en la Mesa de Diálogos entre el gobierno y el ELN y hemos llevado propuestas a la misma, notamos poca voluntad política para que esta mesa avance.  Con relación a la implementación del Acuerdo de paz, según el informe de seguimiento de GPAZ (2018), del conjunto de las medidas de género, el 72,48 % han obtenido un desarrollo normativo en contraste con el desarrollo operativo que apenas es de un 17,43 %. El avance es muy lento y como lo hemos sugerido varias mujeres en diversos espacios de análisis y discusión sobre el proceso de paz, lo que sentimos es que “a pesar que haya paz firmada, en realidad no hay paz”. Con preocupación registramos un aumento de la militarización de nuestros territorios, de la criminalización de la protesta, así como de los asesinatos y amenazas a líderes, lideresas y defensoras de derechos humanos. En 2016, fueron asesinadas 295 personas defensoras de derechos humanos en Colombia, el Cauca ocupó el primer lugar con 56 casos. Al igual el aumento de feminicidios y casos de violencias hacia las mujeres y la población LGBTI nos preocupa inmensamente y nos deja claro que a pesar de la firma de la paz las violencias continúan. Paralelo a esta situación observamos cómo se inicia a dar trámite a proyectos de Ley que, de aprobarse, irían en retroceso de nuestros derechos y los de nuestros pueblos. Es el caso del proyecto de Ley 134 que regula el derecho fundamental a la Consulta Previa y ha sido presentado al Senado por la bancada de Cambio Radical. En nuestra opinión, el proyecto es lesivo para los avances y el reconocimiento del derecho al consentimiento previo, libre e informado.&lt;br /&gt;
&lt;br /&gt;
Igualmente, el proyecto del Ministerio de la Familia también presentado por Cambio Radical, reestructura la política social de un modo nefasto sin considerar los contextos sociales, culturales y territoriales de las familias y diversos grupos poblacionales como mujeres, jóvenes, niños, niñas, adultos y adultas mayores. Además, se circunscribe a una visión de la familia que niega la diversidad de la misma en la realidad colombiana.  De otro lado persisten las violencias históricas en nuestros cuerpos, en nuestros territorios y en nuestros pueblos, como mujeres indígenas, negras, campesinas y urbanas sentamos un precedente sobre estas históricas violencias que nos continúan agrediendo. En medio de este contexto, nuestra movilización: “Las mujeres unidas sembramos el camino de la paz”, tiene las siguientes exigencias: &lt;br /&gt;
&lt;br /&gt;
    Por el derecho a la movilización y la protesta social y por la vida de líderesas y líderes&lt;br /&gt;
&lt;br /&gt;
    Porque nuestros derechos y los de nuestros pueblos NO retrocedan: No a la modificación de la Consulta Previa y la restricción de las Consultas Populares para decidir sobre nuestras vidas&lt;br /&gt;
&lt;br /&gt;
    Exigimos que nuestros Territorios sean Libres de Violencias contra las mujeres negras, indígenas, campesinas, LBTI y urbanas. Ni un feminicidio más.&lt;br /&gt;
&lt;br /&gt;
    Rechazamos la negligencia institucional frente a los casos de atención de violencias hacia las&lt;br /&gt;
&lt;br /&gt;
    Por el derecho a familias&lt;br /&gt;
&lt;br /&gt;
    Porque las Mujeres Defendemos la Paz: que avance la implementación del Acuerdo Final y que continúe la Mesa de Negociación entre el Gobierno y el&lt;br /&gt;
&lt;br /&gt;
    Más recursos para la educación pública y menos recursos para la guerra&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
De igual manera, realizamos una ficha de seguridad en la que resaltaban los siguientes elementos de contexto, consultados con varias organizaciones que trabajan en el territorio:  &lt;br /&gt;
    &lt;br /&gt;
1. Durante el último semestre el departamento del Cauca vive un pico de violencia. Las cifras de la Defensoría del Pueblo hablan de 78 líderes sociales asesinados entre el 2016 y 2018, poniéndolo como el departamento con más casos de violencia socio política del país. En los últimos meses tuvimos conocimiento de al menos seis amenazas masivas hacia el movimiento indígena, el movimiento político de la Colombia Humana y las comunidades rurales. Ha ocurrido una masacre de 7 personas más que estremecieron el país en Argelia. En Santander de Quilichao, Buenos Aires y Suárez se han reportado al menos tres asesinatos de profesores. Al parecer por robo de motos. De otro lado, en varias de las veredas de Suárez se han presentado las disidencias y rearmes de FARC socializando nuevas medidas de control social, y formalizando su presencia. Se tiene conocimiento de acciones de inteligencia contras líderes y liderezas que impulsan el proceso de paz con el ELN. Varios contingentes del Ejército y ESMAD  han llegado al casco urbano de Santander de Quilichao en desarrollo de las protestas estudiantiles y el Plan HORUS.   Se recomienda verificar las condiciones de seguridad de cada una de las participantes y monitorear sus traslados hacia la ciudad de Popayán, contar con red de abogados penalistas y transportadores rápidos hacia centros de atención médica. &lt;br /&gt;
 &lt;br /&gt;
2. Los informes del Observatorio de feminicidios de la Red Antimilitarista muestran un aumento de feminicidios en la región del suroccidente del país. Esto ocurre particularmente en el departamento del Valle, pero también el Cauca ha sido uno de los escenarios en donde el tipo de violencia letal contra las mujeres se ha expandido. En los casos que documento la Red Feminista antimilitarista, y otros que nosotras documentamos y presentamos en la Fiscalía y la Alcaldía, lo que se evidenció es que los agresores están relacionados en circuitos de economías ilegales. Esto dificulta que las mujeres denuncien, que los casos sean acompañados y que se realice un debido seguimiento en el norte del Cauca y el sur Del Valle.  La vinculación de los agresores a estos circuitos es un elemento importante a la hora de pensarse la autodefensa feminista porque el poder, la violencia y la corrupción que pueden desplegar es mucho mayor. Estos actores no son objeto de negociación política, ni de increpación moral. Es lo que hace el narco-estilo de vida que cada vez se propaga más por el Norte del Cauca.  La economía ilegal (minería y cultivos de uso ilícito) en sí misma es un factor de exposición a la violencia contra las mujeres y dificulta generar estrategias desde ellas. La economía realiza divisiones sexuales del trabajo, legitima valores, estereotipos y violencias que hacen muy difícil la resistencia y denuncia. Otro elemento es que no tenemos redes seguras de comunicación, al contrario, comunicaciones muy vulnerables para las víctimas y las defensoras.  A esto se le suma el control militar excesivo donde no solamente hay policía, sino policía militar asociada al Plan Horus, el combate de las disidencias y la erradicación forzada. &lt;br /&gt;
 &lt;br /&gt;
3. Justamente el avance del Plan Horus, el combate de las disidencias y la erradicación forzada, ha marcado la tensión en seguridad y protección durante las últimas semanas dado que ha generado la movilización de tropas por los cascos urbanos, la carretera y las veredas. En particular, en los municipios de Corinto, Miranda, Caloto, Toribío y Jambaló.  Así mismo la presencia de agentes del ESMAD en el casco urbano de Santander de Quilichao y en las carreteras por el paro estudiantil. A la militarización se le suma la situación de cortes de luz en las veredas, que es rutinaria, pero que se ha profundizado por la voladura de las torres y estaciones eléctricas. Aparentemente esta voladura ha sido realizada por las disidencias, pero ha sido sugerida por el Fiscal General de la Nación en varias ocasiones. Cualquiera sea su origen, tiene como consecuencias el aumento del precio de la marihuana, la tensión sobre su comercialización y la restricción del uso de los espacios por parte delas mujeres ya que la ausencia de luz impide nuestro tránsito por miedo a ser violadas o atracadas.  En la población joven es muy común el control de las parejas por medio de los dispositivos celulares, uso de claves, interceptaciones de las comunicaciones, y ubicaciones arbitrarias. El rompimiento de estas relaciones ha traído a la postre, el aumento del suicidio en las jóvenes Nasa y los homicidios por parte de sus compañeros (también pasa entre los afros)&lt;br /&gt;
|Upload content=cartelcomobia.jpeg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=DÍA 1&lt;br /&gt;
&lt;br /&gt;
    Juegos de conocimiento y confianza &lt;br /&gt;
&lt;br /&gt;
    Análisis de contexto &lt;br /&gt;
&lt;br /&gt;
    Valoración de amenazas,riesgos,vulnerabilidades e impacto&lt;br /&gt;
&lt;br /&gt;
    Medidas de seguridad en situaciones específicas  &lt;br /&gt;
&lt;br /&gt;
    Seguridad digital básica (teléfono, correo y navegación)&lt;br /&gt;
&lt;br /&gt;
    Actividad de cuidado emocional  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    DÍA 2 &lt;br /&gt;
&lt;br /&gt;
    Juegos de conocimiento y confianza &lt;br /&gt;
&lt;br /&gt;
    Defensa Personal feminista&lt;br /&gt;
&lt;br /&gt;
    Hacker Space&lt;br /&gt;
&lt;br /&gt;
    Actividad de cierre emocional&lt;br /&gt;
|Methodologies for training=Iniciando las jornadas tuvimos la oportunidad de establecer algunos acuerdos para compartir durante los dos días de trabajo propuestos. Aquí algunos de ellos:&lt;br /&gt;
&lt;br /&gt;
- Uso regulado de los celulares&lt;br /&gt;
- Todas estamos pendientes del cuidado de los niños y las niñas&lt;br /&gt;
- Respetar el silencio y el descanso&lt;br /&gt;
- Respecto a las fotografías: las personas que no quieran ser fotografiadas, tendrán un sticker fluorescente; no se harán publicaciones en tiempo real; al final tomaremos una fotografía colectiva.&lt;br /&gt;
- Ser solidarias en el uso de la palabra: no extendernos en nuestras intervenciones; permitir que quienes menos hayan hablado, lo hagan antes de quienes ya han tenido la oportunidad de hacerlo.&lt;br /&gt;
-  Ser puntuales&lt;br /&gt;
- Escuchar desde las diferentes experiencias y perspectivas que tenemos. Reconocernos en esa diversidad.&lt;br /&gt;
- Respeto a las que roncamos&lt;br /&gt;
- Hora de dormir hacia las 11pm. A esa hora no hacer bulla a quienes ya estén descansando.&lt;br /&gt;
- Construir un espacio libre de violencias.&lt;br /&gt;
&lt;br /&gt;
Las metodologías que planteamos fueron didácticas, prácticas, participativas, a la vez reflexivas. Se usó la estrategia del aprendizaje a través del juego y la conciencia corporal. Intentamos compartir con ellas herramientas que posteriormente pudieran desarrollar de manera autónoma. Dividimos el trabajo en cuatro bloques.&lt;br /&gt;
&lt;br /&gt;
En el primer bloque de trabajo, se realizó análisis de contexto, partiendo de describir situaciones reales de riesgo específico que viven las mujeres en sus territorios o en razón de sus pertenencias colectivas, compartiéndolos y comentándolos por medio de un ejercicio de intercambio llamado círculos concentricos, que permitió delimitar cuatro situaciones sobre las cuales iniciar el análisis de  riego y la construcción de alternativas de protección.&lt;br /&gt;
&lt;br /&gt;
Trabajamos en torno a cuatro situaciones:&lt;br /&gt;
- Violencia sexual&lt;br /&gt;
- Desplazamiento forzado&lt;br /&gt;
- Amenazas a lideresas&lt;br /&gt;
- Militarización del territorio&lt;br /&gt;
&lt;br /&gt;
Hicimos el ejercicio de análisis de amenazas, riesgos, vulnerabilidades, impactos, muchas de ellas quedaron semaforizadas en rojo evidenciando que pensado en abstracto y de primera vez, es difícil reconocer las alternativas de protección que en términos prácticos llevamos a cabo a nivel individual y colectivo. No obstante se construyeron medidas de protección que pueden observarse en los anexos de las naves espaciales, por medio de las cuales en cada grupo avanzaron en analizar diferentes amenazas relacionadas con las situaciones o problemáticas delimitadas.&lt;br /&gt;
&lt;br /&gt;
[Ver anexo fotográfico de análisis de riesgos y medidas de protección]&lt;br /&gt;
&lt;br /&gt;
Las participantes comentaron acerca de la importancia de realizar estos ejercicios con sus organizaciones y manifestaron que les gusto la metodología de las naves espaciales.&lt;br /&gt;
&lt;br /&gt;
El segundo el bloque desarrollado fue el de seguridad digital, a través de un diagnóstico participativo (en anexo) , se trabajaron tres temas:  cómo funciona  internet, cómo hacer una clave segura, y mensajerías seguras donde se utilizaron materiales y metodologías del IGT.  Sirvió para ser concientes del riesgo, fue divertido pero hay que hacerlo mucho más práctico sigue siendo un tema con muchos retos por el lenguaje y los nuevos términos que trae. &lt;br /&gt;
&lt;br /&gt;
El tecer bloque, desarrollado en la mañana del domingo, estuvo centrado sobre la conciencia de violencias que vivimos las mujeres en diferentes situaciones y escenarios cotidianos y la posibiliodad de reacción a las mismas desde el cuerpo, el establecimiento de limites, la intuición y la conciencia emocional. &lt;br /&gt;
&lt;br /&gt;
Realizamos actividades de calentamiento articular, acondicionamiento físico, conciencia corporal y emocional, técnicas de Jiujitsu y Hapkido que nos permiten zafarnos de agarres en medio de situaciones de agresión que podamos vivir en círculos cercanos o en contextos de organización y movilización social. &lt;br /&gt;
&lt;br /&gt;
Particularmente trabajamos en torno a la intuición como una disposición que nos permite estar alertas y prevenir situaciones de riesgo. Al respecto se dio un intercambio muy enriquecedor, en el que varias mujeres desde los saberes indígenas y afro, nos permitieron entender de la importancia de silenciar el exterior y concentrarse en las sensaciones y memoria propia, para poder comprender el entorno desde el saber interior.&lt;br /&gt;
&lt;br /&gt;
También trabajamos un espacio de escucha propia y reflexión en torno a la manera como construimos relaciones de pareja y las violencias que allí hay implícitas. Nos fuimos cada una con preguntas propias y con historias de las otras que nos invitaron a transformar esos esquemas de relación. &lt;br /&gt;
&lt;br /&gt;
Finalmente se desarrollo un Hacker space, en el que a pesar de tener algunas dificultades técnicas de internet, propias de las dinámicas de las zonas rurales, pudimos hacer algunos correos seguros, algunas pudieron bajar signal, hacer sus claves seguras para el correo seguro.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Me sentí contenta, por compartir con mujeres diversas, las mujeres estuvieron muy dispuestas, hubo debates interesantes que usualmente no nos planteamos en la ciudad, poder compartir con mujeres de contextos rurales, lo que venimos trabajando como colectiva para pensar desde el cuerpo maneras de defenderse eso me pareció bakano. &lt;br /&gt;
&lt;br /&gt;
    No fuimos muy conscientes de todos los requerimientos de todo las implicaciones, hacemos mas de lo que podemos o no dimensionamos los retos que implica organizar un evento de esta magnitud, se recargó en la persona que estaba local. &lt;br /&gt;
&lt;br /&gt;
    Ganas de seguir trabajando con ellas los temas que abordamos, con más tiempo, con replicas de los talleres directamente en sus comunidades. &lt;br /&gt;
&lt;br /&gt;
    Cedí mucho a la presión del tiempo, fue una época muy saturada de agenda, implicó que estuviera sola organizado y no todo el parche de la organización local, no fuimos claras en la distribución de tareas, es necesario que verbalizar las cosas, hacer específico quien se encarga de qué. &lt;br /&gt;
&lt;br /&gt;
    Quedé con muchas responsabilidades posteriores logísticas. Estoy acostumbrada a no poner límites y asumir responsabilidades. Estoy en proceso de poder cambiarlo, por eso no voy a escribir este reporte y pido a alguien más que lo pueda consolidar.&lt;br /&gt;
|Feedbacks=Algunos de los comentarios que recibimos fueron: &lt;br /&gt;
                                    &lt;br /&gt;
Por mejorar&lt;br /&gt;
-Hacer otro curso más intenso&lt;br /&gt;
-Que se tomen las fotos antes de que se vayan las chicas&lt;br /&gt;
-Propongo que el ejercicio de seguridad digital sea por medio de un baile&lt;br /&gt;
-Nada en realidad… estamos aprendiendo&lt;br /&gt;
-Me hizo falta un cierre con estiramiento, creo que ayuda al cuerpo&lt;br /&gt;
-La regularidad de los encuentros. Son geniales.&lt;br /&gt;
-Más que mejorar es buscar la forma de que esta práctica sea por más tiempo&lt;br /&gt;
-Con tan poco tiempo fue tremendo aprendizaje. Gracias!&lt;br /&gt;
-Por mejorar mi estado físico y la conciencia de mí misma, mis capacidades y aptitudes&lt;br /&gt;
-Difícil hacerlo mejor con tan poco tiempo… tal vez prevenir que vamos a sudar mucho&lt;br /&gt;
-Tener más en cuenta las personas con discapacidad&lt;br /&gt;
-Esperamos que este taller se repita con más específicidad sobre otros temas de seguridad digital &lt;br /&gt;
-Puede mejorar la explicación de las herramientas de protección digital haciendo uso de los computadores y celulares directamente &lt;br /&gt;
-Puede mejorar guardar mejor los tiempos y establecer un límite para las intervenciones &lt;br /&gt;
   &lt;br /&gt;
&lt;br /&gt;
Preguntas&lt;br /&gt;
-Hay videos para seguir aprendiendo?&lt;br /&gt;
-Cómo hacer para que estos escenarios tengan continuidad?&lt;br /&gt;
-Es posible replicar esta actividad en el municipio otra vez… es necesario compartir más&lt;br /&gt;
-Me pregunto cómo potenciar mis capacidades corporales y emocionales&lt;br /&gt;
-Hay tutoriales para practicar la defensa feminista?&lt;br /&gt;
-Muchas. Sobre todo para profundizar los temas. Ayer estuve leyendo del wendo, increíble. Por otro lado me queda curiosidad por una defensa grupal.&lt;br /&gt;
-Cuándo se vuelve a hacer otro taller?&lt;br /&gt;
-Cómo se le da continuidad en los territorios?&lt;br /&gt;
-Nos invitan para una próxima?&lt;br /&gt;
&lt;br /&gt;
Me gustó&lt;br /&gt;
- El espacio se presta para estar tranquilas&lt;br /&gt;
-Me gustó la comida &lt;br /&gt;
-Me gustó la metodología &lt;br /&gt;
-Me gustó que pensaran en los niños y niñas&lt;br /&gt;
-Me gusto encontrarnos entre mujeres  &lt;br /&gt;
-Que no fue mucha teoría sino que hicimos la práctica que es muy importante&lt;br /&gt;
-Todo. Súper lindas ustedes guiándonos. Gracias.&lt;br /&gt;
-Enseñó a tener conciencia de mi cuerpo&lt;br /&gt;
-Sólo me resta dar mil gracias por permitirme reaprender y facilitar el proceso. La logística y los temas, al igual que la metodología&lt;br /&gt;
-Me encantó, aprendí mucho, me brindó muy buenas herramientas. Salgo feliz, gracias!&lt;br /&gt;
-Todo. Me encantó esta clase, aprendí muchísimo&lt;br /&gt;
-Todo, gracias!&lt;br /&gt;
-Me voy muy contenta porque me gustó todo lo que dieron en el taller&lt;br /&gt;
-Me encantó el ejercicio de la intuición!! Poder mostrar a las compañeras que podemos confiar en nosotras mismas, en la naturaleza que habita en nosotras y en los ancestros.&lt;br /&gt;
-Todo! Me encantó la forma como está planteado el taller. Que toque varios aspectos del autocuidado, tanto físicos como el de la intuición!! Tejámonos!!&lt;br /&gt;
-Me gustó estar con un grupo de mujeres que a pesar de sus problemas físicos tienen toda la actitud y disposición.&lt;br /&gt;
-Estos días han sido muy importantes en mi vida, gracias para todas estas mujeres que luchan con corazón.&lt;br /&gt;
-Me gusta todo y las enseñanzas que compartieron las demás&lt;br /&gt;
-Me gustó descubrir que soy más fuerte de lo que creo&lt;br /&gt;
|START=Llegar mucho antes al espacio, para poder comenzar a primera hora.&lt;br /&gt;
&lt;br /&gt;
    Mejorar el manejo del tiempo &lt;br /&gt;
&lt;br /&gt;
    Calcular más tiempo par el hacker space, para hacer del aprendizaje algo corporal. &lt;br /&gt;
&lt;br /&gt;
    Verbalizar las responsabilidades&lt;br /&gt;
&lt;br /&gt;
    Actividad del garbanzo para manejar el tiempo (tres garbanzos tres intervenciones)&lt;br /&gt;
&lt;br /&gt;
    Mas actividades de conocimiento para ganar confianzas &lt;br /&gt;
&lt;br /&gt;
    Ser mas disciplinadas, &lt;br /&gt;
&lt;br /&gt;
    Revisar mejor el presupuesto&lt;br /&gt;
|STOP=Trasnochamos preparando las actividades, hizo que estuviéramos cansadas en la noche y no tuviéramos la fuerza de hacer actividades complementarias en la noche.&lt;br /&gt;
&lt;br /&gt;
    Escoger fechas donde hay saturación de actividades &lt;br /&gt;
&lt;br /&gt;
    Separar espacios de teoría y práctica en particular en los temas de seguridad digital&lt;br /&gt;
&lt;br /&gt;
    No descargar los archivos que se trabajan en linea (se borró una agenda muy importante, porque el internet estaba mal en la zona)&lt;br /&gt;
|KEEP=Juegos para explicar los riesgos &lt;br /&gt;
&lt;br /&gt;
    La comida rica, la pregunta previa por dietas, cuidados médicos y presencia de hijos e hijas &lt;br /&gt;
&lt;br /&gt;
    Escoger lugares amplios y con mucho verde&lt;br /&gt;
&lt;br /&gt;
    Trabajar con colectivas diversas &lt;br /&gt;
&lt;br /&gt;
    Mantener la preocupación por que las mujeres urbanas no acaparemos la palabra, para la participación de todas las participantes, cuidado con la palabra.  &lt;br /&gt;
&lt;br /&gt;
    Mantener número de participantes pequeño para que todas puedan participar, &lt;br /&gt;
&lt;br /&gt;
    Decidir hacerlo descentralizado de ciudades principales&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Cartelcomobia.jpeg&amp;diff=9678</id>
		<title>File:Cartelcomobia.jpeg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Cartelcomobia.jpeg&amp;diff=9678"/>
				<updated>2018-12-20T16:14:31Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=SEGUNDO_CAMPAMENTO_FEMINISTA_PARA_MUJERES_J%C3%93VENES,_Oaxaca,_Mexico&amp;diff=9677</id>
		<title>SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES, Oaxaca, Mexico</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=SEGUNDO_CAMPAMENTO_FEMINISTA_PARA_MUJERES_J%C3%93VENES,_Oaxaca,_Mexico&amp;diff=9677"/>
				<updated>2018-12-20T15:43:05Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2018/11/16 |...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=SEGUNDO CAMPAMENTO FEMINISTA PARA MUJERES JÓVENES&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/16&lt;br /&gt;
|End when ?=2018/11/18&lt;br /&gt;
|Number of hours if only one day ?=28&lt;br /&gt;
|Where is located the activity ?=Regional&lt;br /&gt;
|Geo-localization of the activity ?=17.106454291006255, -96.69994138165993&lt;br /&gt;
|Who organize it=Consorcio para el Diálogo Parlametario y la Equidad Oaxaca A.C.&lt;br /&gt;
|organisation(s) website=www.consorciooaxaca.org.mx&lt;br /&gt;
Facebook: @consorcio.oaxaca&lt;br /&gt;
Twitter: @consorciooaxaca&lt;br /&gt;
|For whom is it organized=Mujeres jóvenes entre 14 y 19 años de edad, de las regiones Valles Centrales y Mixteca del&lt;br /&gt;
estado de Oaxaca, con potencial liderazgo en sus comunidades.&lt;br /&gt;
|How many people trained=22&lt;br /&gt;
|Motivations for organizing training=Desde Consorcio Oaxaca, hemos percibido la baja existencia de mujeres jóvenes y adolescentes acercándose al feminismo y al movimiento social de derechos de las mujeres.&lt;br /&gt;
En principio, nos preguntábamos cómo percibían el feminismo las jóvenes adoslecentes hijas de defensoras y activitas cercanas a Consorcio Oaxaca. De ahí, que realizamos un Primer campamento para mujeres jóvenes en el mes de junio de este 2018, con la participación de 9 mujeres entre los 14 y 17 años de edad.&lt;br /&gt;
&lt;br /&gt;
De forma paralela a esta inquietud, nos encontramos con comentarios de descareditación a las feministas en talleres, conversatorios y capacitaciones impartidas a jóvenes de nivel media superiror y superior. El planteamiento de las jóvenes fue que, el movimiento se había vuelto muy radical, que ahora es igual al machismo pues busca dominar a los hombres, y que ya no hace falta que exista el feminismo, pues ya se tiene igualdad de derechos entre mujeres y hombres. Sin embargo, no encontramos que los grupos de jóvenes tuvieran una claridad de la definición del concepto como tal, la historia, principios, agendas y debates actuales del movimiento y filosofía feminista.&lt;br /&gt;
&lt;br /&gt;
Consideramos que lo anterior se debe a que las generaciones jóvenes, debido a que forman parte de un momento histórico en el que ya hay avances en materia de derechos humanos de las mujeres, se les dificulta ubicar las brechas y violencias de género que aún existinten; a pesar de que el contexto local refleja cotidianamente el incremento de las violencia feminicida en el estado de Oaxaca. Violencia familiar, delitos sexuales, desapariciones y&lt;br /&gt;
feminicidios forman parte de las estadísticas alarmantes en la entidad.&lt;br /&gt;
&lt;br /&gt;
En los dos años que lleva la actual administración estatal, se tiene registro de 237 feminicidios en las 8 regiones en las que se divide Oaxaca. El 57.4% de los feminicidios las mujeres fueron asesinadas a balazos por lo nos preguntamos, de dónde están saliendo las armas, siendo evidente que el Estado no tiene regulación en el tráfico y portación ilegal.&lt;br /&gt;
&lt;br /&gt;
Entre otras formas en las que asesinan a las mujeres se encuentran: asfixia, golpes, degollamientos, puñaladas o incineradas, lo que demuestra la saña y el odio. En el 64% de los casos de feminicidios en los que es posible conocer la relación con el agresor éste tenía o tuvo un relación sentimental con la víctima (novio, esposo, concubino, &lt;br /&gt;
ex novio, ex esposo). El rango de edad en el que se comete el mayor número de feminicidios en Oaxaca oscila entre los 11 a 40 años.&lt;br /&gt;
&lt;br /&gt;
En el tema de desapariciones hemos documentado desde Consorcio Oaxaca, 398 mujeres. Lo que demuestra la incapacidad de las instancias gubernamentales para proteger y garantizar la vida de las mujeres. Ante lo anterior, la percepción negativa que se tiene del feminismo nos parece grave, pues al no haber programas formales sobre dercehos de las mujeres que estén transformando la cultura patriarcal que sustenta dichas violencia de género, la desinformación perpetúa lasdesigualdades y agresiones que las mujeres viven desde temprana edad. &lt;br /&gt;
&lt;br /&gt;
Por tanto, nos planteamos generar un espacio de encuentro lleno de actividades agradables y dinámicas&lt;br /&gt;
para escuchar, analizar y dialogar sobre cómo viven los contexto reales las jóvenes en el estado.&lt;br /&gt;
&lt;br /&gt;
La formación se planificó con una doble intención, por un lado, realizar una revisión que nos permitiera retroalimentar las líneas de acción planteadas en el programa de jóvenes; para así, continuar trabajando de manera más pertinente con las juventudes de Oaxaca. Una segunda intención resulta el principal objetivo del campamento, generar un proceso de formación, autoconocimiento, acercamiento al feminismo y deconstrucción de ideas patriarcales a través de la aproximación y reflexión de conceptos, prácticas y expresiones del movimiento feminista para dotar de herramientas prácticas y teóricas para hacer frente a las violencias y discriminación de género.&lt;br /&gt;
|Links about the activity=http://consorciooaxaca.org.mx/jovenes-mujeres-participan-en-campamento-feminista/&lt;br /&gt;
|Upload content=Campamentofeminista.png&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Objetivo: Generar un proceso de formación, autoconocimiento, acercamiento al feminismo&lt;br /&gt;
y deconstrucción de ideas patriarcales a través de la aproximación y reflexión de conceptos,&lt;br /&gt;
prácticas y expresiones del movimiento feminista.&lt;br /&gt;
&lt;br /&gt;
Dirigido a: un grupo de mujeres jóvenes entre 14 y 19 años de edad, radicadas en la ciudad&lt;br /&gt;
de Oaxaca de Juárez, Valles Centrales y Mixteca de Oaxaca, que tienen un potencial&lt;br /&gt;
liderazgo en sus comunidades.&lt;br /&gt;
&lt;br /&gt;
Temas:&lt;br /&gt;
Género y feminismo&lt;br /&gt;
Deconstruyendo el amor romántico&lt;br /&gt;
Autonomía corporal y autocuidado: deconstruyendo estereotipos de belleza&lt;br /&gt;
Derechos sexuales y reproductivos&lt;br /&gt;
Violencias machistas: en el espacio público y la web&lt;br /&gt;
Sororidad&lt;br /&gt;
&lt;br /&gt;
Actividades:&lt;br /&gt;
Presentación&lt;br /&gt;
Acuerdos de convivencia y expectativas&lt;br /&gt;
Cine debate&lt;br /&gt;
Mesas de diálogo&lt;br /&gt;
Taller de elaboración de jabones terapéuticos para nuestro autocuidado&lt;br /&gt;
Juegos grupales sobre acoso sexual callejero y ciberviolencias&lt;br /&gt;
Sesión de básicos de autodefensa feminista&lt;br /&gt;
Taller de pintura de espejos de Santa Ana Zegach&lt;br /&gt;
|Methodologies for training=En la implementación de la formación, se utilizó la metodología de desarrollo participativo,&lt;br /&gt;
la cual implica procesos que reconocen a las participantes de las actividades como agentes&lt;br /&gt;
activos en la construcción del conocimiento. Esta metodología promovió y procuró la&lt;br /&gt;
participación de todas las jóvenes que atendieron a la convocatoria, lo cual permitió:&lt;br /&gt;
&lt;br /&gt;
Profundizar y sistematizar ideas y conocimientos que el grupo tiene sobre el feminismo.&lt;br /&gt;
&lt;br /&gt;
Ampliar y profundizar el análisis sobre los elementos que actúan en la dinámica de la problemática de violencia contra las mujeres y analizar las relaciones que se establecen entre sí, en la esfera del sistema patriarcal capitalista dominante.&lt;br /&gt;
&lt;br /&gt;
Diagnosticar las realidades diversas de las mujeres jóvenes en Oaxaca.&lt;br /&gt;
&lt;br /&gt;
Relacionar los problemas que viven con el sistema patriarcal, la discriminación y violencia hacia las mujeres&lt;br /&gt;
Identificar las alternativas, alcances y líneas de acción que puede asumir el grupo que toma el taller.&lt;br /&gt;
&lt;br /&gt;
Técnicas instruccionales:&lt;br /&gt;
&lt;br /&gt;
Para alcanzar el cumplimiento de los objetivos y las expectativas planteados en el curso, se utilizaron técnicas instruccionales en momentos claves de la formación.&lt;br /&gt;
&lt;br /&gt;
Técnicas de presentación:&lt;br /&gt;
Comprenden las dinámicas con las que puede contar el facilitadora para “romper el hielo” en los nuevos grupos de trabajo. Se busca integrar a los participantes, creando un clima favorable para la capacitación y para analizar las formas de socialización en grupos de mujeres y ejercicio del liderazgo entre pares.&lt;br /&gt;
&lt;br /&gt;
Técnica expositiva:&lt;br /&gt;
Consiste en la exposición de los conceptos principales a manejar en el transcurso de las sesiones del curso. Su aplicación consta de tres momentos:&lt;br /&gt;
&lt;br /&gt;
• Introducción: Se anuncian los puntos que serán tratados en el curso, estimulando la motivación y el interés de las jóvenes participantes.&lt;br /&gt;
• Desarrollo: Se proporciona la información necesaria a manejar como resultado del aprendizaje de quienes participan en el curso, promoviendo la interacción y la recuperación de aportaciones que enriquecen la temática.&lt;br /&gt;
• Síntesis: Se destacan los aspectos importantes dentro del curso, y se ayuda al grupo a estructurar y retener los contenidos clave previamente desarrollados.&lt;br /&gt;
&lt;br /&gt;
Técnica diálogo-discusión: &lt;br /&gt;
En esta técnica se genera en el grupo el análisis de contenidos, realizando un intercambio de experiencias, ideas, opiniones y conocimientos sobre el tema del feminismo, derechos humanos de las jóvenes, las violencias y discriminación de género.&lt;br /&gt;
&lt;br /&gt;
Técnica de discusión dirigida:&lt;br /&gt;
El grupo diserta en torno a algún tema específico, la facilitadora guía al debate hacia el alcance de objetivos de aprendizaje predeterminados. Puede convertirse en una discusión creadora siempre y cuando sea conducida adecuadamente.&lt;br /&gt;
&lt;br /&gt;
Técnica de ludopedagogía:&lt;br /&gt;
Aprendizaje y reflexión colectiva sobre una temática a través del juego y desde lo vivencial para facilitar la apropiación del conocimiento y comprensión teórica teórica de acuerdo a la experiencia de cada joven participante.&lt;br /&gt;
|Existing toolkits and resources=Juegos grupales: &lt;br /&gt;
Impresión de lonas con juegos tipo La Oca y tablero por una vida libre de acoso en las calles y en la web.&lt;br /&gt;
Para esto desarrollamos dos dinámicas de juego a partir de la adaptación de juegos populares, adecuándo las reglas clásicas a los temas de acoso sexual callejero y ciber violencias.&lt;br /&gt;
&lt;br /&gt;
Las impresiones se realizaron en lona a tamaños de 2 x 3 mts.&lt;br /&gt;
&lt;br /&gt;
Videos:&lt;br /&gt;
Proyectamos y compartimos videos sobre la historia del feminismo, sexting, amor romántico y seguridad digital realizados por colectivas como Luchadoras, Estereotipas, Rizomáticas; por mencionar algunas.&lt;br /&gt;
&lt;br /&gt;
Apoyo visual para exposiciones:&lt;br /&gt;
Materia realiazod en formato PPT, con información extraíada de diversas fuentes, sobre temas de género, feminismo, violencia de género, y seguridad digital con apoyo del material dispuesto en el gendersec facilitado por Tactical Tech.&lt;br /&gt;
&lt;br /&gt;
Afiches informativos:&lt;br /&gt;
Realizamos diseños que contenían los derechos sexuales y reproducivos, derechos de las y los jóvenes, aspectos del feminismo y información clave para identificación de violencias patriarcales.&lt;br /&gt;
Estos materiales visieron la sala principal de trabajo durante los 3 días, en un tamaño tabloide para estar visibles permanentemente.&lt;br /&gt;
&lt;br /&gt;
Manual de creación propia del acoso sexual callejero: &lt;br /&gt;
Contamos con un manual, esfuerzo de realización de jóvenes de Consorcio Oaxaca y con ilustraciones de una artista gráfica oaxaqueña.&lt;br /&gt;
&lt;br /&gt;
Manual de hierbas contra la tristeza:&lt;br /&gt;
Para complementar el taller de elaboración artesanal de jabones terapéuticos, compartimos este manual. El cual es muy puntual sobre el uso de algunas plantas medicinales para tratar la tristeza, además de contar con una bella narrativa por parte de la creadora.&lt;br /&gt;
&lt;br /&gt;
Anexo 4. Adaptación del juego de la oca por una vida libre de acoso sexual callejero&lt;br /&gt;
&lt;br /&gt;
Anexo 5. Tablero por una vida libre de acoso en las calles y en la web&lt;br /&gt;
&lt;br /&gt;
Anexo 6. Platilla de pegotinas&lt;br /&gt;
&lt;br /&gt;
Anexo 7. Manual de acoso sexual callejero&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Notamos el gran avance que se logró para articula el diseño, metodología y logística de la formación, en comparación con el Primer campamento feminista para mujeres jóvenes. Al interior de Consorcio Oaxaca, ha sido un trabajo hermoso, pues ha implicado hacer utilidad al máximo las características de transdisciplinariedad y interculturalidad con el que cuenta la organización. Internamente, también nos permitió compartir herramientas conocidas en&lt;br /&gt;
el IGT pasado.&lt;br /&gt;
&lt;br /&gt;
Los resultados, dejó a todo el equipo de facilitadores muy satisfechas por el interés y la participación activa de las jóvenes que atendieron a la formación. Logramos retroalimentar de maenra efectiva las líneas de acción para el programa de jóvenes de Consorcio Oaxaca, a través de conocer las experiencias y percepciones de las asistentes en lo relativo a las violencias y discriminación de género. &lt;br /&gt;
&lt;br /&gt;
De manera personal, para cada facilitadora fue inspirador compartir entre todas un espacio  de confianza y convivencia entre tantas mujeres jóvenes, incluidas las que formamos parte del equipo, el rango total de edades osciló entre los 14 y 35 años; significando una riquezade aprendizaje sobre la diversidad del ser mujer y la libertad que queremos para cada una de nosotras.&lt;br /&gt;
|Feedbacks=Las jóvenes que atendieron la formación manifestaron sentirse satisfechas, felices agradecidas y seguras de que tomaron la decisión correcta al aceptar la invitación para ser parte del Segundo campamento feminista para mujeres jóvenes que realizó Consorcio Oaxaca. &lt;br /&gt;
&lt;br /&gt;
Como parte de las expectativas, mencionaron el interés por conocer sobre la historia del feminismo, ser más autónomas como mujeres a partir del conocimiento de sus derechos y aprender a poner límites cuando viven agresiones o violencias que no reconocen como tal por definición, pero que intuitivamente saben no está bien que vivan esas situaciones.&lt;br /&gt;
&lt;br /&gt;
Al igual que en el Primer campamento, la principal valoración de la formación se colocó en poder contar con espacios donde convivir con otras mujeres de su edad y la inquietud de poder compartir con más jóvenes lo aprendido y reflexionado en el campamento, entendiendo que el feminismo es vital para gozar una vida en libertad, con igualdad de derechos y oprotunidades. &lt;br /&gt;
&lt;br /&gt;
En la evaluación, refirieron que fue poco el tiempo para tantas temáticas que les son importantes, por tal motivo declararon tener interés de seguir siendo invitadas a talleres o  charlas sobre el feminismo y los derechos de las mujeres jóvenes.&lt;br /&gt;
 &lt;br /&gt;
Un 40% de las chicas, colocó como primer tema de interés, las violencias en las redes y el acoso sexual  callejero/autodefensa. El resto se divide en interés entre amor romántico, derechos sexuales y reproductivos, estereotipos de belleza y estudio de las corrientes del feminismo.&lt;br /&gt;
|START=El equipo que participamos de la formación aprendimos mucho con ésta experiencia de lasbondandes y beneficios de las herramientas y protocolos de seguridad para la planeación y ejecución de actividades.&lt;br /&gt;
&lt;br /&gt;
Fundamentalmente, nos enrriqueció para animarnos a repetir un proceso con mujeres menores de edad, donde en esta ocasión, logramos llegar a jóvenes que no tenían ningún acercamiento con movimientos de defensa de derechos humanos o activismo, a diferencia del primer campamento donde la mayoría de las asistentes tenía una referencia previa del trabajo de Consorcio Oaxaca. &lt;br /&gt;
&lt;br /&gt;
Para el segundo campamento tomamos de referencia los procesos previos ejecutados por Tactical Tech para el IGT del 2018 en Uruguay. Además, de ampliar y fortalecer el abordaje que desde el equipo facilitador hemos hecho sobre la seguridad digital y el acceso de las mujeres a la generación de contenidos y dominio del Internet. &lt;br /&gt;
&lt;br /&gt;
Nos interesa incluir temas más avanzados como el impacto de las tecnologías y navegación en la web en el medio ambiente y sustentabilidad de las comunidades, como parte de nuestro cuestionamiento al consumismo y capitalismoliado, aliados nefastos del patriarcado. Así como ofertar formaciones de carácter técnico sobre uso de las TIC ́s.&lt;br /&gt;
|STOP=El trabajo con las jóvenes durante los tres días fue realmente maravilloso y motivador, sin embargo, para la replica de esta formación consideramos que habría que acotar las temáticas abordadas, para centrar la energía y distribución de tiempos sin agotar a las asistentes, o poder contar con presupuesto para realizarse en periódo vacional y disponer de cinco días de trabajo con las jóvenes. &lt;br /&gt;
&lt;br /&gt;
Pero en definitiva, repetir un programa tan cargado no es estratégico, pues si bien mueve el interés de las jóvenes asistentes, al final se generó el sentimiento de que faltó profundizar en algunos temas que son de su amplio interés, como el amor romántico y los derechos sexuales y reproductivos. &lt;br /&gt;
&lt;br /&gt;
Para solventar esto, mantendremos la intención de dar seguimiento al grupo y buscar financiación para más talleres con estas jóvenes.&lt;br /&gt;
|KEEP=Aplicar las estrategias de confidencialidad y seguridad en las actividades a realizar. Aspiramos a concretar un espacio a mediano plazo, donde podamos juntar a los dos grupos de jóvenes que asistieron al primero y segundo campameto feminista para mujeres jóvenes, en un espacio más retirado de la ciudad y en contacto con la naturaleza. &lt;br /&gt;
&lt;br /&gt;
Lo aprendido logística y metodologicamente en este segundo campamento será fundamental para poder concretar una propuesta sin riesgos para las participantes durante la planeación y ejecución de la actividad vislumbrada. En materia de las temáticas, nos queda clara la necesidad de continuar formándose en la seguridad digital con enfoque feminista para poder dar soluciones concretas a los graves ataques que las jóvenes están viviendo en el contexto local. Es una violencia que está siendo entrada para agresiones más fuertes como la desaparición y violaciones con el componente de chantaje, y se cuenta con pocas capacidades para atenderlas en los sectores familiar, educativo y legislativo en el estado. &lt;br /&gt;
&lt;br /&gt;
En definitiva, los portales y colectivas conocidas gracias al IGT, seguirán siendo un referente para el trabajo con jóvenes.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Campamentofeminista.png&amp;diff=9676</id>
		<title>File:Campamentofeminista.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Campamentofeminista.png&amp;diff=9676"/>
				<updated>2018-12-20T15:36:01Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_sobre_seguridad_f%C3%ADsica,_digital_y_dem%C3%A1s_chiches_tecno-feministas,_Paraguay&amp;diff=9675</id>
		<title>Taller sobre seguridad física, digital y demás chiches tecno-feministas, Paraguay</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_sobre_seguridad_f%C3%ADsica,_digital_y_dem%C3%A1s_chiches_tecno-feministas,_Paraguay&amp;diff=9675"/>
				<updated>2018-12-20T15:26:04Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Taller sobre seguridad física, digital y demás chiches tecno-feministas |Category=Privacy Advocacy, Digital Security, Gender and Tech |St...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller sobre seguridad física, digital y demás chiches tecno-feministas&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/12/12&lt;br /&gt;
|End when ?=2018/12/12&lt;br /&gt;
|Number of hours if only one day ?=8h30&lt;br /&gt;
|Where is located the activity ?=Nivel nacional&lt;br /&gt;
|Geo-localization of the activity ?=-25.145804839054776, -57.543456319492634&lt;br /&gt;
|Who organize it=Geochicas (Latam)&lt;br /&gt;
TEDIC (Paraguay)&lt;br /&gt;
MediaRed (Uruguay)&lt;br /&gt;
Centro de Documentación y Estudios (Paraguay)&lt;br /&gt;
Fundación Activismo Feminista Digital (Argentina)&lt;br /&gt;
Cuerpo de Abogadas Feministas (Argentina)&lt;br /&gt;
Feministas Autónomas (Bolivia)&lt;br /&gt;
|organisation(s) website=Geochicas.org&lt;br /&gt;
Tedic.org&lt;br /&gt;
Facebook.com/mediareduy&lt;br /&gt;
cde.org.py&lt;br /&gt;
activismofeministadigital.org&lt;br /&gt;
cafcordoba.com.ar&lt;br /&gt;
|For whom is it organized=La actividad estuvo orientada hacia mujeres activistas de organizaciones y colectivas de Paraguay con conocimientos básicos que cuentan con plataformas digitales y necesidades sobre seguridad digital, derecho digital, accesibilidad.&lt;br /&gt;
|How many people trained=23&lt;br /&gt;
|Motivations for organizing training=La principal motivación que llevó a la organización del taller en Paraguay se debió a que en el IGT 2018 no hubo presencia de compañeras pertenecientes a colectivas de este país, siendo que asimismo demostraron interés en presenciar actividades de réplica que contribuyera a obtener un mayor conocimientos de aspectos técnicos y jurídicos vinculados con las TIC.-&lt;br /&gt;
El contexto político paraguayo está teñido de una fuerte impronta de vigilancia y control hacia las organizaciones que trabajan en defensa de derechos humanos, manifestando grandes preocupaciones por las vulneraciones sufridas a través de sus dispositivos. Lo que se enmarca en un contexto latinoamericano en que ha avanzado en varios países gobiernos de extrema derecha que acentúan las desigualdades sociales y buscan acallar los reclamos populares articulados a través de las organizaciones civiles.&lt;br /&gt;
|Upload content=TallerTEDIC.jpeg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Estructura del taller&lt;br /&gt;
Introducción (20 mins) - Ida&lt;br /&gt;
&lt;br /&gt;
- Importancia de la seguridad. ¿Por qué es importante la privacidad y la seguridad digital para las organizaciones ylas activistas? &lt;br /&gt;
&lt;br /&gt;
Primera parte (1:00 horas) - Alfa&lt;br /&gt;
&lt;br /&gt;
- Qué es el internet, cómo funciona. Expansión de la misma. Formas de control y procesamiento de datos. Cómo cuidarmi identidad virtual. Quétener en cuenta cuandonavego en internet.&lt;br /&gt;
- Medios seguros para comunicaciones&lt;br /&gt;
&lt;br /&gt;
Origen de Internet&lt;br /&gt;
Uso de Internet y su crecimiento en el tiempo, para conocer quienes son sus dueños, con qué intereses se creó internet y los peligros que la misma representa.&lt;br /&gt;
Modelo OSI, (sistema de capas) con pautas a seguir c¡por cada fabricante para que sus productos se pudieran comunicar entre sí, dando origen al intercambio deinformación en forma masiva y cada vez mas inmediata.&lt;br /&gt;
La Falsa Nube. Se explica donde se almacena y por donde pasa toda la información que se transmite por internet. AGrupacion de computadores (servidores con grancapacidad de almacenamiento). &lt;br /&gt;
Lista de servidores feministas&lt;br /&gt;
Tecnología vs Privacidad: reconocimiento facial, correo electrónico, dirección IP, GPS y Apps de mensajería.-&lt;br /&gt;
Para que sirve nuestra información? estadísticas, auditorias, marketing, Herramientas de censura/contro. A partir de ello se desarrolló una especie de ciencia que sedenomima como Business Intelligence. Big Data como herramienta de censura y control.-&lt;br /&gt;
Que información tiene Facebook sobre nosotras? El caso Cambridge Analytica y su influencia en las elecciones presidenciales norteamericanas&lt;br /&gt;
Aplicaciones de mensajeria segura&lt;br /&gt;
Internet de las Cosas. Casas inteligentes, autos inteligentes. La información que absorben y las actividades deperfilamiento de nuestras rutinas diarias.&lt;br /&gt;
&lt;br /&gt;
Almuerzo (1:30 mins)&lt;br /&gt;
&lt;br /&gt;
Segunda parte (1:30 horas) - Eugenia y Elena (revisen por fa la ley Ley 5.777 de Protección integral a las mujerescontra toda forma de violencia, Artículo 6, inciso L)&lt;br /&gt;
De la violencia análoga a la violencia digital&lt;br /&gt;
- Que se entiende por violencia de género digital. Sus diferencia con la violencia telemática. Diferencia con la violencia psicológica y  simbólica.&lt;br /&gt;
- Conductas dañosas: doxing, difusión no consentida de material íntimo, acoso digital, hackeo de redes sociales, trolling, vigilancia y control edtatal y de empresas capitalistas, apps que refuerzan los estereotiupos, brecha de gènero de gènero digital, etc.&lt;br /&gt;
- Protocolo de actuación primaria frente a delitos/conductas dañosas machistas en internet.&lt;br /&gt;
- Derechos conculcados. Nuevos derechos humanos digitales. Herramientas legales y mecanismos de denuncia.(La perspectiva legal ante lasviolencias digitales,experiencias concretas y perspectivas para analizar en Paraguay)&lt;br /&gt;
- Manejo de evidencia digital. Preservar los id de las publicaciones que querramos denunciar. Herramientas OSINT. caja de herramientas ciberpatrulla.com. Página de certificaciones online con blockchain. la importancia de contar con perito informático.&lt;br /&gt;
&lt;br /&gt;
Tor- DUck Duck Go para celular instalar Orbot Orfox&lt;br /&gt;
&lt;br /&gt;
Contar con organizaciones sociales que actuan de intermediarias entre Facebook Cono Sur y la comunidad para agilizar canal de denuncia ante baja de perfiles de compañeras o denunciar contenido&lt;br /&gt;
&lt;br /&gt;
Herramienta de almacenamiento de contraseñas Keepass&lt;br /&gt;
&lt;br /&gt;
COrreo seguro: riseup o proton mail &lt;br /&gt;
&lt;br /&gt;
Café (20 mins)&lt;br /&gt;
&lt;br /&gt;
Tercera parte (2:30 horas) - Todas&lt;br /&gt;
-Práctica para ver qué tienen público, privado, filtros.&lt;br /&gt;
|Methodologies for training=El taller se organizó de manera remota entre Uruguay, Bolivia, Argentina y Paraguay (con las facilitadoras) a través de reuniones periódicas virtuuales y grupo de mensajería. Se concretó la réplica en Paraguay por la facilidad que hubo para organizarse con demás colectivas. &lt;br /&gt;
&lt;br /&gt;
Para el desarrollo de la actividad se organizó el día a través de 2 modalidades, charla/exposición, y tarde práctica donde las participantes aprendieron a utilizar las herramientas que se presentaron.&lt;br /&gt;
Como parte del seguimiento, se creó un grupo de Signal de consultas y para apoyar a las participantes en sus nuevos procesos hacia uso de herramientas más seguras.&lt;br /&gt;
|Existing toolkits and resources=-Práctica con herramientas seguridad&lt;br /&gt;
-KeepasXC&lt;br /&gt;
-VPN&lt;br /&gt;
-Herramientas colaborativas&lt;br /&gt;
-Metadata&lt;br /&gt;
-Tails&lt;br /&gt;
-Mailvelope y cifrado de hardware y correos&lt;br /&gt;
- protocolo frente amenazas&lt;br /&gt;
- Ppt para exposición visual&lt;br /&gt;
- Video&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Inicialmente fue incierto por el resultado de la convocatoria. Iniciado el taller la comodidad y espontaneidad que brinda la reciprocidad en el trato en un ambiente amistoso/feminista de plena calidad y sororidad nos brindo soltura para el desarrollo de la jornada, logrando un feedback altamente exitoso.-&lt;br /&gt;
|Feedbacks=Al finalizar la jornada se invitó a las asistentes a compartir sentires, comentarios, dudas, propuestas para mejor, críticas, y demás impresiones. Muchas de las compañeras se comprometieron a replicar las actividades dentro de sus organizaciones y comunidades y al mismo tiempo con otras colectivas. Para brindar colaboración se armó una red para continuar conspirando a través de Signal para continuar en contacto.&lt;br /&gt;
&lt;br /&gt;
La documentación de las expresiones vertidas en este espacio se reproducen a continuación&lt;br /&gt;
&lt;br /&gt;
1. problemas con la fecha, muchas preferirían que se haga un sábado, ya que se perdieron la primera parte.&lt;br /&gt;
2. hacemos hincapie en que nos podemos seguir comunicando por correo electrónico, signal, jeetsee&lt;br /&gt;
3. Estuvieron ante en un encuentro en del tedyc, pero recién en este pudieron entender, por ej. donde se almacenarlos datos &lt;br /&gt;
4. nos preguntaron bien de cómo era la organización a partir de cual se originó este encuentro. hablamos de tacticaltech, y otras organización, y de que existen manuales de ciberseguridad feministas. quedamos en pasárselo.&lt;br /&gt;
5. Euge pregunto si sabiamos que eran los metadatos, y nos dimos cuentas que no las chicas no sabían. Asique explicamos de que se trata. &lt;br /&gt;
6. También hablamos de la preservación de la prueba. las compas abogadas comentaron que es super util la información. &lt;br /&gt;
7. Con respecto a los trolls, una compa comento que escucho muchas veces que dicen que la internet no es real. ella no esta de acuerdo, porque considero que es un espacio que hay que disputar, porque toda discusión que se genera en la red, es igualmente de valida que la que se genera en el espacio de la vida cotidiano.  Otra compañera, manifiesta que es muy agotadora, pero es necesario que la red sea militada con una perspectiva feminista. &lt;br /&gt;
8. Ida recuerda que siempre nos hicieron creer que la red es un espacio para hombres, pero que es muy importante aprender la tecnologia colectivamente. una compa;era conto que ella estudiaba informatica, pero su mama le compro una compu a su hermano; otra compa conto que en el bachillerato el profesor las corria de clases a ella con trescompas mujeres. &lt;br /&gt;
9. hay q sacarnos la idea de q a las mujeres no nos gustan, ni somos buenas para la tecnologia. &lt;br /&gt;
10. La companera de Encarnacion: Nos sugieren que la proxima vez tengamos mas en cuenta las chicas del interior.&lt;br /&gt;
11. Piensan que otros espacios para replicar son las comunidades campesinas, los medios alternativos decomunicacion. Tener en cuenta las mujeres que estudian tecnología acá en asunción, para que no decaigan y puedanseguir, por ejemplo pensar en pasantias de ellas en organizaciones sociales. Sele cuenta el caso de las de sistemasen Argentina.  &lt;br /&gt;
12. Tener en cuenta a la comunidad trans para la próxima invitación. &lt;br /&gt;
13. quedamos en enviarle mas info, manuales de seguiridad. &lt;br /&gt;
14. una compa cuenta que lo mas importante que se lleva es haber perdido el miedo. &lt;br /&gt;
15. sindrome de la impostora.  son campos de disputa que no estan acostumbradas a que estemos. &lt;br /&gt;
|START=Establecer redes de contacto previas concretas&lt;br /&gt;
&lt;br /&gt;
Incluir un estado de situación de la realidad que vivencian cada una&lt;br /&gt;
&lt;br /&gt;
Ser explícitamente convocantes de la comunidad LGTBIQ&lt;br /&gt;
&lt;br /&gt;
Intentar llegar a comunidades rurales del interior del país&lt;br /&gt;
&lt;br /&gt;
Compartir y socializar documentación previa&lt;br /&gt;
&lt;br /&gt;
Reforzar protocolos de seguridad e insistir en su aplicación sin excepciones&lt;br /&gt;
|STOP=Suponer y prejuzgar sobre potenciales conductas hostiles, o reticentes por parte del público que únicamente tensionan a las facilitadoras.&lt;br /&gt;
&lt;br /&gt;
A colación de lo anterior lograr trabajos internos para afianzar la oratoria y confianza&lt;br /&gt;
|KEEP=Continuar organizando los talleres en espacios inclusivos y amistosos&lt;br /&gt;
&lt;br /&gt;
Armar la jornada teniendo como norte la permanente interacción con las asistentes.&lt;br /&gt;
&lt;br /&gt;
Organización interna y previa de los detalles de cada etapa de la actividad&lt;br /&gt;
&lt;br /&gt;
Seguir siendo compañeras&lt;br /&gt;
&lt;br /&gt;
Continuar reforzando la red y vinculaciones por considerarla una herramienta fundamental para socializar &lt;br /&gt;
información, y sacar los mejores atributos de cada una. &lt;br /&gt;
&lt;br /&gt;
Seguir trabajando interdisciplinariamente, desde lo jurídico, lo informático y la comunicación, teniendo en cuenta la interseccionalidad que nuestros distintos contextos nos dan.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:TallerTEDIC.jpeg&amp;diff=9674</id>
		<title>File:TallerTEDIC.jpeg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:TallerTEDIC.jpeg&amp;diff=9674"/>
				<updated>2018-12-20T15:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_seguridad_digital_feminista,_Bolivia&amp;diff=9673</id>
		<title>Taller de seguridad digital feminista, Bolivia</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_seguridad_digital_feminista,_Bolivia&amp;diff=9673"/>
				<updated>2018-12-20T15:06:33Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Talleres de seguridad digital feminista |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2018/11/14 |End when ?=...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Talleres de seguridad digital feminista&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/14&lt;br /&gt;
|End when ?=2018/11/15&lt;br /&gt;
|Number of hours if only one day ?=En la ciudad de Sucre tuvo un tiempo de duración de 6 horas.&lt;br /&gt;
En la ciudad de La Paz tuvo un tiempo de duración de 8 horas.&lt;br /&gt;
|Where is located the activity ?=Regional&lt;br /&gt;
|Geo-localization of the activity ?=-16.476913879674353, -68.10752380420149&lt;br /&gt;
|Who organize it=Colectivo de feministas independientes&lt;br /&gt;
|For whom is it organized=En Bolivia los últimos años se ha re-articulado un creciente movimiento feminista, la violencia de género en distintos contextos hoy nos convocan a expresarnos tanto en las redes como en las calles. La respuesta no se ha dejado esperar, diversos ataques han alertado sobre la necesidad de protocolos de cuidado de manera individual y colectiva. Son muy pocos los espacios en los que se dialoga y se comparten las experiencias locales, no somos expertas pero si tenemos algunas herramientas que comenzamos a usar desde nuestras necesidades, queremos compartir lo poco que aprendimos y conocer las prácticas de las colectivas y/o individualidades feministas. Crear un espacio seguro de diálogo.&lt;br /&gt;
|How many people trained=27&lt;br /&gt;
|Motivations for organizing training=Hemos querido tener un espacio seguro e íntimo de diálogo para compartir las herramientas que nosotras descubrimos a partir del taller con el IGT. Para dialogar sobre internet y feminismos en Bolivia, sobre la necesidad abordar los riesgos y desafíos de internet desde nuestros espacios feministas, sobre las apuestas estatales y de la sociedad civil.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Contendidos generales: &lt;br /&gt;
Nuestras estrategias de cuidado (quienes somos, qué hacemos, cómo nos cuidamos): creación de un pad con información del taller&lt;br /&gt;
Que tan seguras nos sentimos: ¿Qué riesgos corren nuestras comunicaciones digitales?&lt;br /&gt;
Cómo funciona internet&lt;br /&gt;
Mensajería&lt;br /&gt;
Video conferencias seguras  &lt;br /&gt;
Correos y encriptado&lt;br /&gt;
Herramientas de colaboración &lt;br /&gt;
Estrategias mínimas en facebook para no estar tan expuestas&lt;br /&gt;
Contraseñas y gestores  &lt;br /&gt;
Limpieza de celular&lt;br /&gt;
|Methodologies for training=Primero hemos creado un espacio seguro e íntimo para abrir el dialogo, por esta razón la actividad no se ha llevado a cabo en ninguna institución. Hemos cuidado que el lugar no nos remita al trabajo de ninguna organización, se eligió un café y el departamento de un hotel para realizar los talleres. Ambos espacios fueron prestados de forma voluntaria por el interés del taller y las redes de amistad (confianza-solidaridad).&lt;br /&gt;
Segundo no ha tenido el formato de taller tradicional, la dinámica se basó en la horizontalidad, el escuchar, por lo que hemos comenzado con un diálogo sobre los miedos- estrategias en internet.   &lt;br /&gt;
Tercero en base a las necesidades y expectativas de las compañeras participantes,  se hizo un compendio colaborativo, como suerte de memoria en un pad.&lt;br /&gt;
|Existing toolkits and resources=Capitalismo digital: “lo gratis”: el precio eres tú (Facebook y caso Cambridge Analitica) y Whats App es de Facebook&lt;br /&gt;
&lt;br /&gt;
Ataques más usuales: Man in the midle desde el router, ImsiCatcher (desde antena policía simula ser una antena para recabar datos, mapeo de quienes están)&lt;br /&gt;
&lt;br /&gt;
Manejo de mucha información muchos riesgos, hasta de vida, es otro espacio de resistencia (nuevas formas de violencia), con el tema de aborto estrategias, riesgos por el activismo.&lt;br /&gt;
&lt;br /&gt;
Información privada. Miedos: dar información sobre aborto seguro – hacer seguimiento de casos de extractivismo y no ser tan vulnerables (represalias)&lt;br /&gt;
&lt;br /&gt;
Protección de redes&lt;br /&gt;
&lt;br /&gt;
Privacy badger.- Aplicación es para eliminar los historiales de navegación.&lt;br /&gt;
https Evryware.- Te alerta sobre sitios no seguros.&lt;br /&gt;
privacybadger&lt;br /&gt;
Servidores libres Mozilla firefox&lt;br /&gt;
Buscadores https://duckduckgo.com&lt;br /&gt;
Gestor de contraseñas&lt;br /&gt;
Keepassxc.- Es un gestor de contraseñas, te permite guardar y generar contraseñas&lt;br /&gt;
https://keepassxc.org/&lt;br /&gt;
Correo encriptado momentáneo&lt;br /&gt;
tutanota.com&lt;br /&gt;
Mensajería segura: Signal &lt;br /&gt;
VPN: Virtual Private Network (en celular instalamos orbot y orfox)&lt;br /&gt;
Privateinternetaccess.com   &lt;br /&gt;
Mostramos las ventajas de Instalar TAILS&lt;br /&gt;
&lt;br /&gt;
Guía de seguridad Digital paso a paso&lt;br /&gt;
https://securityinabox.org/es/&lt;br /&gt;
&lt;br /&gt;
TactitalTec.- Organizacion de activistivas que generan conocimientos sobre irternet&lt;br /&gt;
https://securityinabox.org/en/&lt;br /&gt;
https://eldesarmador.org/&lt;br /&gt;
https://securityinabox.org/es/&lt;br /&gt;
https://www.eff.org/&lt;br /&gt;
https://datadetox.myshadow.org/&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
La información compartida en ambos talleres: (favor no compartir estos enlaces)&lt;br /&gt;
https://pad.kefir.red/p/viscachas&lt;br /&gt;
https://pad.kefir.red/p/termitasdulces&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Nos sentimos muy felices porque para nosotras era importante compartir nuestro proceso que consistió básicamente en dejar de tenerle miedo a la tecnología. Creemos que cuando hablamos de tecnología nos muestran un mundo masculino y se proyecta hostil, en particular en Bolivia. Fue muy importante trabajar en tener un espacio de cuidado y solo de mujeres para poder discutir no solo los temas agendados, sino los que salieron orgánicamente de acuerdo al contexto de  cada ciudad. En ambas ciudades el tema del aborto, la violencia digital y el extractivismo es parte de la agenda.  En La Paz fue muy importante el almuerzo comunitario organizado por las mismas participantes, cada una llevo algo y luego todas trabajamos para terminar de preparar la comida, mientras seguimos la conversa.  En ambas ciudades recibimos  un espacio de mucho cariño y reflexión, mostrando la necesidad de seguir abordando y trabajando estos temas.&lt;br /&gt;
|Feedbacks=Hemos visto que este espacio ha sido muy importante porque concordamos que sin importar el feminismo que se reivindique, es una necesidad común y política hacernos cargo de las discusiones en torno al internet (sobre todo en un contexto en el que el estado está apostando por la implementación de un gobierno electrónico, se piensan distintos laboratorios cívicos ante el año electoral que nos espera el 2019).&lt;br /&gt;
|START=Lo primero es que vamos a comenzar a usar herramientas seguras, tanto de mensajería como  correos, además de tratar de establecer algunos protocolos de seguridad para las próximas actividades. Y seguir cuestionando nuestro accionar digital  como activistas feministas, sobre todo al estar tan próximas a un año electoral en el que tendremos posibilidad de incidencia pero en el que también podremos estar más expuestas.&lt;br /&gt;
|STOP=Dejar de utilizar herramientas que no sean seguras, pensar estrategias para difusión alternativa de las actividades que coordinemos o por lo menos establecer niveles. También creemos importante combinar las actividades del mundo digital con el mundo analógico, no solo inclinarnos por lo digital.&lt;br /&gt;
|KEEP=Estos encuentros de feministas (diversas) reflexionando sobre sus estrategias y necesidades son muy importantes, porque se encuentra experiencias, reflexiones y capacidades diversas que enriquecen y fortalecen  discusiones y prácticas.  Se ha pensado realizar replicas y organizar otros dedicados concretamente a acciones que ayudarán a las necesidades comunes de las activistas, por ejemplo ver el tema legal ante la violencia digital, elaboración de fundas, antenas, etc.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Reuni%C3%B3n_Introductoria_a_la_Protecci%C3%B3n_Integral_y_Digital_para_Defensoras_del_Territorio,_Ecuador&amp;diff=9672</id>
		<title>Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Reuni%C3%B3n_Introductoria_a_la_Protecci%C3%B3n_Integral_y_Digital_para_Defensoras_del_Territorio,_Ecuador&amp;diff=9672"/>
				<updated>2018-12-20T14:57:42Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Encuentro de mujeres defensoras del territorio d...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Reunión Introductoria a la Protección Integral y Digital para Defensoras del Territorio, Encuentro de mujeres defensoras del territorio de Intag&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/12/09&lt;br /&gt;
|End when ?=2018/12/09&lt;br /&gt;
|Number of hours if only one day ?=4&lt;br /&gt;
|Where is located the activity ?=Nivel nacional&lt;br /&gt;
|Geo-localization of the activity ?=-3.833677477040813, -79.13500774276622&lt;br /&gt;
|Who organize it=Comisión Ecuménica de Derechos Humanos, CEDHU&lt;br /&gt;
Observatorio Minero Ambiental y Social del Norte del Ecuador, OMASNE&lt;br /&gt;
Defensa y Conservación Ecológica de Intag, DECOIN&lt;br /&gt;
|organisation(s) website=https://www.cedhu.org&lt;br /&gt;
https://www.facebook.com/OMASNE/&lt;br /&gt;
https://www.decoin.org&lt;br /&gt;
|For whom is it organized=2. Mujeres defensoras del territorio de Intag, quienes desde hace más de 20 años enfrentan a las empresas mineras que tienen concesiones mineras otorgadas por el Estado de manera inconsulta ( Dicho de una disposición o medida que es tomada sin consulta previa a las partes interesadas. (Cuba, Venezuela, Argentina y Panamá).&lt;br /&gt;
|How many people trained=13&lt;br /&gt;
|Motivations for organizing training=En el país, al igual que en otros países, el Estado entrega territorio indígena y campesino a empresas transnacionales para extraer recursos naturales. Estas actividades están en muchos casos sobre áreas protegidas, espacios de conservación, bosques protectores, centros poblados, zonas intangibles, etc., y además se lo hace de manera inconsulta. En todos los casos a espaldas de las personas que habitan el territorio, quienes se enteran cuando empiezan a observar actividades de ajenos en sus tierras. En otras ocasiones las empresas “compran” o extorsionan a los dueños de los territorios para que firmen su traspaso legal. &lt;br /&gt;
&lt;br /&gt;
El Estado ha sido no solo cómplice de estas actividades extractivas inconsultas, sino que se han sistematizado abusos de poder a través de la fuerza física, a través de las normas y a través del discurso, para imponer los proyectos extractivos. Por ejemplo, el uso de los militares y policías para desalojar de manera forzada y violenta a los habitantes de un territorio, la promulgación de normas laxas que facilitan la entrada del capital sin mayores restricciones ambientales y económicas, la legitimación social de los proyectos extractivos a nivel nacional e internacional definiéndolos como “estratégicos para el desarrollo”. Estos abusos del poder han servido para consolidar una matriz económica y política que permea los tejidos sociales y viola derechos humanos, colectivos y de la naturaleza.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Presentación&lt;br /&gt;
Ritual de inicio&lt;br /&gt;
Enfoque de protección integral&lt;br /&gt;
Impactos de la defensora en nuestros cuerpos y nuestras relaciones&lt;br /&gt;
Prácticas de auto-cuidado y bienestar&lt;br /&gt;
Segunda parte (2 horas y medias)&lt;br /&gt;
¿Con quiénes nos comunicamos? &lt;br /&gt;
¿Cómo nos comunicamos? &lt;br /&gt;
¿Qué comunicamos? &lt;br /&gt;
¿Cómo funciona la telefonía celular?&lt;br /&gt;
Experiencias de telefonía celular autónoma&lt;br /&gt;
Aplicaciones de comunicación segura&lt;br /&gt;
Preguntas y comentarios&lt;br /&gt;
|Methodologies for training=Enfoques metodológicos: &lt;br /&gt;
- Enfoque de derechos: “los derechos no son una dadiva, ni un deseo, son obligaciones éticas y jurídicas de los Estados hacia las personas”. El empoderamiento de los derechos es reconocerse a sí mismo y a los otros como sujetos sociales, con los mismos derechos humanos, capaces de gozarlos, ejercerlos y exigirlos, para convivir con dignidad. &lt;br /&gt;
- Enfoque Intercultural: el enfoque Intercultural aborda, el reconocimiento de la diversidad cultural en forma relacional, es decir desde una interacción que busque un dialogo paritario, horizontal. La interculturalidad pone en evidencia que estas relaciones no se dan siempre de manera armoniosa. Muchas veces la diferencia y la diversidad han sido asumidas para el oprobio, esclavización, dominación, violencia, exterminio y muerte. Por ello rescata el conflicto como parte de la convivencia entre diferentes sobre todo en sociedades con grandes diferencias económicas y de poder entre los grupos que la conforman. La apuesta por la interculturalidad no puede construirse desconectado del contexto social e ideológico, del análisis de cómo se producen las relaciones entre distintos grupos sociales y culturales u ocultando las estructuras políticas y económicas que las condicionan. &lt;br /&gt;
- Enfoque intergeneracional: implica un cuestionamiento al adulto-centrismo y transformación de las relaciones abuelos abuelas –adultos - jóvenes - niños, niñas, buscando el dialogo de saberes, de interacción y cooperación entre las diferentes generaciones.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Herramientas_comunicacionales_para_la_protecci%C3%B3n_del_territorio_y_naturaleza,_Ecuador&amp;diff=9671</id>
		<title>Herramientas comunicacionales para la protección del territorio y naturaleza, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Herramientas_comunicacionales_para_la_protecci%C3%B3n_del_territorio_y_naturaleza,_Ecuador&amp;diff=9671"/>
				<updated>2018-12-20T14:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Herramientas comunicacionales para la protección del territorio y naturaleza |Category=Privacy Advocacy, Digital Security, Gender and Tech...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Herramientas comunicacionales para la protección del territorio y naturaleza&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/12/07&lt;br /&gt;
|End when ?=2018/12/09&lt;br /&gt;
|Number of hours if only one day ?=16&lt;br /&gt;
|Where is located the activity ?=Nivel nacional&lt;br /&gt;
|Geo-localization of the activity ?=-0.0032469397393300467, -78.37546437978745&lt;br /&gt;
|Who organize it=Comisión Ecuménica de Derechos Humanos, CEDHU&lt;br /&gt;
Observatorio Minero Ambiental y Social del Norte del Ecuador, OMASNE&lt;br /&gt;
Defensa y Conservación Ecológica de Intag, DECOIN&lt;br /&gt;
|organisation(s) website=https://www.cedhu.org&lt;br /&gt;
https://www.facebook.com/OMASNE/&lt;br /&gt;
https://www.decoin.org&lt;br /&gt;
|For whom is it organized=Mujeres y hombres defensoras de la naturaleza y el territorio frente a las actividades extractivas que les afectan. Son personas que desde hace muchos años están resistiendo frente a actividades mineras, palmicultoras, camaroneras, petroleras y conflicto fronterizo armado.&lt;br /&gt;
|How many people trained=13&lt;br /&gt;
|Motivations for organizing training=En el país, al igual que en otros países, el Estado entrega territorio indígena y campesino a empresas transnacionales para extraer recursos naturales. Estas actividades están en muchos casos sobre áreas protegidas, espacios de conservación, bosques protectores, centros poblados, zonas intangibles, etc., y además se lo hace de manera inconsulta. En todos los casos a espaldas de las personas que habitan el territorio, quienes se enteran cuando empiezan a observar actividades de ajenos en sus tierras. En otras ocasiones las empresas “compran” o extorsionan a los dueños de los territorios para que firmen su traspaso legal. &lt;br /&gt;
&lt;br /&gt;
El Estado ha sido no solo cómplice de estas actividades extractivas inconsultas, sino que se han sistematizado abusos de poder a través de la fuerza física, a través de las normas y a través del discurso, para imponer los proyectos extractivos. Por ejemplo, el uso de los militares y policías para desalojar de manera forzada y violenta a los habitantes de un territorio, la promulgación de normas laxas que facilitan la entrada del capital sin mayores restricciones ambientales y económicas, la legitimación social de los proyectos extractivos a nivel nacional e internacional definiéndolos como “estratégicos para el desarrollo”. Estos abusos del poder han servido para consolidar una matriz económica y política que permea los tejidos sociales y viola derechos humanos, colectivos y de la naturaleza.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Viernes – 07 de diciembre&lt;br /&gt;
Hora&lt;br /&gt;
Actividad&lt;br /&gt;
Responsable&lt;br /&gt;
Materiales &lt;br /&gt;
12h30&lt;br /&gt;
Llegada y almuerzo en Hostal Casa Kolping&lt;br /&gt;
CEDHU&lt;br /&gt;
&lt;br /&gt;
14h00-14h30&lt;br /&gt;
Bienvenida al curso, presentación de objetivos del módulo y explicación de temas logísticos. &lt;br /&gt;
CEDHU &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presentación de lxs participantes y equipo de facilitación. Reglas durante el taller. &lt;br /&gt;
CEDHU &lt;br /&gt;
&lt;br /&gt;
14h30-16h00&lt;br /&gt;
Recuento del módulo anterior y revisión de tareas&lt;br /&gt;
Facilitadora: CEDHU&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presentación de resultados del trabajo con las herramientas cartográficas usadas el módulo III &lt;br /&gt;
Facilitadora: CEDHU&lt;br /&gt;
&lt;br /&gt;
16h00-18h00&lt;br /&gt;
Presentación de herramientas jurídicas: Derechos colectivos y mecanismos de exigibilidad&lt;br /&gt;
Facilitadora: Nathy Yépez&lt;br /&gt;
&lt;br /&gt;
18h00-19h00&lt;br /&gt;
Cena&lt;br /&gt;
Casa Kolping&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sábado 08 de diciembre&lt;br /&gt;
&lt;br /&gt;
Hora&lt;br /&gt;
Actividad&lt;br /&gt;
Metodología&lt;br /&gt;
Responsable&lt;br /&gt;
7:30 – 8:30&lt;br /&gt;
Desayuno&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
8:45 – 9:00&lt;br /&gt;
Inicio&lt;br /&gt;
Dinámicas de inicio jornada&lt;br /&gt;
&lt;br /&gt;
Jorge&lt;br /&gt;
9:00 – 9:15&lt;br /&gt;
Presentación de  taller comunicación&lt;br /&gt;
&lt;br /&gt;
Facilitadoras dan la bienvenida&lt;br /&gt;
Presentación de agenda – taller &lt;br /&gt;
Jorge&lt;br /&gt;
9:15 – 9:30&lt;br /&gt;
Presentación grupal &lt;br /&gt;
&lt;br /&gt;
Cada persona hace una presentación corta: nombre, de qué organización, comunidad viene, qué actividad realiza y qué comida le gusta. &lt;br /&gt;
&lt;br /&gt;
Jorge&lt;br /&gt;
9:30 – 9:45&lt;br /&gt;
Establecimiento de acuerdos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Escribimos en un papelote los acuerdos a los que llegamos para el taller a partir de dos preguntas generadoras. &lt;br /&gt;
¿Qué quiero aprender en el taller?&lt;br /&gt;
¿Qué saber puedo compartir en el taller? &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jorge&lt;br /&gt;
9:45 – 10:30&lt;br /&gt;
El Árbol Vital:&lt;br /&gt;
Comunicar como defensor de Derechos Humanos y de la Naturaleza &lt;br /&gt;
Ejercicio de reconocimiento como defensor/a &lt;br /&gt;
Este árbol soy yo&lt;br /&gt;
Ahora vamos a dibujar en  la cartulina A4 el árbol que encontramos en nuestro paseo imaginario.  En el tronco del árbol escribamos nuestro nombre. &lt;br /&gt;
A continuación relacionamos cada parte del árbol con nuestra vida comunitaria, así: La Raíz, Hojas, Flores, Frutos &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
    Jorge&lt;br /&gt;
10:30 11:00&lt;br /&gt;
&lt;br /&gt;
Plenaria&lt;br /&gt;
    JOrge&lt;br /&gt;
11:00 11:30&lt;br /&gt;
&lt;br /&gt;
Lluvia de ideas&lt;br /&gt;
Se pide a los y las participantes que realicen una lluvia de ideas con pocas palabras sobre la palabra comunicación y que la escriban en una cartulina.&lt;br /&gt;
Cada uno deberá leer su cartulina al grupo y pagarla en el papelote.&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
 &lt;br /&gt;
 Jorge&lt;br /&gt;
11:30 – 11:45&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Trabajo de cooperación, dialogo y organización&lt;br /&gt;
&lt;br /&gt;
Ejercicio de organización por grupos de la torre de sorbetes &lt;br /&gt;
&lt;br /&gt;
    Jorge&lt;br /&gt;
&lt;br /&gt;
11:45&lt;br /&gt;
12:45&lt;br /&gt;
¿Qué quiero comunicar?&lt;br /&gt;
Mapa de la comunicación y defensa del territorio&lt;br /&gt;
&lt;br /&gt;
Se organizan en grupos a partir de su cercanía territorial. &lt;br /&gt;
Cada grupo deberá dibujar un mapa donde represente a su comunidad, organización, barrio, ciudad. (se dividen por regiones)&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
    JOrge&lt;br /&gt;
12:45 – 13:00 &lt;br /&gt;
Plenaria&lt;br /&gt;
Plenaria sobre dialogo y construcción colectiva&lt;br /&gt;
Jorge&lt;br /&gt;
13:00 – 14:00 &lt;br /&gt;
Almuerzo&lt;br /&gt;
Barriga llena corazón contento&lt;br /&gt;
&lt;br /&gt;
Módulo IV, Segunda parte: Protección y Seguridad para defensoras y defensores del territorio. Seguridad Digital: telefonía celular e internet.&lt;br /&gt;
&lt;br /&gt;
Hora&lt;br /&gt;
Actividad&lt;br /&gt;
Metodología&lt;br /&gt;
Responsable&lt;br /&gt;
14:00 – 14:10&lt;br /&gt;
Introducción al Análisis de Riesgos y la protección integral&lt;br /&gt;
Breve introducción al enfoque integral de la protección a defensoras.&lt;br /&gt;
En trabajo en grupos (los mismos que en la mañana) se deben contestar preguntas en un papelografo.&lt;br /&gt;
Maka &lt;br /&gt;
14:10 – 14:20&lt;br /&gt;
Mapa de Actividades&lt;br /&gt;
- ¿Cuáles son todas las actividades de defensa y promoción de los derechos humanos que realiza la defensora y/o su organización?&lt;br /&gt;
¿Algunas son más riesgosas?&lt;br /&gt;
¿Los riesgos son de ataques a&lt;br /&gt;
nuestra integridad física y digital&lt;br /&gt;
o también emocional y riesgos&lt;br /&gt;
por desgaste?&lt;br /&gt;
Maka&lt;br /&gt;
14:20 – 14:30&lt;br /&gt;
Análisis de contexto&lt;br /&gt;
¿Cuál es el contexto económico, político, jurídico, social en el que nos desempeñamos?&lt;br /&gt;
¿Existen actores agresores que no sean actores estatales?&lt;br /&gt;
Califica el contexto psicosocial: ¿existe temor, miedo, frustración social por un contexto de violencia política?&lt;br /&gt;
¿Cómo impacta en la labor?&lt;br /&gt;
Maka&lt;br /&gt;
14:30 – 14:40&lt;br /&gt;
Mapa de Actores&lt;br /&gt;
¿Quién son los actores susceptibles de atacarnos por nuestra labor?&lt;br /&gt;
¿Qué tan fuertes y amplias son nuestras alianzas con actores a nivel local, estatal, nacional e internacional?&lt;br /&gt;
¿Cuál es la cadena de mando?&lt;br /&gt;
¿Existe manera de incidir en ellos?&lt;br /&gt;
¿Qué actores tienen más o menos poder?&lt;br /&gt;
¿De qué manera se pueden movilizar lox aliadxs?&lt;br /&gt;
¿Qué apoyo podrían brindar?&lt;br /&gt;
Maka&lt;br /&gt;
14:40 – 15:00&lt;br /&gt;
Identificar riesgos&lt;br /&gt;
Incidente de Seguridad&lt;br /&gt;
Un evento fuera de lo común que afecta a la seguridad física, digital y/o emocional de la defensora y/o de su familia, organización, entorno.&lt;br /&gt;
Amenaza&lt;br /&gt;
Una amenaza es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. No todos los incidentes de seguridad son amenazas, pero todas las amenazas son incidentes de seguridad.&lt;br /&gt;
Ataque&lt;br /&gt;
Un ataque es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil.&lt;br /&gt;
El ataque es directamente dirigido en contra de la persona defensora o su familia o aliados estratégicos.&lt;br /&gt;
Maka&lt;br /&gt;
15:00 – 15:30&lt;br /&gt;
Diseño de planes de protección digital&lt;br /&gt;
Planes de prevención y mitigación poniendo énfasis en la comunicación y el bienestar colectivo.&lt;br /&gt;
Maka&lt;br /&gt;
15:30 – 17:00&lt;br /&gt;
Herramientas de seguridad digital&lt;br /&gt;
¿Cómo funciona la telefonía celular e Internet?&lt;br /&gt;
Maka&lt;br /&gt;
17:00-18:00&lt;br /&gt;
Comunicación móvil&lt;br /&gt;
Conocer nuestro celular, revisar la configuración de cuentas Googles y conocer algunas aplicaciones seguras de comunicación&lt;br /&gt;
Maka&lt;br /&gt;
&lt;br /&gt;
Domingo 9 de Diciembre&lt;br /&gt;
Hora&lt;br /&gt;
Actividad&lt;br /&gt;
Metodología&lt;br /&gt;
Responsable&lt;br /&gt;
8:00 – 9:00&lt;br /&gt;
Continuidad&lt;br /&gt;
Herramientas de mensajería &lt;br /&gt;
Cuáles son los criterios para escoger una aplicación de mensajería segura&lt;br /&gt;
Maka &lt;br /&gt;
9:00 – 10:00&lt;br /&gt;
Correo Seguro&lt;br /&gt;
Cómo funciona el correo electrónico &lt;br /&gt;
Maka &lt;br /&gt;
10:00 – 11:00&lt;br /&gt;
Contraseñas seguras&lt;br /&gt;
Cuáles son los criterios para crear una contraseña segura&lt;br /&gt;
Maka &lt;br /&gt;
11:00 – 12:00&lt;br /&gt;
Evaluación y preguntas&lt;br /&gt;
Cierre&lt;br /&gt;
CEDHU&lt;br /&gt;
|Methodologies for training=Enfoques metodológicos: &lt;br /&gt;
- Enfoque de derechos: “los derechos no son una dadiva, ni un deseo, son obligaciones éticas y jurídicas de los Estados hacia las personas”. El empoderamiento de los derechos es reconocerse a sí mismo y a los otros como sujetos sociales, con los mismos derechos humanos, capaces de gozarlos, ejercerlos y exigirlos, para convivir con dignidad. &lt;br /&gt;
- Enfoque Intercultural: el enfoque Intercultural aborda, el reconocimiento de la diversidad cultural en forma relacional, es decir desde una interacción que busque un dialogo paritario, horizontal. La interculturalidad pone en evidencia que estas relaciones no se dan siempre de manera armoniosa. Muchas veces la diferencia y la diversidad han sido asumidas para el oprobio, esclavización, dominación, violencia, exterminio y muerte. Por ello rescata el conflicto como parte de la convivencia entre diferentes sobre todo en sociedades con grandes diferencias económicas y de poder entre los grupos que la conforman. La apuesta por la interculturalidad no puede construirse desconectado del contexto social e ideológico, del análisis de cómo se producen las relaciones entre distintos grupos sociales y culturales u ocultando las estructuras políticas y económicas que las condicionan. &lt;br /&gt;
- Enfoque intergeneracional: implica un cuestionamiento al adulto-centrismo y transformación de las relaciones abuelos abuelas –adultos - jóvenes - niños, niñas, buscando el dialogo de saberes, de interacción y cooperación entre las diferentes generaciones.&lt;br /&gt;
|Existing toolkits and resources=Video Ella https://vimeo.com/109258771&lt;br /&gt;
Video “Mujeres y Extractivismo” La periodica https://laperiodica.net&lt;br /&gt;
Metadatos: &lt;br /&gt;
https://ssd.eff.org/es/module/por-qu%C3%A9-los-metadatos-son-importantes&lt;br /&gt;
Contraseñas&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Contrase%C3%B1as_seguras&lt;br /&gt;
Telefonía Móvil&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/M%C3%B3vil_1:_Funccionamiento&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/M%C3%B3vil_3:_Alternativas&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Pati: Es fabuloso saber que la información que les proporcionamos sirve a las defensoras para desarrollar sus labores de defensa del territorio y resistencia pacífica frente actividades extractivas. Me sentí muy agradecida y contenta con la posibilidad de haber logrado que a través de Maka y Jorge las defensoras de Ecuador pudieron conocer herramientas comunicacionales para incorporar en sus procesos. Me quedo con algunas inquietudes sobre temas que debemos profundizar como el autocuidado. Es agotador por su puesto la organización de todo taller pero la recompensa de saber que estamos aportando es lo valioso y reconfortante en este proceso de formación. &lt;br /&gt;
&lt;br /&gt;
Maka: para mi fue muy interesante abordar el tema del impacto de la defensora en los cuerpos y nuestras relaciones. Todas las defensoras y defensores se sintieron aludidos e interesados por hablar de estos temas que parecen tabús dentro de las organizaciones sociales y que son claves para comprender las estrategias de sostenibilidad del movimiento social. Se interesaron mucho por herramientas como el uso de aceites esenciales para el control de emociones y sentimientos, técnicas como el abrazo de los dedos y el simple hecho de hablar de cómo se siente cada persona en su labor de defensora. También me gustó mucho la reacción y el interés que tuvieron las mujeres de Intag por el proyecto de telefonía celular autónoma de los pueblos originarios de Oaxaca porque ellas consideran que tienen condiciones para levantar proyectos de este tipo en su región. Mostraron mucho interés por entender las infraestruturas autónomas como una forma de enfrentar la vigilancia y el control que se ejerce a través de las tecnologías de comunicación.&lt;br /&gt;
|Feedbacks=metodologías usadas en el taller fueron claras y precisas. Nos sugirieron abordar con mayor detenimiento herramientas de autocuidado en el próximo módulo o en algún otro espacio y herramientas de comunicación relacionadas con la seguridad digital y en particular del acceso a telefonía celular segura y autónoma.&lt;br /&gt;
Al abordar el tema de cómo funciona la telefonía celular e Internet se interesaron en saber más, en dar continuidad a este tipo de aprendizajes.&lt;br /&gt;
|START=Pati: Hacer un recuento de lo aprendido en otros mòdulos para lograr conectar las herramientas proporcionadas, de tal forma que tengan una secuencia lógica que les permita documentar los casos y situaciones que enfrentan las defensoras. Estar atenta a las condiciones del lugar para que todas las participantes estén cómodas siempre. &lt;br /&gt;
Maka: en mi caso, después de finalizado el taller y la reunión me acerque a varias personas que en Ecuador son parte del movimiento de software libre y que tienen experiencia y conocimientos en temas relacionados a la seguridad digital para vincularles con CEDHU con el objetivo de poder dar continuidad a esta experiencia.&lt;br /&gt;
|STOP=Procurar tener más tiempo para profundizar en los temas de que las participantes tienen más interés.&lt;br /&gt;
|KEEP=Definir con las propias participantes el lugar y fechas del próximo encuentro de defensoras para que la convocatoria sea consensuada y la participación activa.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Oficinas_de_cuidados_digitais_e_seguran%C3%A7a_da_comunica%C3%A7%C3%A3o,_Salvador_de_bahia,_Brasil&amp;diff=9670</id>
		<title>Oficinas de cuidados digitais e segurança da comunicação, Salvador de bahia, Brasil</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Oficinas_de_cuidados_digitais_e_seguran%C3%A7a_da_comunica%C3%A7%C3%A3o,_Salvador_de_bahia,_Brasil&amp;diff=9670"/>
				<updated>2018-12-20T14:22:59Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Oficinas de cuidados digitais e segurança da comunicação |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=201...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Oficinas de cuidados digitais e segurança da comunicação&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/12/01&lt;br /&gt;
|End when ?=2018/12/02&lt;br /&gt;
|Number of hours if only one day ?=16&lt;br /&gt;
|Where is located the activity ?=Regional&lt;br /&gt;
|Geo-localization of the activity ?=-12.98085952776582, -38.64411718610836&lt;br /&gt;
|Who organize it=Centro de Estudos e Ação social (CEAS) em parceria com algunas militantes que facilitaram a formação: Fernanda (Marialab), Luciana (Escola de Ativismo) e Geisa (Fuxico – Rede Livre Feminista).&lt;br /&gt;
|organisation(s) website=CEAS &amp;lt;http://ceas.com.br/proposta4/&amp;gt;&lt;br /&gt;
Maria Lab &amp;lt;https://marialab.org/&amp;gt;&lt;br /&gt;
Escola de Ativismo &amp;lt;https://escoladeativismo.org.br/&amp;gt;&lt;br /&gt;
Fuxico – Rede Livre Feminista &amp;lt;http://redeautonomafeminista.org/fuxico/&amp;gt;&lt;br /&gt;
|For whom is it organized=Lideranças de movimentos sociais urbanos&lt;br /&gt;
Lideranças de movimentos sociais rurais&lt;br /&gt;
Equipe de assessoria do CEAS e alguns parceiros que atuam na defesa e garantia de direitos&lt;br /&gt;
|How many people trained=39&lt;br /&gt;
|Motivations for organizing training=O CEAS vem buscando realizar uma mudança em sua cultura institucional com relação aos cuidados digitais e a segurança da comunicação. Além de criar condições na organização para torna parte da nossa prática o horizonte da soberanía da comunicação. Através do uso de ferramentas livres que estejam de alguma maneira em coerência com a prática da nossa organização. Uma vez que a nossa missão é a transformação estrutural da sociedade com setores históricamente excluídos buscando relações mais justas e equânimes,  nos perguntamos porque utilizar ferramentas que estão a serviço do capitalismo e contra a nossa ação, sem comprimisso com as lutas populares? Estamos em um contexto político em nosso país que nos impulssiona para que essa mudança aconteça a passos mais largos, pois agora se ver mais concretamente os efeitos do avanço da ultradireita em nosso país, através do aumento da violência, uso das forças militares em alguns estados, inclusive tem sido levado a cabo a alteração da legislação com foco na criminalização dos defensores de direitos humanos, lideranças quilobolas, indígenas, etc. Se faz urgente colocar ese tema na orden do dia.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Dia 01/12&lt;br /&gt;
Objetivos do dia: Apresentar conceitos sobre o funcionamento da internet, suas vulnerabilidades e possibilidades. &lt;br /&gt;
09h00 - 9h40 Apresentações &lt;br /&gt;
 apresentação: 5 min as pessoas conversam entre si.&lt;br /&gt;
apresenta a pessoa que conversou.&lt;br /&gt;
Acordos (10 min)&lt;br /&gt;
9h40 - 11h Linha do tempo da internet no Brasil. - Quando você começou a usar o serviço?&lt;br /&gt;
Colocar os serviços na linha do tempo.&lt;br /&gt;
Fazer uma discussão sobre como habitamos a internet, as mudanças e transformações da internet ao longo dos anos.&lt;br /&gt;
11h - 12h Contexto de vigilância e redes sociais, através de Casos:&lt;br /&gt;
Caso 1: “PF apreende equipamentos de repórter no Mato Grosso do Sul”: Veja mais em: &amp;lt;https://blogdosakamoto.blogosfera.uol.com.br/2013/05/19/pf-apreende-equipamentos-de-reporter-no-mato-grosso-do-sul/&amp;gt; Exibição do vídeo.&lt;br /&gt;
“Durante uma ação de desocupação de indígenas Terena de uma fazenda, na tarde deste sábado (18), no município de Sidrolândia, Estado do Mato Grosso do Sul, o delegado da Polícia Federal, Alcídio de Souza Araújo, apreendeu um computador do jornalista do Conselho Indigenista Missionário (Cimi) Ruy Sposati, que, assim como outros profissionais de comunicação, cobria a ação. Segundo o jornalista, Araújo se negou a protocolar a apreensão ou a dar qualquer justificativa legal do ato e, em nenhum momento, apresentou qualquer ordem da Justiça ou de órgão competente para busca e apreensão de equipamentos, que seguiriam em posse da PF. Um gravador também teria sido apreendido.”&lt;br /&gt;
Caso 2: “Grupo “Mulheres contra Bolsonaro” no Facebook sofre ataque cibernético”. Veja mais em: &amp;lt; https://brasil.elpais.com/brasil/2018/09/14/politica/1536941007_569454.html&amp;gt;&lt;br /&gt;
“Neste dia, a administradora M.M. foi a principal afetada, e teve suas contas no Facebook e no WhatsApp invadidas. De acordo com as organizadoras, os ataques começaram por volta das 14h na sexta. Antes disso, moderadoras e administradoras haviam recebido ameaças em suas contas no WhatsApp. Os invasores exigiram que o grupo fosse extinto até às 24h de sexta-feira e tentaram intimidar as responsáveis pelo grupo ameaçando divulgar seus dados pessoais como como CPF, RG, Título de eleitor, nome da mãe, entre outros dados extremamente sensíveis.”&lt;br /&gt;
Rodada de falas: relacionado os casos com o nosso contexto e com a luta dos movimentos e participantes da formação.&lt;br /&gt;
12h - 13h30 - ALMOÇO&lt;br /&gt;
13h30 - 15h Introdução sobre a segurança em grupo X segurança individual. &lt;br /&gt;
13h30 - 15h Camadas de segurança - a partir de uma situação real do grupo. Garantindo o deslocamento com segurança de uma assessora, e das informações que ela transporta. &lt;br /&gt;
Cada grupo elabora um plano de segurança. (30 min elaboração e 45 min apresentação geral).&lt;br /&gt;
15h30 Como funciona a internet?Montar o funcionamento com os cards. Fazer a problematização da vigilância e do mercado no sistema da internet. Vulnerabilidades, brechas e possibilidades. Pedir para que falem três coisas que eles fazem usando a internet. Mostrar as fragilidades deste processo.&lt;br /&gt;
Exibição do cabeamento submarino:&lt;br /&gt;
16h40 - 17h como foi o dia e o que aprendeu?&lt;br /&gt;
Dia 02/12&lt;br /&gt;
Objetivos do dia: Trabalhar com conceitos de segurança organizacional (grupo) e segurança integral (individual) e algumas feramentas - matriz de risco.&lt;br /&gt;
09h00 - 9h30 – Memória do dia anterior&lt;br /&gt;
10h00 - Teste de segurança e vulnerabilidade de senhas.&lt;br /&gt;
Apresentação do Mosaico posibilidades. Qual ferramenta querem trabalhar? Email? Armazenamento?&lt;br /&gt;
Ferramentas de comunicação segura: wire e senhas, signal, configurar autenticação, email (protonmail), armazenar arquivos (meganz).&lt;br /&gt;
12h - 13h30 ALMOÇO&lt;br /&gt;
14h00 –  Juventude do MSTB – Desenvolveu uma atividade de alongamento.&lt;br /&gt;
14h30 - Elementos a elaboração de protocolo de segurança de acordo com a realidade de cada grupo/organização e movimentos sociais.&lt;br /&gt;
A história das Icamiabas que lutavam para defender o seu território – “Icamiabas' ou iacamiabas (do tupi i + kama + îaba, significando &amp;quot;peito partido&amp;quot;) é a designação genérica dada a índias que teriam formado uma tribo de mulheres guerreiras que não aceitavam a presença masculina. Compunham uma sociedade rigorosamente matriarcal, caracterizada por mulheres guerreiras sem homens, ou ainda mulheres que ignoravam a lei.” Fonte – Wikipédia &amp;lt; https://pt.wikipedia.org/wiki/Icamiabas &amp;gt;&lt;br /&gt;
A partir da história das Icamiabas debater os elementos do protocolo de segurança: &lt;br /&gt;
1) Quais são as atividades que o meu grupo/coletivo faz? &lt;br /&gt;
2) O que usamos para fazer essas ações? &lt;br /&gt;
3) O que queremos proteger?&lt;br /&gt;
A partir da matriz abaixo cada grupo desenvolve o seu protocolo de segurança:&lt;br /&gt;
15h - 16h  - Apresentação &lt;br /&gt;
16h - 16h30 - encerramento : Escrever em tarjetas os aprendizados. E Como continua?&lt;br /&gt;
|Methodologies for training=A metodología foi em parte descrita acima, junto com a programação.&lt;br /&gt;
|Existing toolkits and resources=Fizemos uma Linha do tempo da internet material : quadro, fita crepe, canetas e postit;&lt;br /&gt;
Exibimos fotos da rede e cabos submarinos, vídeos de um dos casos apresentados para debater sobre cuidados digitais;&lt;br /&gt;
Projeções com uso as ferramentas e uso/ teste coletivo – Todo conteúdo foi pasado em link em tempo real;&lt;br /&gt;
Montagem de um varal com os cards sobre como funciona a internet; e&lt;br /&gt;
Uma facilitadora mediava o conteúdo e outra escrevia desenhava em tempo real o nome dos aplicativos.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Sim, valeu muito a pena. A metodología e conteúdo compartilhado foi de muita relevancia para o grupo participante, a metodología e as facilitadoras contribuiram  para o éxito da atividade. Através da elaboração do protoloco de segurança foi possível levantar alguns pontos importantes sobre a atual conjuntura de nosso país.&lt;br /&gt;
|Feedbacks=As pessoas se mostraram sensibilizadas para o tema. Todo o conteúdo fez sentido para a realidade delas. E se mostraram interessadas em multiplicar a informação.&lt;br /&gt;
As pessoas detacaram qualidade do conteúdo e da metodología como um ponto positivo.&lt;br /&gt;
|START=Dialogar com os parceiros sobre o tema. Aplicativos instalados nos aparelhos celulares da equipe e dos parceiros.&lt;br /&gt;
|STOP=Reduzir danos,  utilizando aplicativos e softwares libres.&lt;br /&gt;
|KEEP=Os Temas de cuidado digital e segurança da comunicação permanentemente debatido na organização e com os parceiros, para que haja sensibilização para uma mudança na cultura da nossa organização.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_seguridad_para_mujeres,_Puebla,_Mexico&amp;diff=9669</id>
		<title>Taller de seguridad para mujeres, Puebla, Mexico</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_seguridad_para_mujeres,_Puebla,_Mexico&amp;diff=9669"/>
				<updated>2018-12-20T14:13:06Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Taller de seguridad para mujeres |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2018/11/29 |End when ?=2018/11...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller de seguridad para mujeres&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/29&lt;br /&gt;
|End when ?=2018/11/30&lt;br /&gt;
|Number of hours if only one day ?=16 horas&lt;br /&gt;
|Where is located the activity ?=Local&lt;br /&gt;
|Geo-localization of the activity ?=19.11703460737037, -98.2185949130876&lt;br /&gt;
|Who organize it=Radio Zacatepec&lt;br /&gt;
|organisation(s) website=https://zacatepecradio.blogspot.com/&lt;br /&gt;
|For whom is it organized=Mujeres de una radio comunitaria y mujeres de la comunidad que participan de un proceso de defensa del territorio&lt;br /&gt;
|How many people trained=15&lt;br /&gt;
|Motivations for organizing training=Si bien el proceso de resistencia contra megaproyectos logró la creación de una radio comunitaria desde la cual las mujeres lograron hacer oír su voz se han topado con la patriarcado de sus compañeros de lucha, el poder acompañarles era importante para acercar herramientas de autocuidado y espacios de reflexión para lo que viven desde ellas, es decir sin imponer una postura  externa a sus propios procesos.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=1. Manejar la ansiedad - contener&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
el cuerpo&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
2. Creando Documentación y Preservando Memoria Colectiva  Workshops&lt;br /&gt;
Paso 1: Introducción (25 min)&lt;br /&gt;
Paso 2: Dibujando un mapa (15 min)&lt;br /&gt;
Paso 3: Discusión (30 min)&lt;br /&gt;
Paso 4: Explorando diferentes herramientas para documentar nuestra memoria colectiva (25 min)&lt;br /&gt;
Paso 5: Profundizando los mapas de nuestras memorias colectiva (45 min)&lt;br /&gt;
Paso 4. Cierre (15 min)&lt;br /&gt;
Adaptación&lt;br /&gt;
3. Nuestras historias sobre las tecnologías  Workshops&lt;br /&gt;
Preparación&lt;br /&gt;
Paso 1: Introducción (15 min)&lt;br /&gt;
Paso 2: Conocimientos y técnicas ancestrales (35 min)&lt;br /&gt;
Paso 3: Perspectivas coloniales sobre las tecnologías (25 min)&lt;br /&gt;
Paso 4: Tecnologías diferenciadas en función del género (20 min)&lt;br /&gt;
Paso 5: Cierre (10 min)&lt;br /&gt;
4. Nuestro lugar en la web &lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Post-its&lt;br /&gt;
Lapices&lt;br /&gt;
Papelografo&lt;br /&gt;
5. Liberar estrés físico - cuello&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Activities&lt;br /&gt;
y espalda&lt;br /&gt;
6. Manejar la ansiedad - enfocar&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
7. Mapeo de Información &lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Papelografo&lt;br /&gt;
Post-its&lt;br /&gt;
Marcadores&lt;br /&gt;
la energía&lt;br /&gt;
Activities&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
Activities&lt;br /&gt;
8. Creando una Identidad Temporal&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
9. Descargar emociones &lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
&lt;br /&gt;
En Linea&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
Activities&lt;br /&gt;
10. Estrategias para reducir riesgos&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Papelografo&lt;br /&gt;
Marcadores&lt;br /&gt;
en protestas y manifestaciones&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
11. Estrategias de comunicación feministas  Workshops&lt;br /&gt;
Paso 1: Introducción (20 min)&lt;br /&gt;
Paso 2: Analizar campañas (40 min)&lt;br /&gt;
Paso 3: Desarrollar una estrategia de comunicación para tu campaña (45 min)&lt;br /&gt;
Paso 4: Síntesis (20 min)&lt;br /&gt;
Adaptaciones&lt;br /&gt;
|Methodologies for training=Se probó la metodología sugerida en https://es.gendersec.train.tacticaltech.org&lt;br /&gt;
|Existing toolkits and resources=Se usaron los sugeridos en la curricula de ttps://es.gendersec.train.tacticaltech.org para las sesiones elegidas&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=En lo personal me representó un reto y muchos aprendizajes, me sacó de un sitio de confort sobre los talleres de seguridad digital que estaba acostumbrada a compartir y me gustó poder usar los materiales del sitio https://es.gendersec.train.tacticaltech.org creo que ésta currícula llegó a enriquecer los talleres de seguridad digital.&lt;br /&gt;
|Feedbacks=Al finalizar el taller se preguntó a las compañeras cómo se sentían o que pensaban y en general las expresiones fueron de sentir que habían adquirido habilidades que les serían de mucha ayuda y que veían la necesidad de continuar con trabajos como éste.&lt;br /&gt;
|START=Me gustó mucho el poder calcular mejor los tiempos y llevar más ejemplos que se puedan usar en diferentes situaciones&lt;br /&gt;
|STOP=Intentar trabaja con grupos con diferentes edades asumiendo que no habrá una relación de poder entre mujeres jóvenes y mayores derivadas de una relación de parentesco.&lt;br /&gt;
|KEEP=Introducir sesiones de contención del cuerpo y creo que es muy útil contemplar la sesión de “Nuestras historias sobre las tecnologías”&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_cartograf%C3%ADa_y_seguridad_digital_dirigido_a_mujeres,_Oaxaca,_Mexico&amp;diff=9668</id>
		<title>Taller de cartografía y seguridad digital dirigido a mujeres, Oaxaca, Mexico</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_de_cartograf%C3%ADa_y_seguridad_digital_dirigido_a_mujeres,_Oaxaca,_Mexico&amp;diff=9668"/>
				<updated>2018-12-20T14:04:27Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Taller de cartografía y seguridad digital dirigido a mujeres |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller de cartografía y seguridad digital dirigido a mujeres&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/23&lt;br /&gt;
|End when ?=2018/11/24&lt;br /&gt;
|Number of hours if only one day ?=2 dias&lt;br /&gt;
|Where is located the activity ?=Local&lt;br /&gt;
|Geo-localization of the activity ?=17.105757753618622, -96.73468141816556&lt;br /&gt;
|Who organize it=UNOSJO&lt;br /&gt;
|For whom is it organized=Jóvenes en proceso de formación pre universitaria que forman parte de un proceso comunitario en defensa del territorio&lt;br /&gt;
|How many people trained=17&lt;br /&gt;
|Motivations for organizing training=Guelatao de Juárez y la UNOSJO son de los territorios y las organizaciones con procesos de autonomía muy logrados, si bien en lucha constante son sitios en los que no solo se resiste sino se construye. Poder hacer éste taller con ellas permitió probar la pertinencia de la currícula para su proceso.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=1. Cómo funciona Internet  Activities&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Papelografo&lt;br /&gt;
Marcadores&lt;br /&gt;
Post-its&lt;br /&gt;
Papel A4&lt;br /&gt;
Lapices&lt;br /&gt;
Tarjetas - Como Funciona Internet&lt;br /&gt;
2. Nuestras historias sobre las tecnologías  Workshops&lt;br /&gt;
Preparación&lt;br /&gt;
Paso 1: Introducción (15 min)&lt;br /&gt;
Paso 2: Conocimientos y técnicas ancestrales (35 min)&lt;br /&gt;
Paso 3: Perspectivas coloniales sobre las tecnologías (25 min)&lt;br /&gt;
Paso 4: Tecnologías diferenciadas en función del género (20 min)&lt;br /&gt;
Paso 5: Cierre (10 min)&lt;br /&gt;
3. Mapeando protección de datos  Activities&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Marcadores&lt;br /&gt;
Post-its&lt;br /&gt;
Documento de Referencia: Plantillas del proceso de manejo de datos&lt;br /&gt;
4. Hackeando Discursos de Odio  Workshops&lt;br /&gt;
Paso 1: Introducción (10 min)&lt;br /&gt;
Paso 2: Historias sobre discurso de odio en linea (25 min)&lt;br /&gt;
Paso 3: Diferentes etapas de un ataque (20 min)&lt;br /&gt;
Paso 4: Como responderle a un troll (25 min)&lt;br /&gt;
Paso 5: Como crear e implementar un block-list (20 min)&lt;br /&gt;
Paso 6: Como construir una base de datos de memes, bromas y respuestas (20 min)&lt;br /&gt;
Paso 7: Construyendo una campaña de contra-discurso (20 min)&lt;br /&gt;
Paso 8: Cierre (10 min)&lt;br /&gt;
Adaptación&lt;br /&gt;
5. Creando una Identidad Temporal&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
En Linea&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
6. Estrategias de comunicación feministas  Workshops&lt;br /&gt;
Paso 1: Introducción (20 min)&lt;br /&gt;
Paso 2: Analizar campañas (40 min)&lt;br /&gt;
Paso 3: Desarrollar una estrategia de comunicación para tu campaña (45 min)&lt;br /&gt;
Paso 4: Síntesis (20 min)&lt;br /&gt;
Adaptaciones&lt;br /&gt;
7. Mapear protestas e identificar&lt;br /&gt;
Materiales y equipo requerido&lt;br /&gt;
Papel&lt;br /&gt;
Lapices&lt;br /&gt;
Post-its&lt;br /&gt;
riesgos&lt;br /&gt;
&lt;br /&gt;
Activities&lt;br /&gt;
8. Soberania tecnologica  Workshops&lt;br /&gt;
Paso 1: Introducción (15 min)&lt;br /&gt;
Paso 2. Comprender el Ciclo del Hardware (40 min)&lt;br /&gt;
Paso 3: Escoger herramientas y servicios (30 min)&lt;br /&gt;
Paso 4: Enfoque sobre iniciativas de soberanía tecnológica (20 min)&lt;br /&gt;
Paso 5: Pasos para micro revoluciones (25 min)&lt;br /&gt;
Paso 5: Cierre (10 min)&lt;br /&gt;
Variaciones&lt;br /&gt;
|Methodologies for training=Se probó la metodología sugerida en https://es.gendersec.train.tacticaltech.org&lt;br /&gt;
|Existing toolkits and resources=Se usaron los sugeridos en la curricula de ttps://es.gendersec.train.tacticaltech.org para las sesiones elegidas&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=En lo personal me representó un reto y muchos aprendizajes, me sacó de un sitio de confort sobre los talleres de seguridad digital que estaba acostumbrada a compartir y me gustó poder usar los materiales del sitio https://es.gendersec.train.tacticaltech.org creo que ésta currícula llegó a enriquecer los talleres de seguridad digital.&lt;br /&gt;
|Feedbacks=Al finalizar el taller se preguntó a las compañeras cómo se sentían o que pensaban y en general las expresiones fueron de sentir que habían adquirido habilidades que les serían de mucha ayuda y que veían la necesidad de continuar con trabajos como éste.&lt;br /&gt;
|START=Me gustó mucho el poder calcular mejor los tiempos y llevar más ejemplos que se puedan usar en diferentes situaciones&lt;br /&gt;
|STOP=Intentar trabaja con grupos con diferentes edades asumiendo que no habrá una relación de poder entre mujeres jóvenes y mayores derivadas de una relación de parentesco.&lt;br /&gt;
|KEEP=Introducir sesiones de contención del cuerpo y creo que es muy útil contemplar la sesión de “Nuestras historias sobre las tecnologías”&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9667</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9667"/>
				<updated>2018-12-20T10:20:21Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos&lt;br /&gt;
humanos y equidad de género'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  ?&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.&lt;br /&gt;
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9666</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9666"/>
				<updated>2018-12-13T14:18:33Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Asociacion de Derechos Digitales - 'Que no quede huella, que no que no'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Dálogos feministas para las libertades y autocuidados digitales, a propósito de la Tor Meeting 2018 en Ciudad de México.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.cybercivilrights.org/online-removal/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.&lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9665</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9665"/>
				<updated>2018-12-13T14:16:28Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Asociacion de Derechos Digitales - 'Que no quede huella, que no que no'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Dálogos feministas para las libertades y autocuidados digitales, a propósito de la Tor Meeting 2018 en Ciudad de México.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''National Network to End Domestic Violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.techsafety.org/documentationtips/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* '''Without My Consent: Tools to fight online harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://withoutmyconsent.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn. &lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9664</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9664"/>
				<updated>2018-12-11T08:47:46Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Asociacion de Derechos Digitales - 'Que no quede huella, que no que no'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Dálogos feministas para las libertades y autocuidados digitales, a propósito de la Tor Meeting 2018 en Ciudad de México.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Data Detox Dating apps''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://datadetox.myshadow.org/en/bonus/dating&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Deutsch, French, Portuguese&lt;br /&gt;
&lt;br /&gt;
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Seguridad_Digital_Para_Activistas_Coyhaique,_Chile&amp;diff=9663</id>
		<title>Seguridad Digital Para Activistas Coyhaique, Chile</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Seguridad_Digital_Para_Activistas_Coyhaique,_Chile&amp;diff=9663"/>
				<updated>2018-11-28T11:58:49Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Taller Feminista: Seguridad Digital Para Activistas Coyhaique |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Feminista: Seguridad Digital Para Activistas Coyhaique&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/23&lt;br /&gt;
|End when ?=2018/11/28&lt;br /&gt;
|Number of hours if only one day ?=8&lt;br /&gt;
|Where is located the activity ?=Regional&lt;br /&gt;
|Geo-localization of the activity ?=-45.50119532291497, -72.10134298217923&lt;br /&gt;
|Who organize it=Organizadoras:&lt;br /&gt;
&lt;br /&gt;
Radio HumedaLes, Cultura y Existencia Lesbiana&lt;br /&gt;
http://radiohumedales.org/&lt;br /&gt;
&lt;br /&gt;
Apoyan: Colectivo de Mujeres Desnudando de Coyhaique (colectivo feminista con 16 años organizadas en el territorio, sin sitio web, actualmente sólo poseen un blog desactualizado http://desnudando.blogspot.com/)&lt;br /&gt;
&lt;br /&gt;
Facilitadora: Mafe Barrera&lt;br /&gt;
|organisation(s) website=http://radiohumedales.org/&lt;br /&gt;
|For whom is it organized=Las participantes fueron mujeres organizadas en colectivas feministas y en defensa del medioambiente tales como Colectivo Desnudando; Agrupación en Defensa y Protección de los Derechos de Niños y Niñas de la Región de Aysen; y defensoras de la Red Antiminerías: NO MÁS MINERAS EN LA PATAGONIA.&lt;br /&gt;
|How many people trained=20&lt;br /&gt;
|Motivations for organizing training=A través de la denuncia realizada en junio de este año por una de nuestras compañeras a un cura abusador sexual en ese territorio, hemos tenido la oportunidad de conocer el importante trabajo y resistencia que sostienen las defensoras&lt;br /&gt;
medioambientalistas y feministas en un contexto determinado por el aislamiento y las dificultades de acceso al mismo; debido a razones geográficas y climáticas. &lt;br /&gt;
En términos políticos, ese aislamiento se materializa en altos niveles de violencia contra las mujeres y la población infantil. También es un territorio permanentemente asediado por los proyectos del saqueo extractivista transnacional, avalado por los gobiernos chilenos y potencializados por el actual gobierno del ultraderechista Sebastián Piñera; quien además de liderar una nueva arremetida al territorio con 3 NUEVOS PROYECTOS MINEROS EN LA ZONA, amenazando a la población con represión y violencia, intensificando la militarización en la región.&lt;br /&gt;
Recientemente, el gobierno de Sebastián Piñera ha asesinado a 2 defensores ambientalistas: Alejandro Castro defensor y vocero de las comunidades en lucha NO MAS ZONAS DE SACRIFICIO QUINTERO-PUCHUNCAVÍ. Alejandro era un activista y joven pescador que apareció “colgado” en un paradero de micro cerca de su casa; aparentando un supuesto suicidio. Una semana después, el “Comando Jungla” (policía militar entrenada para atacar a las comunidades mapuche en Wallmapu, inaugurada este año), asesinó al defensor de la tierra mapuche Camilo Katrillanka mientras trabajaba con su hermano de 15 años en labores agrícolas al interior de su campo. Se ha intensificado el actuar y las consecuencias de la alianza militar/gubernamental en contra de quienes se oponen al saqueo del medioambiente, y por estos días hay un clima muy tenso en el país en general, principalmente en lo que respecta a los territorios en tensión con las empresas extractivistas transnacionales.&lt;br /&gt;
Es por esto que hemos querido hacer la actividad de réplica en este territorio específico, dadas las condiciones de aislamiento y la intensificación y avanzada de la violencia fascista en la zona. Pues, pensamos que ahora más que nunca es necesario informarnos y fortalecer nuestras estrategias de resistencia, autodefensa y seguridad, para organizar y materializar nuestra rebeldía y lucha, pues es fundamental que la pongamos en marcha y que no nos &lt;br /&gt;
expongamos a ataques en ese proceso.&lt;br /&gt;
|Upload content=Radiohumedlaes.png&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda:&lt;br /&gt;
&lt;br /&gt;
10 a 10:30 Bienvenida y presentación. Acuerdos para la jornada.&lt;br /&gt;
&lt;br /&gt;
10:30 a 11:30 De qué hablamos cuando hablamos de SEGURIDAD? Introducción y definición del concepto de seguridad, reflexión guiada sobre la importancia de valorar el impacto de nuestras rebeldías y protegerlas, en el marco político de nuestros respectivos contextos.&lt;br /&gt;
&lt;br /&gt;
11:30 a 12:00 Explicación Matriz de Análisis de Riesgo.&lt;br /&gt;
&lt;br /&gt;
12:00 a 14:00 Actividad Grupal: Análisis de Riesgo Colectivo. Discusión y panorámica territorial + valoración de riesgos de acuerdo a la propuesta de matriz de análisis.&lt;br /&gt;
&lt;br /&gt;
14:00 a 15:00 ALMUERZO COLECTIVO&lt;br /&gt;
&lt;br /&gt;
15:00 A 16:00 Seguridad Digital, aspectos básicos: cómo funciona internet; La gran huella de datos; sistema operativo, propuestas y alternativas.&lt;br /&gt;
&lt;br /&gt;
16:00 a 18:00 Kit básico de herramientas digitales para activistas: Para conocer e Instalar! Herramientas de 1) Navegación y Búsqueda Segura, 2) Móvil; 3) Correo Seguro y Redes Sociales, 4) Contraseña Segura&lt;br /&gt;
&lt;br /&gt;
18:00 Cierre, Sintesis, Retroalimentación&lt;br /&gt;
|Methodologies for training=Metodología feminista y educación popular. Trabajo en grupo, exposición de contenidos centrales, dinámicas de presentación y animación. Aplicación e instalación de herramientas digitales.&lt;br /&gt;
|Existing toolkits and resources=APUNTES:&lt;br /&gt;
&lt;br /&gt;
-Apuntes de Seguridad Digital – Taller Feminista Seguridad Digital para Activistas Coyhaique, 2018. Compartimos en Anexo 1, (al final de este documento).&lt;br /&gt;
&lt;br /&gt;
-Apunte Taller de Seguridad Digital para Encuentros de Autodefensas y Feministas y Mujeres en Lucha, Valparaíso 2018&lt;br /&gt;
&lt;br /&gt;
FANZINES y MANUALES:&lt;br /&gt;
&lt;br /&gt;
-Autodefensa en tiempos de Pyrawebs –Una guía de protección para periodistas y activistas contra la vigilancia.&lt;br /&gt;
&lt;br /&gt;
-Conciencia y Manejo del Miedo HERRAMIENTAS A LAS CALLES SIN MIEDO&lt;br /&gt;
&lt;br /&gt;
-Tarjetas de Seguridad Digital HERRAMIENTAS A  LAS  REDES SIN MIEDO www.sinmiedo.com.co&lt;br /&gt;
&lt;br /&gt;
-Guía Básica de Autodefensa Digital para Celulares 32o Encuentro Nacional de Mujeres, Trans, Travas y Lesbianas CHACO 2017&lt;br /&gt;
&lt;br /&gt;
-Taller Manual Aquelarre Feminista –Cochabamba&lt;br /&gt;
&lt;br /&gt;
-PPT Instroducción a la Seguridad Digital&lt;br /&gt;
&lt;br /&gt;
-PPT Herramientas de Seguridad Digital&lt;br /&gt;
&lt;br /&gt;
VIDEO: Qué son los rastros digitales? https://myshadow.org/es&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Me sentí maravillosamente. Fue importante para mí facilitar la actividad por las características del territorio y por la importante lucha que dan cotidianamente quienes participaron de la instancia. Me sentí muy contenta de trabajar con las defensoras, fortalecer redes y facilitar espacio e información sobre canales seguros para que entre ellas pudieran fortalecer su trabajo en red para la resistencia y la organización de la rebeldía en el territorio.&lt;br /&gt;
Además, en lo personal, es muy gratificante para mí volver por tercera vez en el año al territorio, pero esta vez en un rol diferente al de denunciante (de los abusos del cura que hice públicos durante junio de este año, mientras me econtraba participando del IGT Montevideo); pues en esta ocasión fui a tramar feminismo y apoyar con información a las compañeras organizadas en este territorio extremo. Quiero decir, que fue una manera muy potente de resignificar el lugar y cerrar un ciclo. &lt;br /&gt;
Dadas las dificultades de acceso al lugar, no era posible haber viajado con otra compañera, lo que hizo que la jornada fuera bien cansadora para mí como facilitadora. Sin embargo el sentimiento en general es de entusiasmo, confianza, satisfacción y gratitud de haber sido parte de esta instancia.&lt;br /&gt;
|Feedbacks=A las compañeras que asistieron y participaron les encantó el taller por diversos motivos, como que por primera vez se sentían incluídas en el feminismo más allá de las fronteras de la Patagonia; señalaron también lo oportuno del taller ya que el clima en el territorio se está poniendo cada vez más tenso debido a la nueva arremetida de 3 proyectos mineros más, tal como he comentado en otros puntos. De manera que se sintieron contentas de acceder a esta información, en este momento en particular.Una cosa que me ha parecido notable del taller, es que dio la posibilidad para que algunas defensoras se conocieran personalmente; pues a pesar de ser parte de la misma Red Antiminería, no todas se ubicaban personalmente debido a las condiciones geográficas del lugar. En el taller, pudieron abordar temas sensibles para sus organizaciones y también para la Red, problematizándolos además desde una perspectiva feminista que se fortaleció en el intercambio y que seguirá profundizándose, pues las asistentes del taller quedaron contactadas a través de canales seguros donde seguir tramando la rebeldía. Hacia el final del taller, dejamos un momento para la retroalimentación y pedimos que nos contestaran en post it 3 preguntas sencillas.&lt;br /&gt;
&lt;br /&gt;
1.- ¿De qué te diste cuenta con la actividad?&lt;br /&gt;
&lt;br /&gt;
-Me dí cuenta de la necesidad de apoyarnos, cuidarnos, protegernos y seguir creciendo en las confianzas y el respeto mutuo. Y la necesidad de profundizar el cuidado de la información, para protegernos.&lt;br /&gt;
&lt;br /&gt;
-La importancia de estar unidas; evitar la desarticulación. Protegernos para mantener la unidad y la fortaleza de nuestros movimientos.&lt;br /&gt;
&lt;br /&gt;
-Que debo empezar a ser más consciente, protegernos y aplicar las herramientas de seguridad digital!&lt;br /&gt;
&lt;br /&gt;
- Me sirvió para tomar conciencia y accionar por mi seguridad y la de mis compas.&lt;br /&gt;
&lt;br /&gt;
-Me di cuenta de la vulnerabilidad de la info que existe en la matrix. Y que a pesar de ser consciente que debo proteger, no lo he hecho. Y que es refácil tomar un poco de medidas.&lt;br /&gt;
&lt;br /&gt;
- Ingenuidad a la hora de usar el correo o las redes sociales para comunicarme.&lt;br /&gt;
&lt;br /&gt;
- De lo importante y extenso que es la seguridad digital.&lt;br /&gt;
&lt;br /&gt;
- Necesidad de generar espacios (digitales) de resistencia a través de canales alternativos de comunicación y de información.&lt;br /&gt;
&lt;br /&gt;
- De tomar la conciencia y la responsabilidad a la hora de moverme en las redes sociales.&lt;br /&gt;
&lt;br /&gt;
- De que la seguridad puede salir como iniciativa personal y también colectiva.&lt;br /&gt;
&lt;br /&gt;
- Me actualicé de nuevas herramientas al servicio de la seguridad.&lt;br /&gt;
&lt;br /&gt;
2.- ¿Qué te gustó del taller?&lt;br /&gt;
&lt;br /&gt;
- Que fue muy completo y directo.&lt;br /&gt;
&lt;br /&gt;
- La información y los datos actualizados, herramientas y programas nuevos.&lt;br /&gt;
&lt;br /&gt;
- Toda la info concreta para hacer más seguro mi transitar en la red.&lt;br /&gt;
&lt;br /&gt;
- Que sea un espacio separatista, sólo de mujeres.&lt;br /&gt;
&lt;br /&gt;
- Me gustó todo. Desde la convocatoria protegida y dirigida, hasta el espacio de puras mujeres, que permitió la apertura de temas personales y políticos sensibles. Gracias por la información clara y accesible. Por el espacio, que es hermoso y la comida que estaba regia.&lt;br /&gt;
&lt;br /&gt;
- Que fue práctico y se entregaron tips concretos. &lt;br /&gt;
&lt;br /&gt;
- Gracias por este manso día, maravilla de encuentro, gracias por lo entregado con tanto amor. &lt;br /&gt;
&lt;br /&gt;
- La simpleza y el manejo de los contenidos: Aprendí y entendí &lt;br /&gt;
&lt;br /&gt;
- Fue muy lúdico, información clara y precisa.&lt;br /&gt;
&lt;br /&gt;
- Reconocer la importancia de la autoprotección.&lt;br /&gt;
&lt;br /&gt;
- Claridad en la información.&lt;br /&gt;
&lt;br /&gt;
- La información entregada sobre seguridad digital, en lo teórico y en lo práctico.&lt;br /&gt;
&lt;br /&gt;
3.- ¿Qué podemos mejorar?&lt;br /&gt;
&lt;br /&gt;
- Hacer un 2o taller para profundizar en sistema operativo; diseño; programación básica aplicada a la seguridad.&lt;br /&gt;
&lt;br /&gt;
- Se podría realizar una próxima jornada de más días para profundizar en estas temáticas.&lt;br /&gt;
&lt;br /&gt;
- Saber más de cómo hacer contrainformación o sabotear al sapeo.&lt;br /&gt;
&lt;br /&gt;
- Seguir haciendo más talleres.&lt;br /&gt;
&lt;br /&gt;
- Hacer más talleres, incorporar más actividades prácticas de seguridad.&lt;br /&gt;
&lt;br /&gt;
- La continuidad de encuentros de mujeres para aprender de seguridad y feminismo.&lt;br /&gt;
|START=Más allá de ejercicios de respiración, o ejercicios de voz relajantes y energizantes, que sí incluimos durante la jornada a modo de pausas; comenzaría a preparar materiales y metodologías más didácticas o que incorporen el cuerpo. Esto para hacer más orgánica y menos cansadora la jornada que es extensa, que implica una atención sostenida y el procesamiento de mucha información. Trabajo facilitando actividades de capacitación y terapias grupales; pero aún no encontré una forma de integrar actividades corporales al trabajo de seguridad digital. Después de esta experiencia me quedo con varias ideas en la mente...&lt;br /&gt;
|STOP=Coordinar estas instancias de aprendizaje y encuentro con más compañeras, sobretodo cuando son en otras ciudades. Si bien, tuve apoyo de las compañeras de Radio HumedaLes en la fase previa, el día del evento fue cansador sostener las coordinaciones logísticas, administrativo/económicas; además de facilitar metodologías y contenidos. Pienso que, inevitablemente terminé haciéndome más cargo de un aspecto que de otro, priorizando la facilitación del taller.&lt;br /&gt;
|KEEP=Continuar planteando este conocimiento en un lenguaje sencillo y accesible. Es posible, aunque pareciera muy técnico o incluso hostil el mundo de la informática, sí se puede encontrar lenguajes y metodologías accesibles, que  democraticen y descentralicen estos saberes, y en este taller ese fue un aspecto resaltado y reforzado por las participantes.&lt;br /&gt;
&lt;br /&gt;
Vinculando la seguridad digital y holística, con la rebeldía feminista y de las mujeres defensoras de la tierra y el agua. Me parece una propuesta muy potente y necesaria de difundir, ante la avanzada de los fundamentalismos en Abya Yala y nuestros territorios locales.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Radiohumedlaes.png&amp;diff=9660</id>
		<title>File:Radiohumedlaes.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Radiohumedlaes.png&amp;diff=9660"/>
				<updated>2018-11-28T11:47:57Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Autodefensa_Digital_Feminista_Avanzado,_Nicaragua&amp;diff=9659</id>
		<title>Autodefensa Digital Feminista Avanzado, Nicaragua</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Autodefensa_Digital_Feminista_Avanzado,_Nicaragua&amp;diff=9659"/>
				<updated>2018-11-28T11:24:01Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Autodefensa Digital Feminista Avanzado&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/09/15&lt;br /&gt;
|End when ?=2018/11/15&lt;br /&gt;
|Geo-localization of the activity ?=12.278464478674, -86.281406353081&lt;br /&gt;
|Who organize it=EnRedadas, por el Arte y la Tecnología&lt;br /&gt;
|organisation(s) website=enredadas.org&lt;br /&gt;
|For whom is it organized=Mujeres jóvenes feministas, activistas y estudiantes de Managua y Estelí.&lt;br /&gt;
|How many people trained=49&lt;br /&gt;
|Motivations for organizing training=El contexto nacional  actual incrementó los niveles de vulnerabilidad de las mujeres jóvenes activistas y defensoras de derechos humanos. Entre abril y noviembre se registran más de 100 denuncias de violencia contra defensoras de derechos humanos.&lt;br /&gt;
&lt;br /&gt;
Surge la necesidad de encontrarnos con otras, reflexionar sobre la seguridad digital y compartir conocimientos para mitigar las violencias que nos asechan desde nuestro rol de activistas.&lt;br /&gt;
&lt;br /&gt;
En las fechas detalladas se desarrollaron tres espacios de reflexión y formación entre mujeres jóvenes sobre autodefensa digital feminista y autocuido; y se creo una cartilla básica de seguridad digital. &lt;br /&gt;
&lt;br /&gt;
Se convocó a las 50 mujeres que participaron en los talleres de autodefensa digital feminista facilitados entre abril y agosto, a una sesión avanzada para profundizar en temáticas como cifrado, anonimato y seguridad en móviles. Sin embargo, la convocatoria no tuvo una buena respuesta, se tuvo que replantear el contenido y abrir la convocatoria a otras mujeres activistas y feministas, sin requisito previo para participar.&lt;br /&gt;
|Topics addressed=seguridad digital, autodefensa, privacidad&lt;br /&gt;
|Links about the activity=Por el mismo contexto, no se publicó información sobre la actividad. La convocatoria se gestionó a través de mensajes privados y grupos seguros. O a través de colectivas amigas.&lt;br /&gt;
|Upload content=tallerEnredadas.JPG&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Taller Autodefensa Digital Feminista - 22/09/2018&lt;br /&gt;
Espacio de 6 horas con 9 participantes, realizado en colaboración con una colectiva de feministas jóvenes. El taller tuvo tres momentos metodologicos: &lt;br /&gt;
Reflexión sobre riesgos y nuevas realidades nacionales&lt;br /&gt;
Sombras digitales, hábitos tecnológicos y estrategias de autodefensa&lt;br /&gt;
Fortaleciendo nuestros espacios: contraseñas, navegación, mensajería y alternatias de comunicación. &lt;br /&gt;
Matria Libre para Vivir. Autocuido y autodefensa digital para el activismo sostenible - 20/10/2018&lt;br /&gt;
Espacio de 6 horas con 26 participantes, la mayoría activistas sociales. Este espacio tuvo cuatro momentos metodológicos:&lt;br /&gt;
Reconexión con nuestros cuerpos y ejercicios de sororidad. &lt;br /&gt;
Sesión de biodanza&lt;br /&gt;
Mapeo de incidentes de seguridad digital en los últimos 6 meses. &lt;br /&gt;
Creación colectiva de estrategias para prevención y mitigación.&lt;br /&gt;
Taller Autodefensa Digital Feminista en Estelí - 3 y 4 /11/2018&lt;br /&gt;
Espacio de 10 horas, dividido en 2 días con 10 participantes, jóvenes feministas de la ciudad de Estelí. Se abordaron los siguientes contenidos &lt;br /&gt;
Reflexión sobre riesgos y nuevas realidades nacionales&lt;br /&gt;
Sombras digitales, hábitos tecnológicos y estrategias de autodefensa&lt;br /&gt;
Fortaleciendo nuestros espacios: contraseñas, navegación, mensajería y alternatias de comunicación. &lt;br /&gt;
Uso de KeepassX y Veracrypt&lt;br /&gt;
|Methodologies for training=Objetivo: Fortalecer los conocimientos en autodefensa digital feminista de 30 mujeres jóvenes activistas que trabajan temas de género y ciudadanía en Nicaragua, através de la realización de tres espacios de reflexión y formación, y la creación de una cartilla de autodefensa digital feminista.&lt;br /&gt;
|Existing toolkits and resources=Se trabajó en el desarrollo de un contenido básico, para ser compartido y distribuido a personas que no han participado de procesos de seguridad, abarcando contraseñas, seguridad móvil, mensajeria y redes sociales. &lt;br /&gt;
Se realizó un tiraje de 300 plegables y se entregó a las participantes de los espacios como una herramienta para multiplicar los conocimientos con sus espacios de confianza.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=En un contexto constantemente cambiante, tuvimos que hacer un par de cambios sobre la marcha; concluyendo el proceso en una forma positiva.  &lt;br /&gt;
La idea inicial se basaba en la continuidad de un proceso de formación con 30 mujeres que habían participado en talleres previos; pero ante la baja respuesta a la convocatoria y la comunicación directa con varias de las participantes convocadas: se tomó la decisión de realizar talleres básicos, sin requisito previo. Se identifica que los contenidos “avanzados” se perciben como demasiado trabajo. Persiste la idea de que son herramientas “para personas que realmente lo necesitan”, es decir, que no se perciben a si mismas en situaciones de riesgo.&lt;br /&gt;
Se planteo además la necesidad de convocar a un espacio con un enfoque holístico, incorporando elementos de autocuidado.&lt;br /&gt;
|Feedbacks=Las participantes responden positivamente al enfoque feminista de la autodefensa digital. Destacan la necesidad de replicar estos conocimientos desde el empoderamiento de nuestros espacios digitales y dispositivos; y no desde el miedo. &lt;br /&gt;
Un par de participantes habían participado de espacios de seguridad digital en el pasado y afirman que el enfoque técnico, poco explicativo, fue una barrera para su aprendizaje.&lt;br /&gt;
|START=Se identificó la necesidad de profundizar la reflexión tecnopolítica: analizar sus hábitos, sus dispositivos, pero también analizar las mismas plataformas y aplicaciones que utilizamos en la cotidianeidad.  &lt;br /&gt;
Tenemos pendiente continuar la experimentación con la creación de fundas faraday con elementos reciclados. El uso de cajas tetrapack tuvo los resultados esperados con los telefonos más nuevos y se considera necesario experimentar con otros materiales de construcción.&lt;br /&gt;
|STOP=Aunque se había realizado un sondeo con las participantes de los primeros cinco talleres realizados por EnRedadas a partir de abril del 2018; y la mayoría afirmó les gustaría participar en un taller más avanzado, esto no se concretó. Se habló directamente con algunas de las mujeres participantes, que no se inscribieron en los talleres y nos comentaron que se les hacía díficil planificar su asistencia a un taller. La incertidumbre generada por el mismo contexto, hace mucho más compleja la planificación. &lt;br /&gt;
Otra hipótesis sobre la baja convocatoria para talleres más avanzados, es que las activistas no se perciben a si mismas como personas en riesgo. Se piensa que sólo las activistas “pesadas” están expuestas; aunque la realidad nacional comprueba lo contrario.&lt;br /&gt;
|KEEP=Por el contexto. las convocatorias se gestionaron de manera cerrada, a través de redes y contactos de confianza. &lt;br /&gt;
Durante los eventos se tomaron fotografías respetando las identidades y privacidad de las participantes.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:TallerEnredadas.JPG&amp;diff=9658</id>
		<title>File:TallerEnredadas.JPG</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:TallerEnredadas.JPG&amp;diff=9658"/>
				<updated>2018-11-28T11:23:48Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Gendersec_training_curricula&amp;diff=9657</id>
		<title>Gendersec training curricula</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Gendersec_training_curricula&amp;diff=9657"/>
				<updated>2018-11-28T10:58:50Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Version Castellano abajo&lt;br /&gt;
&lt;br /&gt;
=== What is the Gendersec Training Curricula and what does it cover? ===&lt;br /&gt;
&lt;br /&gt;
The [https://en.gendersec.train.tacticaltech.org/ Gendersec Curricula is a resource] that introduces a holistic, feminist perspective to privacy and digital security trainings. Informed by years of working with women and trans activists around the world, this free resource covers over 20 topics such as Hacking Hate Speech, Strategies of Resistance, Creative Uses of Social Media,Technological Sovereignty, Handling Anxiety, Releasing Physical Stress, Information Mapping and Identifying Risks. Trainers can access the workshops and adapt them to their communities to help Women, activists and Human Rights Defenders to protect themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
=== What is the context? ===&lt;br /&gt;
&lt;br /&gt;
The Gendersec training curricula has been developed since 2014 for training events called the &amp;quot;Gender and Technology Institutes&amp;quot; (GTI), which are oriented towards women activists, women human rights defenders and LGBTIQ, and have taken place around the world in Germany, Nicaragua, Ecuador, Spain, Panama, Skri Lanka, Malaysia, Mexico and Uruguay. In partnership with local and international organisations, each GTI has further developed specific facilitation methodologies and training contents addressing the risks, attacks and contexts faced by activist women in the region. &lt;br /&gt;
&lt;br /&gt;
During these events, we have worked with amazing women and trans people that are land defenders, indigenous leaders, sexual and reproductive rights activists, artivists, privacy advocates, lawyers, journalists and human rights defenders. The Gendersec curricula is based on the insights and conversations that grew out of this series of encounters, and the work of over 50 great facilitators and curricula developers engaged in using, developing and training others in a reflective and empowering use of Information and Communication Technologies.&lt;br /&gt;
&lt;br /&gt;
If you want to know more about the Gender and Technology Institutes you can read  [https://gendersec.tacticaltech.org/wiki/images/f/fe/GTI_ImpactStudy_2017.pdf our paper analysing the outcomes and impact of the GTIs] - to be updated before end of 2018.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What is the method and framework? ===&lt;br /&gt;
&lt;br /&gt;
The methodological framework for the GTI is based on gender and social justice with a feminist perspective, incorporating established methods such as the shaping of safe spaces, understanding of one’s privileges and intersectionality, paying attention to power and inequitable relationships, enabling self and collective care and creating nurturing and inclusive processes for reflection, exchanges and learning. &lt;br /&gt;
&lt;br /&gt;
The GTI events, and the accompanying curricula, look at feminist critiques and perspectives of technology, how women and LGBTIQ people are disproportionately targeted by hate speech and gender based violence online and offline, and the initiatives and practices enabling women and LGBTIQ to include themselves in privacy and security.&lt;br /&gt;
&lt;br /&gt;
This approach is complemented by basic principles of adult learning – more specifically, the ADIDS method (Activity-Discussion-Input-Deepening-Synthesis), which is frequently used in awareness-raising workshops on different social issues. For digital and holistic security training, which mixes both awareness-raising on issues and teaching technical and strategic solutions, the ADIDS methodology is a good fit. &lt;br /&gt;
&lt;br /&gt;
The [https://en.gendersec.train.tacticaltech.org/downloads/en/trainingmethodologies-en.pdf following document describes the key elements] to bear in mind when developing an awareness or training session on technologies aimed at audiences made up of adults. It is recommended to read it first.&lt;br /&gt;
&lt;br /&gt;
=== Who created the workshops and activities included in the curricula? ===&lt;br /&gt;
&lt;br /&gt;
Every workshop and activity included in this repository is based on different contributions and ideas brought together by facilitators, participants and champions invited to different GTIs. In addition to this multilayer process, we held a specific curricula development for 5 days in Berlin in April 2018. As we reviewed all the past contents created during GTIs or related training activities documented in the Gendersec Wiki, we realised that it would be difficult to strictly attribute specific authors to specific sessions. This is why we have decided to acknowledge all facilitators invited at the five institutes and at the curricula development event in Berlin as contributors. Note that each workshop has an &amp;quot;inspiration&amp;quot; field, which makes explicit reference to persons, organisations and/or methodologies that have inspired those contents, even though those persons or organisations were not part of the development of any institute.&lt;br /&gt;
&lt;br /&gt;
==== Licensing ====&lt;br /&gt;
&lt;br /&gt;
The Gender and Technology Institute Curricula by Tactical Technology Collective is licensed under a [https://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License]&lt;br /&gt;
&lt;br /&gt;
==== Credits ====&lt;br /&gt;
&lt;br /&gt;
'''Coordination Gendersec training curricula:''' &lt;br /&gt;
Alex Hache and Gabriela Rodriguez.&lt;br /&gt;
&lt;br /&gt;
'''Facilitators that have contributed to the development of curricula for the Gender and Technology Institutes.'''&lt;br /&gt;
&lt;br /&gt;
'''GTI Germany, 2014:''' Azeenarh, Tatiana, Nora, Anne Roth, Faith, Eva Cruels, Maya Ganesh, Kim, Sandra Ljubinkovic, Cheekay, Carol, Paula Graham Gazzard, Floriana Pagano, Lilith Lela, Stephanie Hankey, Bobby, Jac, Daniel Ó Cluanaigh, Alex Hache.&lt;br /&gt;
&lt;br /&gt;
'''GTI Ecuador, 2016:''' Lu Ortiz, Emilie De Wolf, Mayeli Sanchez Martınez, Fieke Jansen, Andrea, Lucía Egaña Rojas, Pedro, Gema Manzanares Reyes, Florencia Goldsman, Hedme Sierra-Castro, Gema Jiménez/Hask, Loreto Bravo, Alex Hache.&lt;br /&gt;
&lt;br /&gt;
'''GTI Malaysia, 2017:''' Cheekay, Dhyta Caturani, Carol, Htaike, Nighat, Maya Ganesh, Jac, Anja, Dalia Otman.&lt;br /&gt;
&lt;br /&gt;
'''GTI Panama, 2017:''' Paz Peña, Joana Varon, Raquel Renno, Lu Ortiz, Emilie De Wolf, Mayeli Sanchez Martınez, Lucía Egaña Rojas, Gema Manzanares Reyes, Florencia Goldsman, Hedme Sierra-Castro, Gema Jiménez/Hask, Loreto Bravo, Alex Hache, Nadège, Anais, Roslyn.&lt;br /&gt;
&lt;br /&gt;
'''GTI Uruguay, 2018:''' Paz Peña, Mayeli Sanchez Martınez, Gema Manzanares Reyes, Florencia Goldsman, Gema Jiménez/Hask, Loreto Bravo, Alex Hache, Gabriela Rodriguez, Nallely, Liliana, Ana Margarita, Fernanda Shirakawa, Tes.&lt;br /&gt;
&lt;br /&gt;
'''Curricula development event, 2018:''' Alex Hache, Gabriela Rodriguez, Leil Zahra, Ling, Semanur Karaman, Bjoerk Roi, Nina, Nadège, Matt Mitchell, Daniel Ó Cluanaigh, Sandra Ljubinkovic, Lucía Egaña Rojas, Joana Varon, Tamar Ayrikyan, Abir Ghattas, Jacopo Anderlini.&lt;br /&gt;
&lt;br /&gt;
'''Copy-editing:''' Christy Lange.&lt;br /&gt;
&lt;br /&gt;
'''Special thanks to:''' Bjoerk Roi and Ling.&lt;br /&gt;
&lt;br /&gt;
'''Special thanks to all the organisations that have partneship with Tactical tech for the organisation of GTI events around the world:'''&lt;br /&gt;
&lt;br /&gt;
Association for Progressive Communications (APC) - https://www.apc.org/en/wrp&lt;br /&gt;
&lt;br /&gt;
Asian-Pacific Resource &amp;amp; Research Centre for Women (Arrow) - https://arrow.org.my/&lt;br /&gt;
&lt;br /&gt;
Amnesty International - https://www.amnesty.org/en/&lt;br /&gt;
&lt;br /&gt;
Article 19 - https://www.article19.org/&lt;br /&gt;
&lt;br /&gt;
Ciberseguras - https://ciberseguras.org&lt;br /&gt;
&lt;br /&gt;
Consorcio Oaxaca - http://consorciooaxaca.org.mx/&lt;br /&gt;
&lt;br /&gt;
Donestech - https://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Enredadas - Tecnologías para la igualdad - https://enredadas.org/&lt;br /&gt;
&lt;br /&gt;
Espacio Encuentro Mujeres&lt;br /&gt;
&lt;br /&gt;
Fondo Centroamericano de Mujeres - https://www.fcmujeres.org/&lt;br /&gt;
&lt;br /&gt;
Fondo de Acción Urgente Latino americano - https://fondoaccionurgente.org.co&lt;br /&gt;
&lt;br /&gt;
FRIDA the Young Feminist Foundation - https://youngfeministfund.org/&lt;br /&gt;
&lt;br /&gt;
Fundación Karisma - http://fundacionkarisma.org/&lt;br /&gt;
&lt;br /&gt;
GIZ Ecuador - https://www.giz.de/en/worldwide/28451.html&lt;br /&gt;
&lt;br /&gt;
JASS – Just Associates Mesoamerica - https://justassociates.org/&lt;br /&gt;
&lt;br /&gt;
Laboratorio de Interconectividades - https://lab-interconectividades.net/&lt;br /&gt;
&lt;br /&gt;
Luchadoras - https://luchadoras.mx/&lt;br /&gt;
&lt;br /&gt;
Sentimos Diverso - http://www.sentimosdiverso.org/&lt;br /&gt;
&lt;br /&gt;
Mama Cash - https://www.mamacash.org/&lt;br /&gt;
&lt;br /&gt;
Protection International - https://www.protectioninternational.org/&lt;br /&gt;
&lt;br /&gt;
SAFE - https://www.irex.org/project/safe-securing-access-free-expression&lt;br /&gt;
&lt;br /&gt;
Tecnicas Rudas - http://www.tecnicasrudas.org/&lt;br /&gt;
&lt;br /&gt;
Via Campesina - https://viacampesina.org/&lt;br /&gt;
&lt;br /&gt;
Women Help Women - https://womenhelp.org/&lt;br /&gt;
                         &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ¿Qué es Gendersec y qué cubre? ===&lt;br /&gt;
&lt;br /&gt;
El [https://gendersec.train.tacticaltech.org/ currículo de capacitación Gendersec es un recurso] que introduce una perspectiva holistica y feminista en las capacitaciones sobre privacidad y seguridad digital. Se basa en nuestra experiencia organizando Institutos de Género y Tecnología para mujeres y activistas trans de todo el mundo. Es un recurso de acceso libre, disponible en inglés y español,  que cubre más de 20 temas desde Hackear el discurso de odio, Riesgos y estrategias de las plataformas de citas, Usos creativos de las redes sociales, Mapeo de riesgos, Manejo del estrés, Soberanía tecnológica y Estrategias de resistencia. Capacitadoras, facilitadoras y defensoras pueden acceder estos talleres y adaptarlos a sus comunidades para apoyar las Defensoras de Derechos Humanos en protegerse de amenazas en línea y fuera de línea.&lt;br /&gt;
&lt;br /&gt;
=== ¿En que contexto? ===&lt;br /&gt;
&lt;br /&gt;
El currículo de capacitación Gendersec ha sido desarrollado desde 2014 para los eventos de capacitacion llamados &amp;quot;Institutos de Genero y Tecnologías&amp;quot; (IGT), orientados a mujeres activistas, defensoras de derechos humanos y personas LGBTIQ y que han tenido lugar en Alemania, Nicaragua, Ecuador, España, Panamá, Skri Lanka, Malasia, México y Uruguay. En asociación con organizaciones locales e internacionales, cada IGT ha desarrollado contenidos y metodologías específicas que abordan los riesgos, ataques y contextos que enfrentan las mujeres activistas en esas regiones.&lt;br /&gt;
&lt;br /&gt;
Durante esos eventos, hemos trabajado con mujeres y personas trans que son defensores de la tierra, líderes indígenas, activistas de los&lt;br /&gt;
derechos sexuales y reproductivos, artivistas, abogadas, periodistas, defensoras de la privacidad y de los derechos humanos. El currículo de capacitación Gendersec se basa en las ideas y conversaciones que surgieron en esos encuentros, y en el trabajo de más de 50 increíbles facilitadoras y desarrolladoras de currículos que se dedican a usar, desarrollar y formar a otras personas en el uso critico y empoderante de las Tecnologías de la Información y la Comunicación. &lt;br /&gt;
&lt;br /&gt;
Si desea más [https://gendersec.tacticaltech.org/wiki/images/f/fe/GTI_ImpactStudy_2017.pdf detalles acerca de los Institutos de Género y Tecnología puede leer nuestro analisis de su impacto]. Se actualizará antes de finales de 2018.&lt;br /&gt;
&lt;br /&gt;
=== ¿Cual es el enfoque metodológico? ===&lt;br /&gt;
&lt;br /&gt;
El enfoque metodológico esta basado en una perspectiva de genero y justicia social desde el feminismo, incorporando métodos establecidos desde hace tiempo, como la creación de lugares más seguros, la comprensión de los privilegios propios e interseccionalidades, la atención a las relaciones de poder e iniquidad, habilitando el autocuidado y los cuidados colectivos, creando procesos inclusivos para la reflexión, el intercambio y aprendizaje.&lt;br /&gt;
&lt;br /&gt;
Los IGT y los planes de estudio que los acompañan, se basan en las críticas y perspectivas feministas de la tecnología, de que maneras las mujeres y las personas LGBTIQ son atacadas con discursos de odio y violencias basadas en su género en línea y fuera de línea, así como se enfocan en las iniciativas y opciones que les permiten incluirse en las practicas de privacidad y seguridad. Este acercamiento se complementa con principios de aprendizaje para adultos - más específicamente, el método ADIDS (Activity-Discussion-Input-Deepening-Synthesis en ingles), que se usa ampliamente en talleres para concienciar acerca de diversos temas sociales. La  metodología ADIDS es una buena opción para facilitar temas de seguridad holistica y digital.&lt;br /&gt;
&lt;br /&gt;
En el [https://es.gendersec.train.tacticaltech.org/downloads/es/trainingmethodologies-es.pdf siguiente documento se describen los elementos clave a tener en cuenta] a la hora de desarrollar una sesión de sensibilización o formación sobre tecnologías dirigida a un público formado por adultos. Se recomienda leerlo primero.&lt;br /&gt;
&lt;br /&gt;
=== ¿Quién creo los talleres y actividades incluidos en el currículo? ===&lt;br /&gt;
&lt;br /&gt;
Cada taller y actividad incluido en este repositorio está basada en varias ideas y aportes que trajeron consigo las facilitadoras, participantes y expertas invitadas a diferentes IGT. Además de este proceso en varias etapas, organizamos un evento de 5 días para el&lt;br /&gt;
desarrollo de los contenidos del currículo en Abril del 2018. Mientras revisábamos contenidos pasados creados para los IGT o  relacionados con actividades de facilitación documentadas en la wiki de gendersec, nos dimos cuenta que seria difícil atribuir las sesiones a autores especificas. Por lo tanto decidimos dar crédito a todas las facilitadoras invitadas a los cinco institutos y al evento de desarrollo de curricula en Berlin como contribuidoras. Resaltamos que cada taller tiene un campo &amp;quot;inspiración&amp;quot;, que hace referencia explicita a personas, organizaciones y/o metodologías que inspiran estos contenidos, aunque esas personas u organizaciones no fueran parte del desarrollo de ninguno de los institutos.&lt;br /&gt;
&lt;br /&gt;
==== Licencia ====&lt;br /&gt;
&lt;br /&gt;
La curricula del Instituto de Genero y Tecnología por Tactical Technology Collective está licenciada bajo la licencia [https://creativecommons.org/licenses/by-nc-sa/4.0/deed.es Creative CommonsAttribution-NonCommercial-ShareAlike 4.0 International.]&lt;br /&gt;
&lt;br /&gt;
==== Creditos ====&lt;br /&gt;
&lt;br /&gt;
'''Coordinación''': Alex Hache y Gabriela Rodríguez Berón.&lt;br /&gt;
&lt;br /&gt;
'''Facilitadoras que han aportado al desarrollo de la curicula para los Institutos de Genero y Tecnología:'''&lt;br /&gt;
&lt;br /&gt;
'''IGT Alemania, 2014:''' Azeenarh, Tatiana, Nora, Anne Roth, Faith, Eva Cruels, Maya Ganesh, Kim, Sandra Ljubinkovic, Cheekay , Carol, Paula Graham Gazzard, Floriana Pagano, Lilith Lela, Stephanie Hankey, Bobby, Jac, Daniel Ó Cluanaigh, Alex Hache.&lt;br /&gt;
&lt;br /&gt;
'''IGT Ecuador, 2016:''' Lu Ortiz, Emilie De Wolf, Mayeli Sanchez Martınez, Fieke Jansen, Andrea, Lucía Egaña Rojas, Pedro, Gema Manzanares Reyes, Florencia Goldsman, Hedme Sierra-Castro, Gema Jiménez/Hask, Loreto Bravo, Alex Hache.&lt;br /&gt;
&lt;br /&gt;
'''IGT Malasia, 2017:''' Cheekay, Dhyta Caturani, Carol, Htaike, Nighat, Maya Ganesh, Jac, Anja, Dalia Otman.&lt;br /&gt;
&lt;br /&gt;
'''IGT Panama, 2017:''' Paz Peña, Joana Varon, Raquel Renno, Lu Ortiz, Emilie De Wolf, Mayeli Sanchez Martınez, Lucía Egaña Rojas, Gema Manzanares Reyes, Florencia Goldsman, Hedme Sierra-Castro, Gema Jiménez/Hask, Loreto Bravo, Alex Hache, Nadège, Anais, Roslyn.&lt;br /&gt;
&lt;br /&gt;
'''IGT Uruguay, 2018:''' Paz Peña, Mayeli Sanchez Martınez, Gema Manzanares Reyes, Florencia Goldsman, Gema Jiménez/Hask, Loreto Bravo, Alex Hache, Gabriela Rodriguez, Nallely, Liliana, Ana Margarita, Fernanda Shirakawa, Tes.&lt;br /&gt;
&lt;br /&gt;
'''Evento de desarrollo de curricula, 2018:''' Alex Hache, Gabriela Rodriguez, Leil Zahra, Ling, Semanur Karaman, Bjoerk Roi, Nina, Nadège, Matt Mitchell, Daniel Ó Cluanaigh, Sandra Ljubinkovic, Lucía Egaña Rojas, Joana Varon, Tamar Ayrikyan, Abir Ghattas, Jacopo Anderlini.&lt;br /&gt;
&lt;br /&gt;
'''Copy-editing:''' Christy Lange.&lt;br /&gt;
&lt;br /&gt;
'''Agradecimiento especial:'''  Bjoerk Roi and Ling.  &lt;br /&gt;
&lt;br /&gt;
'''Y un agradecimiento especial a todas las organizaciones que se han asociado con Tactical tech para la organización de IGT alrededor del mundo:'''&lt;br /&gt;
&lt;br /&gt;
Association for Progressive Communications (APC) - https://www.apc.org/en/wrp&lt;br /&gt;
&lt;br /&gt;
Asian-Pacific Resource &amp;amp; Research Centre for Women (Arrow) - https://arrow.org.my/&lt;br /&gt;
&lt;br /&gt;
Amnesty International - https://www.amnesty.org/en/&lt;br /&gt;
&lt;br /&gt;
Article 19 - https://www.article19.org/&lt;br /&gt;
&lt;br /&gt;
Ciberseguras - https://ciberseguras.org&lt;br /&gt;
&lt;br /&gt;
Consorcio Oaxaca - http://consorciooaxaca.org.mx/&lt;br /&gt;
&lt;br /&gt;
Donestech - https://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Enredadas - Tecnologías para la igualdad - https://enredadas.org/&lt;br /&gt;
&lt;br /&gt;
Espacio Encuentro Mujeres&lt;br /&gt;
&lt;br /&gt;
Fondo Centroamericano de Mujeres - https://www.fcmujeres.org/&lt;br /&gt;
&lt;br /&gt;
Fondo de Acción Urgente Latino americano - https://fondoaccionurgente.org.co&lt;br /&gt;
&lt;br /&gt;
FRIDA the Young Feminist Foundation - https://youngfeministfund.org/&lt;br /&gt;
&lt;br /&gt;
Fundación Karisma - http://fundacionkarisma.org/&lt;br /&gt;
&lt;br /&gt;
GIZ Ecuador - https://www.giz.de/en/worldwide/28451.html&lt;br /&gt;
&lt;br /&gt;
JASS – Just Associates Mesoamerica - https://justassociates.org/&lt;br /&gt;
&lt;br /&gt;
Laboratorio de Interconectividades - https://lab-interconectividades.net/&lt;br /&gt;
&lt;br /&gt;
Luchadoras - https://luchadoras.mx/&lt;br /&gt;
&lt;br /&gt;
Sentimos Diverso - http://www.sentimosdiverso.org/&lt;br /&gt;
&lt;br /&gt;
Mama Cash - https://www.mamacash.org/&lt;br /&gt;
&lt;br /&gt;
Protection International - https://www.protectioninternational.org/&lt;br /&gt;
&lt;br /&gt;
SAFE - https://www.irex.org/project/safe-securing-access-free-expression&lt;br /&gt;
&lt;br /&gt;
Tecnicas Rudas - http://www.tecnicasrudas.org/&lt;br /&gt;
&lt;br /&gt;
Via Campesina - https://viacampesina.org/&lt;br /&gt;
&lt;br /&gt;
Women Help Women - https://womenhelp.org/&lt;br /&gt;
                         &lt;br /&gt;
 [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=II_Festival_Ciberfeminista,_Tejiendo_circuitos,_Guatemala&amp;diff=9652</id>
		<title>II Festival Ciberfeminista, Tejiendo circuitos, Guatemala</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=II_Festival_Ciberfeminista,_Tejiendo_circuitos,_Guatemala&amp;diff=9652"/>
				<updated>2018-11-27T15:53:06Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=II Festival Ciberfeminista de Guatemala: Tejiendo Circuitos&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/07&lt;br /&gt;
|End when ?=2018/11/10&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=14.701155457679, -90.502156395587&lt;br /&gt;
|Who organize it=Ciberfeministas Guatemala&lt;br /&gt;
Participación de Ciberseguras&lt;br /&gt;
|organisation(s) website=Ciberfeministas Guatemala&lt;br /&gt;
&amp;lt;https://ciberfemgt.org/&amp;gt;&lt;br /&gt;
Participación de Ciberseguras&lt;br /&gt;
&amp;lt;https://ciberseguras.org/&amp;gt;&lt;br /&gt;
|For whom is it organized=La actividad fue orientada hacia activistas mujeres y LGBTIQ, feministas, defensoras del territorio, comunicadoras comunitarias y organizaciones de base de mujeres.&lt;br /&gt;
&lt;br /&gt;
1. Conversatorio&lt;br /&gt;
Nombre: Tecnologías en Resistencia&lt;br /&gt;
Fecha: Miércoles 07/11/2018&lt;br /&gt;
Participantes: 25 personas, 90% mujeres y 10% hombres de la ciudad de Guatemala.&lt;br /&gt;
&lt;br /&gt;
1. Taller&lt;br /&gt;
Nombre: Data Detox&lt;br /&gt;
Fecha: Jueves 08/11/2018&lt;br /&gt;
Participantes: 10 mujeres y 2 hombres de la Ciudad de Guatemala.&lt;br /&gt;
&lt;br /&gt;
1. Festival&lt;br /&gt;
Nombre: Tejiendo Circuitos&lt;br /&gt;
Fecha: Viernes 09/11/2018 y sábado 10/11/2018&lt;br /&gt;
Participantes: 15 mujeres, de las cuáles todas estaban vinculadas a organizaciones o colectivas que trabajan en la defensa de los Derechos Humanos. Las participantes eran de diferentes lugares de origen: 3 de Nicaragua; 3 de Sololá, Guatemala; 2 de Chimaltenango, Guatemala; 2 de Huehuetenango, Guatemala; 1 de Cobán, Guatemala; 5 de ciudad de Guatemala, Guatemala.&lt;br /&gt;
|How many people trained=52&lt;br /&gt;
|Motivations for organizing training=El objetivo de realizar el festival es porque como colectiva buscamos crear una red y un espacio participativo de encuentro para visibilizar la brecha digital de género y transformar la forma en la que usamos y apropiamos la&lt;br /&gt;
tecnología para defender nuestros derechos.&lt;br /&gt;
Al mismo tiempo, hemos notado que es necesario trasladar saberes socio tecnológicos a personas que se dedican a la defensa y promoción de los derechos humanos, ya que estamos ante un panorama de criminalización y violencia estatal y paraestatal en escalada. En la actualidad, los riegos asociados a las tareas de activismo en temas de  derechos humanos, defensa del territorio y muchos otros tipos de reivindicaciones (socio ambientales, feministas y/o étnicas) constituyen un punto clave en el ejercicio del derecho a defender derechos. En este plano es necesario llamar la atención sobre los aspectos vulnerables, también sumar fuerzas y correlaciones para responder a las amenazas y así acuerpar nuevos saberes en temas de seguridad digital.&lt;br /&gt;
|Topics addressed=seguridad digital; seguridad holistica&lt;br /&gt;
|Links about the activity=Actividades abiertas: Fueron promocionadas en redes sociales como Facebook y Twitter.&lt;br /&gt;
Conversatorio Tecnologías en Resistencia &amp;lt;https://www.facebook.com/events/593919624357121/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Taller Data Detox &amp;lt;https://www.facebook.com/events/539666739778767/&amp;gt;&lt;br /&gt;
|Upload content=Tejiendocircuitos.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda de los días de actividades cerradas 9 y 10 de noviembre.&lt;br /&gt;
&lt;br /&gt;
Viernes 9/11/18&lt;br /&gt;
&lt;br /&gt;
13:00 Almuerzo&lt;br /&gt;
&lt;br /&gt;
14:00 Registro&lt;br /&gt;
&lt;br /&gt;
14:30 Presentación del espacio&lt;br /&gt;
&lt;br /&gt;
14:45 Presentación de participantes&lt;br /&gt;
&lt;br /&gt;
15: 15 Espacio simbólico de apertura&lt;br /&gt;
&lt;br /&gt;
15: 45 Acuerdos del espacio&lt;br /&gt;
&lt;br /&gt;
16:00 Receso&lt;br /&gt;
&lt;br /&gt;
16:30 Taller: Tecnologías Ancestrales&lt;br /&gt;
&lt;br /&gt;
18:30 Cena&lt;br /&gt;
&lt;br /&gt;
Sábado 10/11/18&lt;br /&gt;
&lt;br /&gt;
7:00 Desayuno&lt;br /&gt;
&lt;br /&gt;
8:00 Intercambio de claves&lt;br /&gt;
&lt;br /&gt;
8:30 Taller: ¿Cómo funciona Internet?&lt;br /&gt;
&lt;br /&gt;
Taller: Electrónica para principiantes&lt;br /&gt;
&lt;br /&gt;
Taller: Metadatos, conociendo nuestros rastros digitales&lt;br /&gt;
&lt;br /&gt;
10:00 Receso&lt;br /&gt;
&lt;br /&gt;
10:15 Taller: Básicos de Seguridad Digital&lt;br /&gt;
&lt;br /&gt;
11: 15 Taller: Seguridad Móvil&lt;br /&gt;
&lt;br /&gt;
13:00 Almuerzo&lt;br /&gt;
&lt;br /&gt;
14:00 Taller: Crear una campaña online&lt;br /&gt;
&lt;br /&gt;
15:30 Taller: Hackear el discurso de odio y estrategias ante violencia en línea.&lt;br /&gt;
&lt;br /&gt;
16:45 Receso&lt;br /&gt;
&lt;br /&gt;
17:30 Taller: Sanación de mujeres a través de la escritura&lt;br /&gt;
&lt;br /&gt;
18:30 Cierre del Festival&lt;br /&gt;
|Methodologies for training=La metodología que proponemos tiene un fuerte componente participativo. Ésta se acompaña de un elemento diagnóstico que llevamos a cabo en dos instancias. La primera es previa a la realización del taller, donde se pide a los&lt;br /&gt;
participantes que completen una breve encuesta relacionada con los usos de tecnología y redes sociales de su organización. Este instrumento permite al equipo de facilitadoras, organizar con mayor detalle los aspectos a&lt;br /&gt;
profundizar.&lt;br /&gt;
&lt;br /&gt;
Una segunda instancia se realiza presencialmente por medio de diversos soportes, preguntas y dinámicas grupales. Estos instrumentos nos permiten realizar en compañía de quienes participan, un mapeo de experiencias, reflexionar sobre la apropiación de tecnologías y definir algunos acentos en el desarrollo específico del taller. Es por ello que planteamos un modelo secuenciado, con contenidos establecidos, pero de todas maneras muy dinámico y abierto a las apreciaciones y trayectorias de quienes participen de la formación.&lt;br /&gt;
&lt;br /&gt;
En nuestro entendimiento, los adultos aprenden a partir de la experiencia, relacionando los contenidos con vivencias y/o necesidades propias. Por eso trabajaremos con la metodología ADIPS, la cual consta de cinco pasos: una actividad, para poner en movimiento el cuerpo, generar confianza; una discusión a partir de las dinámicas identificadas en la actividad; insumos, para conocer experiencias en otras partes del mundo; profundización, donde las participantes pondrán manos a la obra e intentarán poner en práctica su propia interpretación de lo aprendido; y, por último, una síntesis del proceso de la sesión, incluyendo una evaluación que identifique la estrategia de seguimiento.&lt;br /&gt;
Tal como se verá en el detalle diario de la agenda de trabajo y sus resultados, la secuencia ADIPS no es una cadena unidireccional, aunque en varios momentos responde a una secuencia lógica, como puede ser el trabajo en grupos reducidos para analizar un caso (profundización e insumos), de manera de llevar las conclusiones al plenario  (profundización y síntesis). No obstante, volvemos una y otra vez a establecer secuencias de activación o&lt;br /&gt;
actividades de distensión corporal, de manera que nuestros cuerpos acompañen también los intensos momentos de trabajo y concentración. Es importante destacar este punto, pues la planificación metodológica no debe ser muy laxa en sus componentes y secuencias, pero tampoco debe ser una camisa de fuerza que no permita incorporar percepciones, reflexiones y opiniones derivadas de las diversas partes del proceso. La falta de linealidad en este sentido, no debe confundirse con falta de una estructura.&lt;br /&gt;
|Existing toolkits and resources=Tanto metodología como recursos utilizados en las actividades fueron&lt;br /&gt;
tomados de colectivas feministas que se han dado a la tarea de desarrollar&lt;br /&gt;
currículos y recursos desde una perspectiva de género y feminista para la&lt;br /&gt;
enseñanza-aprendizaje de la seguridad digital. Algunas de los contenidos se&lt;br /&gt;
encuentran en:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Main_Page&lt;br /&gt;
https://securityinabox.org/en/&lt;br /&gt;
https://myshadow.org/materials&lt;br /&gt;
https://ciberseguras.org&lt;br /&gt;
https://gendersec.train.tacticaltech.org/&lt;br /&gt;
https://cyber-women.com/en/&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Fueron varias las emociones que se dieron durante el tiempo de organización del festival, primero mucha emoción y alegría por ser un proceso nuevo. Sin embargo, el trabajo que conlleva organizar una actividad así es extenuante y&lt;br /&gt;
surgen muchas emociones como frustración y enojo. Las cosas no salen siempre como una las planea.&lt;br /&gt;
Sin embargo, cuando el evento ya estaba en marcha había mucha excitación y emoción de nuestra parte por tener a todas las participantes presente y convivir con ellas. Al terminar los cuatro días de actividades estábamos muy cansadas emocional y corporalmente por todo las energías que implica poner en un espacio de este tipo, pero nos gusto mucho poder hacerlo.&lt;br /&gt;
|Feedbacks=Para la evaluación del Festival y debio al poco tiempo que tuvimos realizamos&lt;br /&gt;
la evaluación a partir de tres preguntas clave: ¿Qué me gustó? ¿Qué&lt;br /&gt;
mejoraría? Y ¿Qué dudas me quedaron? A continuación las respuestas.&lt;br /&gt;
&lt;br /&gt;
¿Qué me gustó?&lt;br /&gt;
&lt;br /&gt;
 Conocer más personas. Conocí bastante.&lt;br /&gt;
 Todas las metodologías y las buenas facilitadoras. Conocer, de cada una, sus habilidades y conocimientos.&lt;br /&gt;
 Las expositoras.&lt;br /&gt;
 El momento de la práctica.&lt;br /&gt;
 Las nuevas temáticas en las ciberfeministas.&lt;br /&gt;
 Las temáticas y metodologías.&lt;br /&gt;
 Funcionamiento de Internet.&lt;br /&gt;
 El grupo, nuevas redes y creatividad. Me motivé para hacer más cosas.&lt;br /&gt;
 Conocer sobre los servidores y aplicaciones más seguras.&lt;br /&gt;
 Diversidad de opciones de talleres.&lt;br /&gt;
 La metodología y los temas.&lt;br /&gt;
 Los talleres estuvieron muy animados.&lt;br /&gt;
&lt;br /&gt;
¿Qué mejoraría?&lt;br /&gt;
&lt;br /&gt;
 Que hayan más participantes.&lt;br /&gt;
 Que el lugar sea más privado.&lt;br /&gt;
 Jornadas más cortas de trabajo en más días.&lt;br /&gt;
 Jornadas repartidas en más días.&lt;br /&gt;
 Que los días que hayan actividades, vean que no hayan otras y puedan&lt;br /&gt;
venir más personas.&lt;br /&gt;
 Que nos volvamos a encontrar para el III Festival Ciberfeminista para&lt;br /&gt;
compartir lo nuevo.&lt;br /&gt;
 El espacio más grande.&lt;br /&gt;
 Tener más espacio para descansar&lt;br /&gt;
 Terminar más temprano, muy largo el día&lt;br /&gt;
 Más espacio&lt;br /&gt;
&lt;br /&gt;
¿Qué dudas me quedaron?&lt;br /&gt;
&lt;br /&gt;
 ¿Cómo darle continuidad? ¡Ya quiero!&lt;br /&gt;
 ¿Cuándo van a haber más eventos?&lt;br /&gt;
 ¿Será posible darle continuidad a un mismo tema con las mismas&lt;br /&gt;
participantes y otras personas?&lt;br /&gt;
 Ninguna. Tengo que practicar en mi computadora y en mi teléfono.&lt;br /&gt;
 ¿Qué tipos de personas reciben o llevan la información de la violencia?&lt;br /&gt;
 Acerca de seguridad informática.&lt;br /&gt;
 No es duda, pero deseo una mayor práctica de Arduino.&lt;br /&gt;
 Seguir haciendo más festivales.&lt;br /&gt;
 Aclarar cómo denunciar la violencia en línea.&lt;br /&gt;
 Por el momento todo claro, cuando practique saldrán dudas&lt;br /&gt;
|START= Una actividad de este tipo debe planificarse con más de dos meses de anticipación.&lt;br /&gt;
&lt;br /&gt;
 Hacer la convocatoria con más de un mes de anticipación.&lt;br /&gt;
&lt;br /&gt;
 Crear un plan B en caso una facilitadora falte al evento.&lt;br /&gt;
&lt;br /&gt;
 Escoger el lugar del evento con buena ventilación e iluminación.&lt;br /&gt;
&lt;br /&gt;
 Tener espacios más lúdicos con las participantes que permita conocernos más entre todas. &lt;br /&gt;
&lt;br /&gt;
 Mecanismos p ara asegurar la participación de todas las personas que confirmaron.&lt;br /&gt;
|STOP= Jornadas muy largas de trabajo. Lo ideal es reducir las jornadas de talleres aunque implique más días.&lt;br /&gt;
&lt;br /&gt;
 Espacios donde se lleven al mismo tiempo actividades de otras organizaciones. De ahora en adelante buscaremos espacios donde solo nosotras podamos estar.&lt;br /&gt;
|KEEP= Las convocatorias de forma directa y por correo electrónico cuando se trate de trabajar con mujeres o personas LGBTQI que son defensoras de DDHH.&lt;br /&gt;
&lt;br /&gt;
 Mantener siempre un presupuesto más arriba del esperado por imprevistos.&lt;br /&gt;
&lt;br /&gt;
 Invitar a talleres puntuales a través de plataformas digitales como Twitter y Facebook porque asisten varias personas interesadas en estos temas.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Culture_Survival,_Cuidados_digitales_feministas,_Guatemala&amp;diff=9651</id>
		<title>Taller Culture Survival, Cuidados digitales feministas, Guatemala</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Culture_Survival,_Cuidados_digitales_feministas,_Guatemala&amp;diff=9651"/>
				<updated>2018-11-27T15:50:26Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Cuidados digitales feministas en el Taller de Cultural Survival&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/07&lt;br /&gt;
|End when ?=2018/11/09&lt;br /&gt;
|Number of hours if only one day ?=La actividad de cuidados digitales se desarrolló el tercer dia del encuentro. De 9 de la mañana a 6 de la tarde el día viernes 9 del 2018&lt;br /&gt;
|Geo-localization of the activity ?=14.570212968816, -90.720704265329&lt;br /&gt;
|Who organize it=Cultural Survival y su programa Radio de Derechos Indígenas&lt;br /&gt;
|organisation(s) website=https://www.culturalsurvival.org/&lt;br /&gt;
http://derechos.culturalsurvival.org/&lt;br /&gt;
|For whom is it organized=Comunicadoras Indígenas de radios comunitarias Indígenas de 18 a 36 años que trabajan en Radios Indígenas de Guatemala, El Salvador, Honduras, Nicaragua, Costa Rica, Panamá y Colombia.  Fueron 20 participantes, para la facilitación de todo el proceso se contó con 6 facilitadoras, para el segmento de la parte digital se contó con una facilitadora principal y una de apoyo, esta última capacitada recientemente en Uruguay por Táctica Tech.&lt;br /&gt;
|How many people trained=26&lt;br /&gt;
|Motivations for organizing training=En nuestra labor diaria con radios indígenas nos hemos dado cuenta de que se necesita empoderar a un más a las mujeres comunicadoras abriendo espacios para el reconocimiento de sus derechos, y creemos que entre más mujeres apoderadas y seguras estén en la radio al frente del micrófono, lograremos aportar más seguridad y fuerza a las audiencias femenina.&lt;br /&gt;
&lt;br /&gt;
Contexto Político: Se debió hacer en Guatemala y no en Nicaragua como estaba previsto, pues los conflictos políticos que vive Nicaragua han causado mucha inseguridad. Se debió crear un plan de seguridad para la compañera que participó desde Nicaragua para evitar que no pudiera salir del país. &lt;br /&gt;
&lt;br /&gt;
Contexto económico: las compañeras que vinieron de las radios tuvieron que recibir una beca completa, incluyendo transporte interno. Sólo a Costa Rica y Panamá no se le cubrió con el transporte interno en su país, pues su contexto es diferente al resto de la región. Hay que tomar en cuenta que todas estas mujeres son voluntarias en sus radios, no son asalariadas por tanto es un poco más completo el tema económico.  &lt;br /&gt;
&lt;br /&gt;
Factores sociales: se debió tener un acercamiento personalizado con cada una de las participantes, pues no todas comprenden bien la forma escrita y son más de escuchar y recibir y dar orientaciones de forma oral, por ello también las evaluaciones se hicieron escritas y orales.&lt;br /&gt;
|Topics addressed=seguridad digital, comunicadoras, radios comunitarias&lt;br /&gt;
|Links about the activity=Estamos por publicar un artículo en nuestra revista que saldrá en enero, por ahora sólo publicamos en redes sociales. &lt;br /&gt;
Cultural Survival en Español&lt;br /&gt;
&lt;br /&gt;
Facebook de la periodista Indígena Rolanda García: Telesur se publicó una nota corta sobre el evento. &lt;br /&gt;
https://www.facebook.com/rolanda.garciahernandez/videos/1970514573042185/&lt;br /&gt;
|Upload content=Chicas manos.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=1 Presentación: actividad tecnología y saberes ancestrales&lt;br /&gt;
Presentación.&lt;br /&gt;
20 min&lt;br /&gt;
&lt;br /&gt;
2 Nuestras historias con las tecnologías&lt;br /&gt;
1 hora&lt;br /&gt;
&lt;br /&gt;
3 Introducción al tema: Cómo funciona internet&lt;br /&gt;
Conversatorio /actividad práctica&lt;br /&gt;
Respondemos colectivamente&lt;br /&gt;
¿Cuáles son los riesgos de las comunicaciones en internet?&lt;br /&gt;
¿Cómo funciona internet?&lt;br /&gt;
¿Cómo dejamos huella en Internet?/Metadatos&lt;br /&gt;
Tarjetas Tactical Technology&lt;br /&gt;
1 hora&lt;br /&gt;
&lt;br /&gt;
3 Principios Básicos de seguridad&lt;br /&gt;
Contraseñas seguras&lt;br /&gt;
Antivirus&lt;br /&gt;
Complementos de navegador.&lt;br /&gt;
Buscadores seguros&lt;br /&gt;
&lt;br /&gt;
Actividad práctica/lúdica&lt;br /&gt;
Presentación&lt;br /&gt;
Discusión&lt;br /&gt;
KeepassXC&lt;br /&gt;
Avast&lt;br /&gt;
80 minutos&lt;br /&gt;
&lt;br /&gt;
RECESO ALMUERZO (12/13.30 h)&lt;br /&gt;
&lt;br /&gt;
4 Móviles 1: cómo funcionan los celulares , riesgos y criterios de seguridad&lt;br /&gt;
Conversatorio /actividad práctica / Criterios para elegir apps seguras&lt;br /&gt;
F-Droid&lt;br /&gt;
Tarjetas técnicas rudas&lt;br /&gt;
90 minutos&lt;br /&gt;
&lt;br /&gt;
6 Evaluación y cierre de la jornada&lt;br /&gt;
|Methodologies for training=Durante los días anteriores hicimos un seguimiento de los diversos materiales audiovisuales que Cultural Survival pone a disposición en su sitio.&lt;br /&gt;
También se hizo un breve recorrido bibliográfico por materiales vinculados con la cosmogonía de personas indígenas en Centroamérica. (Ver “Aportes al movimiento continental de Niñez y juventud indígena de Abya Yala por la coordinación y convergencia maya Waqib’kej y Comité organizador en Guatemala – Nota en Píkara Magazine `Takal, takal´. La energía de las encapuchadas)”.&lt;br /&gt;
La preparación implicó lectura de noticias vinculadas a la temática de fuentes como EFF – Derechos Digitales – Prensa Comunitaria y el sitio de IM-Defensoras, entre otras.&lt;br /&gt;
&lt;br /&gt;
El desarrollo de la actividad se dio a partir de propuestas de actividades grupales y posteriores exposiciones de las reflexiones de cada grupo. El seguimiento de la actividad será mediado por la coordinadora de Culture Survival con la intención de viabilizar dudas que surjan después de la primera capacitación. También se entregaron manuales impresos y en formato digital para que las participantes puedan continuar el proceso en el marco de las radios comunitarias en las que participan.&lt;br /&gt;
|Existing toolkits and resources=Herramientas: proyector (cañonera), papelógrafos, presentación en pantalla.&lt;br /&gt;
Manuales: Gendersec, Manual Zen, Currícula de Tactical Tech, DIY Cybersecurity for Domestic Violence.&lt;br /&gt;
|Gender and tech tutorials used=Hands On How the internet works, Gender Tech Personal Memories,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Me sentí muy bien como facilitadora, muy desafiada en principio por lo que significa conocer y trabajar con mujeres indígenas radialistas de la región. Creo que estas mujeres, defensoras del derecho a la libre expresión en todo el continente, tienen una gran cantidad de conocimientos propios de su quehacer y sus activismos en radios que suelen ser criminalizadas por los gobiernos. Muchas otras provienen de contextos de riesgo en donde aprenden medidas de seguridad digital más guiadas por la urgencia que por el placer o la curiosidad de aprender.&lt;br /&gt;
Por otra parte, creo que al haber dado todo el día el programa sola con 20 participantes tuve hacia el final un sentimiento de estar agotada en clara correspondencia ante la demanda que el nivel de contenidos y la cantidad de participantes exige.&lt;br /&gt;
&lt;br /&gt;
De cualquier manera, creo que una sola jornada no es suficiente para poder ahondar la complejidad que algunos de los temas requieren. Por eso, quedamos elaborando y digiriendo la idea de poder dar continuidad a estas temáticas a través de un campamento o una serie de jornadas que puedan extenderse en una mayor cantidad de días, orientada a que las participantes puedan ponerse en una actitud más práctica, crítica y de “manos a la obra” y llevar a la acción muchas de las recomendaciones compartidas durante el taller.&lt;br /&gt;
|Feedbacks=Conocer los caminos para continuar en la seguridad digital.&lt;br /&gt;
&lt;br /&gt;
Felicitar por que la metodología fue bien suave y ayudó a entender estos temas tan complejos&lt;br /&gt;
&lt;br /&gt;
Que los datos y las contraseñas tienen mucho más valor del que nos imaginamos&lt;br /&gt;
&lt;br /&gt;
Las empresas ganan dinero con nuestra información&lt;br /&gt;
&lt;br /&gt;
Estar conscientes que el uso de tecnologías hace uso de nuestros recursos naturales&lt;br /&gt;
&lt;br /&gt;
Utilizar antivirus y hacer respaldos en todos los dispositivos&lt;br /&gt;
&lt;br /&gt;
Cifrar teléfonos&lt;br /&gt;
&lt;br /&gt;
La importancia de no dejar registros&lt;br /&gt;
&lt;br /&gt;
Quitar la batería para que el teléfono deje de rastrearnos&lt;br /&gt;
&lt;br /&gt;
Hay tecnologías ancestrales que hemos abandonado en función de las tecnologías digitales. Las ancestrales no contaminaban y tenían en cuenta nuestras formas de vida.&lt;br /&gt;
&lt;br /&gt;
Las ganas de continuar y seguir otras formaciones con mas tiempo.&lt;br /&gt;
&lt;br /&gt;
Nos queda la responsabilidad de auto-formarnos, compartirla con la familia y con otras personas.&lt;br /&gt;
&lt;br /&gt;
Hacer spots informativos con estas informaciones&lt;br /&gt;
&lt;br /&gt;
Abrir el micrófono y preguntar a la audiencia si toman medidas de seguridad&lt;br /&gt;
|START=Buscaría nuevos materiales en formato audiovisual. Son muy necesarios para trabajar con comunicadoras indígenas.&lt;br /&gt;
|STOP=Podría elegir menos actividades para profundizar de mayor manera en el “manos a la obra”.&lt;br /&gt;
|KEEP=Las dinámicas de juegos, grupales, de apertura de escucha de lo que las propias participantes saben y pueden aportar desde sus experiencias.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Chicas_manos.jpg&amp;diff=9650</id>
		<title>File:Chicas manos.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Chicas_manos.jpg&amp;diff=9650"/>
				<updated>2018-11-27T15:49:38Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Seguridad_Digital,_RED_de_Grupos_de_Mujeres_Rurales,_Uruguay&amp;diff=9649</id>
		<title>Taller Seguridad Digital, RED de Grupos de Mujeres Rurales, Uruguay</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Seguridad_Digital,_RED_de_Grupos_de_Mujeres_Rurales,_Uruguay&amp;diff=9649"/>
				<updated>2018-11-27T15:20:37Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=“ Amasando realidades… Un dia para hablar de nosotras “ |Start when ?=2018/11/27 |End when ?=2018/11/27 |Geo-localization of the acti...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=“ Amasando realidades… Un dia para hablar de nosotras “&lt;br /&gt;
|Start when ?=2018/11/27&lt;br /&gt;
|End when ?=2018/11/27&lt;br /&gt;
|Geo-localization of the activity ?=-34.481244927592535, -56.7634427163826&lt;br /&gt;
|Who organize it=RED de Grupos de Mujeres Rurales del Uruguay&lt;br /&gt;
|For whom is it organized=Participants de la RED de Grupos de Mujeres Rurales del Uruguay&lt;br /&gt;
|How many people trained=29&lt;br /&gt;
|Motivations for organizing training=El pensar en un seminario- taller era necesario buscar una temática que motivara a las integrantes más jóvenes, pero a su vez para que las personas de una franja estaría más avanzada, nos  sintiéramos motivadas. La temática nació por consenso, lo que se demostró durante el desarrollo de las mismas por el interés demostrado y fundamentalmente en la “diferente iniciativa” de una compañera que trajo globos, para ser lanzados al espacio con mensajes positivos que incluyera el género y no dejara de lado el aspecto generacional, pero a su vez, pensar que otra herramienta había llegado a nuestras manos. Trabajar sin riesgos en pequeñísimos emprendimientos nos garantizará de ahora en más lograr los objetivos que nos proponemos a una a todas.&lt;br /&gt;
&lt;br /&gt;
La vida en el campo es parte de una construcción que se viene realizando pero las políticas públicas aún, llegan fragmentadas a nosotras. La actividad se consideró como un estímulo hacia todas y cada una. Las preguntas brotaban informalmente y las muestras de asombro, cuando se escuchaba a las facilitadoras, eran permanentes.&lt;br /&gt;
|Topics addressed=internet, seguridad digital, genero, mujeres campesinas&lt;br /&gt;
|Links about the activity=La difusión se realizó a través del wsp de la RED y mediante llamadas telefónicas hacia quienes no poseen wsp. Se manifestaron  durante el desarrollo de la actividad las dificultades que se tiene en zonas rurales de acceder a internet sin interrupciones&lt;br /&gt;
Se manifestó también no sólo la calidad sino también el costo e interferencias entre las distintas compañías&lt;br /&gt;
Todo eso fue encarado por las docentes pero lo que no se podía era buscar soluciones a una ruralidad con desventajas ante un medio urbano&lt;br /&gt;
|Upload content=Agenda taller red mujeres rurales.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=La agenda detallada esta adjuntada en el pdf anterior&lt;br /&gt;
|Methodologies for training=El tipo de metodología usado fue participativo. Se plantearon los temas y por consenso en actividades de planificación se resolvían y procesaban los temas que interesaban. Cada uno de ellos se fundamentaba y se llegó a la conclusión del por qué se optó por esa temática.&lt;br /&gt;
El desarrollo de la actividad fue expositiva con presentación de diapositivas, videos y material impreso enviado y solicitado por las facilitadoras para tener respaldo gráfico para las explicaciones. Temas desarrollados con fluidez y seguidos con atención e interrumpidos cuando era difícil entender&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Consideramos que el taller fue muy positivo y también quedamos de realizar una réplica desde el punto de vista práctico. Cómo hacer, cómo actuar, qué cosas no podemos hacer y disposición para seguir escuchando sugerencias de como enfrentar los abusos y malas prácticas de manejar herramientas informáticas sin conocer las consecuencias.&lt;br /&gt;
&lt;br /&gt;
La verdad que las expresiones vertidas fueron de agradecimiento y a su vez de sorpresa al conocer todo lo que puede suceder con la utilización de un “ aparatito picarón”&lt;br /&gt;
|Feedbacks=Las reacciones fueron de un agradecimiento total y en un 100% de apoyo a una actividad que gustó porque fue de interés y aprendizaje para todas&lt;br /&gt;
|START=Repicar lo aprendido y aprehendido para ayudar a otras compañeras que por diferentes motivos no participaron&lt;br /&gt;
|STOP=Hacer un monitoreo y seguimiento a la actividad. Si los resultados no fueron  los pensados, parar y hacer una retroalimentación&lt;br /&gt;
|KEEP=Mantener las mismas iniciativas de consultar, planificar y evaluar. Sólo así sabremos si los resultados son los perseguidos. GRACIAS. GRACIAS. GRACIAS&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Agenda_taller_red_mujeres_rurales.pdf&amp;diff=9648</id>
		<title>File:Agenda taller red mujeres rurales.pdf</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Agenda_taller_red_mujeres_rurales.pdf&amp;diff=9648"/>
				<updated>2018-11-27T15:19:17Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:20181025_135819.jpg&amp;diff=9647</id>
		<title>File:20181025 135819.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:20181025_135819.jpg&amp;diff=9647"/>
				<updated>2018-11-27T15:17:26Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Autodefensa_Digital_Feminista_Avanzado,_Nicaragua&amp;diff=9646</id>
		<title>Autodefensa Digital Feminista Avanzado, Nicaragua</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Autodefensa_Digital_Feminista_Avanzado,_Nicaragua&amp;diff=9646"/>
				<updated>2018-11-27T14:57:30Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Autodefensa Digital Feminista Avanzado |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2018/09/15 |End when ?=2...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Autodefensa Digital Feminista Avanzado&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/09/15&lt;br /&gt;
|End when ?=2018/11/15&lt;br /&gt;
|Geo-localization of the activity ?=12.278464478673753, -86.28140635308102&lt;br /&gt;
|Who organize it=EnRedadas, por el Arte y la Tecnología&lt;br /&gt;
|organisation(s) website=enredadas.org&lt;br /&gt;
|For whom is it organized=Mujeres jóvenes feministas, activistas y estudiantes de Managua y Estelí.&lt;br /&gt;
|How many people trained=49&lt;br /&gt;
|Motivations for organizing training=El contexto nacional  actual incrementó los niveles de vulnerabilidad de las mujeres jóvenes activistas y defensoras de derechos humanos. Entre abril y noviembre se registran más de 100 denuncias de violencia contra defensoras de derechos humanos.&lt;br /&gt;
&lt;br /&gt;
Surge la necesidad de encontrarnos con otras, reflexionar sobre la seguridad digital y compartir conocimientos para mitigar las violencias que nos asechan desde nuestro rol de activistas.&lt;br /&gt;
&lt;br /&gt;
En las fechas detalladas se desarrollaron tres espacios de reflexión y formación entre mujeres jóvenes sobre autodefensa digital feminista y autocuido; y se creo una cartilla básica de seguridad digital. &lt;br /&gt;
&lt;br /&gt;
Se convocó a las 50 mujeres que participaron en los talleres de autodefensa digital feminista facilitados entre abril y agosto, a una sesión avanzada para profundizar en temáticas como cifrado, anonimato y seguridad en móviles. Sin embargo, la convocatoria no tuvo una buena respuesta, se tuvo que replantear el contenido y abrir la convocatoria a otras mujeres activistas y feministas, sin requisito previo para participar.&lt;br /&gt;
|Topics addressed=seguridad digital, autodefensa, privacidad&lt;br /&gt;
|Links about the activity=Por el mismo contexto, no se publicó información sobre la actividad. La convocatoria se gestionó a través de mensajes privados y grupos seguros. O a través de colectivas amigas.&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Taller Autodefensa Digital Feminista - 22/09/2018&lt;br /&gt;
Espacio de 6 horas con 9 participantes, realizado en colaboración con una colectiva de feministas jóvenes. El taller tuvo tres momentos metodologicos: &lt;br /&gt;
Reflexión sobre riesgos y nuevas realidades nacionales&lt;br /&gt;
Sombras digitales, hábitos tecnológicos y estrategias de autodefensa&lt;br /&gt;
Fortaleciendo nuestros espacios: contraseñas, navegación, mensajería y alternatias de comunicación. &lt;br /&gt;
Matria Libre para Vivir. Autocuido y autodefensa digital para el activismo sostenible - 20/10/2018&lt;br /&gt;
Espacio de 6 horas con 26 participantes, la mayoría activistas sociales. Este espacio tuvo cuatro momentos metodológicos:&lt;br /&gt;
Reconexión con nuestros cuerpos y ejercicios de sororidad. &lt;br /&gt;
Sesión de biodanza&lt;br /&gt;
Mapeo de incidentes de seguridad digital en los últimos 6 meses. &lt;br /&gt;
Creación colectiva de estrategias para prevención y mitigación.&lt;br /&gt;
Taller Autodefensa Digital Feminista en Estelí - 3 y 4 /11/2018&lt;br /&gt;
Espacio de 10 horas, dividido en 2 días con 10 participantes, jóvenes feministas de la ciudad de Estelí. Se abordaron los siguientes contenidos &lt;br /&gt;
Reflexión sobre riesgos y nuevas realidades nacionales&lt;br /&gt;
Sombras digitales, hábitos tecnológicos y estrategias de autodefensa&lt;br /&gt;
Fortaleciendo nuestros espacios: contraseñas, navegación, mensajería y alternatias de comunicación. &lt;br /&gt;
Uso de KeepassX y Veracrypt&lt;br /&gt;
|Methodologies for training=Objetivo: Fortalecer los conocimientos en autodefensa digital feminista de 30 mujeres jóvenes activistas que trabajan temas de género y ciudadanía en Nicaragua, através de la realización de tres espacios de reflexión y formación, y la creación de una cartilla de autodefensa digital feminista.&lt;br /&gt;
|Existing toolkits and resources=Se trabajó en el desarrollo de un contenido básico, para ser compartido y distribuido a personas que no han participado de procesos de seguridad, abarcando contraseñas, seguridad móvil, mensajeria y redes sociales. &lt;br /&gt;
Se realizó un tiraje de 300 plegables y se entregó a las participantes de los espacios como una herramienta para multiplicar los conocimientos con sus espacios de confianza.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=En un contexto constantemente cambiante, tuvimos que hacer un par de cambios sobre la marcha; concluyendo el proceso en una forma positiva.  &lt;br /&gt;
La idea inicial se basaba en la continuidad de un proceso de formación con 30 mujeres que habían participado en talleres previos; pero ante la baja respuesta a la convocatoria y la comunicación directa con varias de las participantes convocadas: se tomó la decisión de realizar talleres básicos, sin requisito previo. Se identifica que los contenidos “avanzados” se perciben como demasiado trabajo. Persiste la idea de que son herramientas “para personas que realmente lo necesitan”, es decir, que no se perciben a si mismas en situaciones de riesgo.&lt;br /&gt;
Se planteo además la necesidad de convocar a un espacio con un enfoque holístico, incorporando elementos de autocuidado.&lt;br /&gt;
|Feedbacks=Las participantes responden positivamente al enfoque feminista de la autodefensa digital. Destacan la necesidad de replicar estos conocimientos desde el empoderamiento de nuestros espacios digitales y dispositivos; y no desde el miedo. &lt;br /&gt;
Un par de participantes habían participado de espacios de seguridad digital en el pasado y afirman que el enfoque técnico, poco explicativo, fue una barrera para su aprendizaje.&lt;br /&gt;
|START=Se identificó la necesidad de profundizar la reflexión tecnopolítica: analizar sus hábitos, sus dispositivos, pero también analizar las mismas plataformas y aplicaciones que utilizamos en la cotidianeidad.  &lt;br /&gt;
Tenemos pendiente continuar la experimentación con la creación de fundas faraday con elementos reciclados. El uso de cajas tetrapack tuvo los resultados esperados con los telefonos más nuevos y se considera necesario experimentar con otros materiales de construcción.&lt;br /&gt;
|STOP=Aunque se había realizado un sondeo con las participantes de los primeros cinco talleres realizados por EnRedadas a partir de abril del 2018; y la mayoría afirmó les gustaría participar en un taller más avanzado, esto no se concretó. Se habló directamente con algunas de las mujeres participantes, que no se inscribieron en los talleres y nos comentaron que se les hacía díficil planificar su asistencia a un taller. La incertidumbre generada por el mismo contexto, hace mucho más compleja la planificación. &lt;br /&gt;
Otra hipótesis sobre la baja convocatoria para talleres más avanzados, es que las activistas no se perciben a si mismas como personas en riesgo. Se piensa que sólo las activistas “pesadas” están expuestas; aunque la realidad nacional comprueba lo contrario.&lt;br /&gt;
|KEEP=Por el contexto. las convocatorias se gestionaron de manera cerrada, a través de redes y contactos de confianza. &lt;br /&gt;
Durante los eventos se tomaron fotografías respetando las identidades y privacidad de las participantes.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=II_Festival_Ciberfeminista,_Tejiendo_circuitos,_Guatemala&amp;diff=9645</id>
		<title>II Festival Ciberfeminista, Tejiendo circuitos, Guatemala</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=II_Festival_Ciberfeminista,_Tejiendo_circuitos,_Guatemala&amp;diff=9645"/>
				<updated>2018-11-27T13:25:30Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=II Festival Ciberfeminista de Guatemala: Tejiendo Circuitos |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=201...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=II Festival Ciberfeminista de Guatemala: Tejiendo Circuitos&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/07&lt;br /&gt;
|End when ?=2018/11/10&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=14.701155457679263, -90.50215639558695&lt;br /&gt;
|Who organize it=Ciberfeministas Guatemala&lt;br /&gt;
Participación de Ciberseguras&lt;br /&gt;
|organisation(s) website=Ciberfeministas Guatemala&lt;br /&gt;
&amp;lt;https://ciberfemgt.org/&amp;gt;&lt;br /&gt;
Participación de Ciberseguras&lt;br /&gt;
&amp;lt;https://ciberseguras.org/&amp;gt;&lt;br /&gt;
|For whom is it organized=La actividad fue orientada hacia activistas mujeres y LGBTIQ, feministas, defensoras del territorio, comunicadoras comunitarias y organizaciones de base de mujeres.&lt;br /&gt;
&lt;br /&gt;
1. Conversatorio&lt;br /&gt;
Nombre: Tecnologías en Resistencia&lt;br /&gt;
Fecha: Miércoles 07/11/2018&lt;br /&gt;
Participantes: 25 personas, 90% mujeres y 10% hombres de la ciudad de Guatemala.&lt;br /&gt;
1. Taller&lt;br /&gt;
Nombre: Data Detox&lt;br /&gt;
Fecha: Jueves 08/11/2018&lt;br /&gt;
Participantes: 10 mujeres y 2 hombres de la Ciudad de Guatemala.&lt;br /&gt;
1. Festival&lt;br /&gt;
Nombre: Tejiendo Circuitos&lt;br /&gt;
Fecha: Viernes 09/11/2018 y sábado 10/11/2018&lt;br /&gt;
Participantes: 15 mujeres, de las cuáles todas estaban vinculadas a organizaciones o colectivas que trabajan en la defensa de los Derechos Humanos. Las participantes eran de diferentes lugares de origen: 3 de Nicaragua; 3 de Sololá, Guatemala; 2 de Chimaltenango, Guatemala; 2 de Huehuetenango, Guatemala; 1 de Cobán, Guatemala; 5 de ciudad de Guatemala, Guatemala.&lt;br /&gt;
|How many people trained=52&lt;br /&gt;
|Motivations for organizing training=El objetivo de realizar el festival es porque como colectiva buscamos crear una red y un espacio participativo de encuentro para visibilizar la brecha digital de género y transformar la forma en la que usamos y apropiamos la&lt;br /&gt;
tecnología para defender nuestros derechos.&lt;br /&gt;
Al mismo tiempo, hemos notado que es necesario trasladar saberes socio tecnológicos a personas que se dedican a la defensa y promoción de los derechos humanos, ya que estamos ante un panorama de criminalización y violencia estatal y paraestatal en escalada. En la actualidad, los riegos asociados a las tareas de activismo en temas de  derechos humanos, defensa del territorio y muchos otros tipos de reivindicaciones (socio ambientales, feministas y/o étnicas) constituyen un punto clave en el ejercicio del derecho a defender derechos. En este plano es necesario llamar la atención sobre los aspectos vulnerables, también sumar fuerzas y correlaciones para responder a las amenazas y así acuerpar nuevos saberes en temas de seguridad digital.&lt;br /&gt;
|Topics addressed=seguridad digital; seguridad holistica&lt;br /&gt;
|Links about the activity=Actividades abiertas: Fueron promocionadas en redes sociales como Facebook y Twitter.&lt;br /&gt;
Conversatorio Tecnologías en Resistencia &amp;lt;https://www.facebook.com/events/593919624357121/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Taller Data Detox &amp;lt;https://www.facebook.com/events/539666739778767/&amp;gt;&lt;br /&gt;
|Upload content=Tejiendocircuitos.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Agenda de los días de actividades cerradas 9 y 10 de noviembre.&lt;br /&gt;
Viernes 9/11/18&lt;br /&gt;
Hora/ Actividad&lt;br /&gt;
13:00 Almuerzo&lt;br /&gt;
14:00 Registro&lt;br /&gt;
14:30 Presentación del espacio&lt;br /&gt;
14:45 Presentación de participantes&lt;br /&gt;
15: 15 Espacio simbólico de apertura&lt;br /&gt;
15: 45 Acuerdos del espacio&lt;br /&gt;
16:00 Receso&lt;br /&gt;
16:30 Taller: Tecnologías Ancestrales&lt;br /&gt;
18:30 Cena&lt;br /&gt;
Sábado 10/11/18&lt;br /&gt;
7:00 Desayuno&lt;br /&gt;
8:00 Intercambio de claves&lt;br /&gt;
8:30 Taller: ¿Cómo funciona Internet?&lt;br /&gt;
Taller: Electrónica para principiantes&lt;br /&gt;
Taller: Metadatos, conociendo nuestros rastros digitales&lt;br /&gt;
10:00 Receso&lt;br /&gt;
10:15 Taller: Básicos de Seguridad Digital&lt;br /&gt;
11: 15 Taller: Seguridad Móvil&lt;br /&gt;
13:00 Almuerzo&lt;br /&gt;
14:00 Taller: Crear una campaña online&lt;br /&gt;
15:30 Taller: Hackear el discurso de odio y estrategias ante violencia en línea.&lt;br /&gt;
16:45 Receso&lt;br /&gt;
17:30 Taller: Sanación de mujeres a través de la escritura&lt;br /&gt;
18:30 Cierre del Festival&lt;br /&gt;
|Methodologies for training=La metodología que proponemos tiene un fuerte componente participativo. Ésta se acompaña de un elemento diagnóstico que llevamos a cabo en dos instancias. La primera es previa a la realización del taller, donde se pide a los&lt;br /&gt;
participantes que completen una breve encuesta relacionada con los usos de tecnología y redes sociales de su organización. Este instrumento permite al equipo de facilitadoras, organizar con mayor detalle los aspectos a&lt;br /&gt;
profundizar.&lt;br /&gt;
Una segunda instancia se realiza presencialmente por medio de diversos soportes, preguntas y dinámicas grupales. Estos instrumentos nos permiten realizar en compañía de quienes participan, un mapeo de experiencias, reflexionar sobre la apropiación de tecnologías y definir algunos acentos en el desarrollo específico del taller. Es por ello que planteamos un modelo secuenciado, con contenidos establecidos, pero de todas maneras muy dinámico y abierto a las apreciaciones y trayectorias de quienes participen de la formación.&lt;br /&gt;
En nuestro entendimiento, los adultos aprenden a partir de la experiencia, relacionando los contenidos con vivencias y/o necesidades propias. Por eso trabajaremos con la metodología ADIPS, la cual consta de cinco pasos: una actividad, para poner en movimiento el cuerpo, generar confianza; una discusión a partir de las dinámicas identificadas en la actividad; insumos, para conocer experiencias en otras partes del mundo; profundización, donde las participantes pondrán manos a la obra e intentarán poner en práctica su propia interpretación de lo aprendido; y, por último, una síntesis del proceso de la sesión, incluyendo una evaluación que identifique la estrategia de seguimiento.&lt;br /&gt;
Tal como se verá en el detalle diario de la agenda de trabajo y sus resultados, la secuencia ADIPS no es una cadena unidireccional, aunque en varios momentos responde a una secuencia lógica, como puede ser el trabajo en grupos reducidos para analizar un caso (profundización e insumos), de manera de llevar las conclusiones al plenario  (profundización y síntesis). No obstante, volvemos una y otra vez a establecer secuencias de activación o&lt;br /&gt;
actividades de distensión corporal, de manera que nuestros cuerpos acompañen también los intensos momentos de trabajo y concentración. Es importante destacar este punto, pues la planificación metodológica no debe ser muy laxa en sus componentes y secuencias, pero tampoco debe ser una camisa de fuerza que no permita incorporar percepciones, reflexiones y opiniones derivadas de las diversas partes del proceso. La falta de linealidad en este sentido, no debe confundirse con falta de una estructura.&lt;br /&gt;
|Existing toolkits and resources=Tanto metodología como recursos utilizados en las actividades fueron&lt;br /&gt;
tomados de colectivas feministas que se han dado a la tarea de desarrollar&lt;br /&gt;
currículos y recursos desde una perspectiva de género y feminista para la&lt;br /&gt;
enseñanza-aprendizaje de la seguridad digital. Algunas de los contenidos se&lt;br /&gt;
encuentran en:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Main_Page&lt;br /&gt;
https://securityinabox.org/en/&lt;br /&gt;
https://myshadow.org/materials&lt;br /&gt;
https://ciberseguras.org&lt;br /&gt;
https://gendersec.train.tacticaltech.org/&lt;br /&gt;
https://cyber-women.com/en/&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Fueron varias las emociones que se dieron durante el tiempo de organización del festival, primero mucha emoción y alegría por ser un proceso nuevo. Sin embargo, el trabajo que conlleva organizar una actividad así es extenuante y&lt;br /&gt;
surgen muchas emociones como frustración y enojo. Las cosas no salen siempre como una las planea.&lt;br /&gt;
Sin embargo, cuando el evento ya estaba en marcha había mucha excitación y emoción de nuestra parte por tener a todas las participantes presente y convivir con ellas. Al terminar los cuatro días de actividades estábamos muy cansadas emocional y corporalmente por todo las energías que implica poner en un espacio de este tipo, pero nos gusto mucho poder hacerlo.&lt;br /&gt;
|Feedbacks=Para la evaluación del Festival y debio al poco tiempo que tuvimos realizamos&lt;br /&gt;
la evaluación a partir de tres preguntas clave: ¿Qué me gustó? ¿Qué&lt;br /&gt;
mejoraría? Y ¿Qué dudas me quedaron? A continuación las respuestas.&lt;br /&gt;
¿Qué me gustó?&lt;br /&gt;
 Conocer más personas. Conocí bastante.&lt;br /&gt;
 Todas las metodologías y las buenas facilitadoras. Conocer, de cada&lt;br /&gt;
una, sus habilidades y conocimientos.&lt;br /&gt;
 Las expositoras.&lt;br /&gt;
 El momento de la práctica.&lt;br /&gt;
 Las nuevas temáticas en las ciberfeministas.&lt;br /&gt;
 Las temáticas y metodologías.&lt;br /&gt;
 Funcionamiento de Internet.&lt;br /&gt;
 El grupo, nuevas redes y creatividad. Me motivé para hacer más cosas.&lt;br /&gt;
 Conocer sobre los servidores y aplicaciones más seguras.&lt;br /&gt;
 Diversidad de opciones de talleres.&lt;br /&gt;
 La metodología y los temas.&lt;br /&gt;
 Los talleres estuvieron muy animados.&lt;br /&gt;
¿Qué mejoraría?&lt;br /&gt;
 Que hayan más participantes.&lt;br /&gt;
 Que el lugar sea más privado.&lt;br /&gt;
 Jornadas más cortas de trabajo en más días.&lt;br /&gt;
 Jornadas repartidas en más días.&lt;br /&gt;
 Que los días que hayan actividades, vean que no hayan otras y puedan&lt;br /&gt;
venir más personas.&lt;br /&gt;
 Que nos volvamos a encontrar para el III Festival Ciberfeminista para&lt;br /&gt;
compartir lo nuevo.&lt;br /&gt;
 El espacio más grande.&lt;br /&gt;
 Tener más espacio para descansar&lt;br /&gt;
 Terminar más temprano, muy largo el día&lt;br /&gt;
 Más espacio&lt;br /&gt;
¿Qué dudas me quedaron?&lt;br /&gt;
 ¿Cómo darle continuidad? ¡Ya quiero!&lt;br /&gt;
 ¿Cuándo van a haber más eventos?&lt;br /&gt;
 ¿Será posible darle continuidad a un mismo tema con las mismas&lt;br /&gt;
participantes y otras personas?&lt;br /&gt;
 Ninguna. Tengo que practicar en mi computadora y en mi teléfono.&lt;br /&gt;
 ¿Qué tipos de personas reciben o llevan la información de la violencia?&lt;br /&gt;
 Acerca de seguridad informática.&lt;br /&gt;
 No es duda, pero deseo una mayor práctica de Arduino.&lt;br /&gt;
 Seguir haciendo más festivales.&lt;br /&gt;
 Aclarar cómo denunciar la violencia en línea.&lt;br /&gt;
 Por el momento todo claro, cuando practique saldrán dudas&lt;br /&gt;
|START= Una actividad de este tipo debe planificarse con más de dos meses de&lt;br /&gt;
anticipación.&lt;br /&gt;
 Hacer la convocatoria con más de un mes de anticipación.&lt;br /&gt;
 Crear un plan B en caso una facilitadora falte al evento.&lt;br /&gt;
 Escoger el lugar del evento con buena ventilación e iluminación.&lt;br /&gt;
 Tener espacios más lúdicos con las participantes que permita conocernos más entre todas. &lt;br /&gt;
 Mecanismos p ara asegurar la participación de todas las personas que confirmaron.&lt;br /&gt;
|STOP= Jornadas muy largas de trabajo. Lo ideal es reducir las jornadas de talleres aunque implique más días.&lt;br /&gt;
 Espacios donde se lleven al mismo tiempo actividades de otras organizaciones. De ahora en adelante buscaremos espacios donde solo nosotras podamos estar.&lt;br /&gt;
|KEEP= Las convocatorias de forma directa y por correo electrónico cuando se trate de trabajar con mujeres o personas LGBTQI que son defensoras de DDHH.&lt;br /&gt;
 Mantener siempre un presupuesto más arriba del esperado por imprevistos.&lt;br /&gt;
 Invitar a talleres puntuales a través de plataformas digitales como Twitter y Facebook porque asisten varias personas interesadas en estos temas.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Tejiendocircuitos.jpg&amp;diff=9644</id>
		<title>File:Tejiendocircuitos.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Tejiendocircuitos.jpg&amp;diff=9644"/>
				<updated>2018-11-27T13:18:28Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Culture_Survival,_Cuidados_digitales_feministas,_Guatemala&amp;diff=9643</id>
		<title>Taller Culture Survival, Cuidados digitales feministas, Guatemala</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Culture_Survival,_Cuidados_digitales_feministas,_Guatemala&amp;diff=9643"/>
				<updated>2018-11-27T13:02:02Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: Created page with &amp;quot;{{Activities |Title of the activity=Cuidados digitales feministas en el Taller de Cultural Survival |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Cuidados digitales feministas en el Taller de Cultural Survival&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2018/11/07&lt;br /&gt;
|End when ?=2018/11/09&lt;br /&gt;
|Number of hours if only one day ?=La actividad de cuidados digitales se desarrolló el tercer dia del encuentro. De 9 de la mañana a 6 de la tarde el día viernes 9 del 2018&lt;br /&gt;
|Where is located the activity ?=Nivel nacional&lt;br /&gt;
|Geo-localization of the activity ?=14.570212968816456, -90.72070426532923&lt;br /&gt;
|Who organize it=Cultural Survival y su programa Radio de Derechos Indígenas&lt;br /&gt;
|organisation(s) website=https://www.culturalsurvival.org/&lt;br /&gt;
http://derechos.culturalsurvival.org/&lt;br /&gt;
|For whom is it organized=Comunicadoras Indígenas de radios comunitarias Indígenas de 18 a 36 años que trabajan en Radios Indígenas de Guatemala, El Salvador, Honduras, Nicaragua, Costa Rica, Panamá y Colombia.  Fueron 20 participantes, para la facilitación de todo el proceso se contó con 6 facilitadoras, para el segmento de la parte digital se contó con una facilitadora principal y una de apoyo, esta última capacitada recientemente en Uruguay por Táctica Tech.&lt;br /&gt;
|How many people trained=26&lt;br /&gt;
|Motivations for organizing training=En nuestra labor diaria con radios indígenas nos hemos dado cuenta de que se necesita empoderar a un más a las mujeres comunicadoras abriendo espacios para el reconocimiento de sus derechos, y creemos que entre más mujeres apoderadas y seguras estén en la radio al frente del micrófono, lograremos aportar más seguridad y fuerza a las audiencias femenina.&lt;br /&gt;
&lt;br /&gt;
Contexto Político: Se debió hacer en Guatemala y no en Nicaragua como estaba previsto, pues los conflictos políticos que vive Nicaragua han causado mucha inseguridad. Se debió crear un plan de seguridad para la compañera que participó desde Nicaragua para evitar que no pudiera salir del país. &lt;br /&gt;
&lt;br /&gt;
Contexto económico: las compañeras que vinieron de las radios tuvieron que recibir una beca completa, incluyendo transporte interno. Sólo a Costa Rica y Panamá no se le cubrió con el transporte interno en su país, pues su contexto es diferente al resto de la región. Hay que tomar en cuenta que todas estas mujeres son voluntarias en sus radios, no son asalariadas por tanto es un poco más completo el tema económico.  &lt;br /&gt;
&lt;br /&gt;
Factores sociales: se debió tener un acercamiento personalizado con cada una de las participantes, pues no todas comprenden bien la forma escrita y son más de escuchar y recibir y dar orientaciones de forma oral, por ello también las evaluaciones se hicieron escritas y orales.&lt;br /&gt;
|Topics addressed=seguridad digital, comunicadoras, radios comunitarias&lt;br /&gt;
|Links about the activity=Estamos por publicar un artículo en nuestra revista que saldrá en enero, por ahora sólo publicamos en redes sociales. &lt;br /&gt;
Cultural Survival en Español&lt;br /&gt;
&lt;br /&gt;
Facebook de la periodista Indígena Rolanda García: Telesur se publicó una nota corta sobre el evento. &lt;br /&gt;
https://www.facebook.com/rolanda.garciahernandez/videos/1970514573042185/&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=1 Presentación: actividad tecnología y saberes ancestrales&lt;br /&gt;
Presentación.&lt;br /&gt;
20 min&lt;br /&gt;
&lt;br /&gt;
2 Nuestras historias con las tecnologías&lt;br /&gt;
1 hora&lt;br /&gt;
&lt;br /&gt;
3 Introducción al tema: Cómo funciona internet&lt;br /&gt;
Conversatorio /actividad práctica&lt;br /&gt;
Respondemos colectivamente&lt;br /&gt;
¿Cuáles son los riesgos de las comunicaciones en internet?&lt;br /&gt;
¿Cómo funciona internet?&lt;br /&gt;
¿Cómo dejamos huella en Internet?/Metadatos&lt;br /&gt;
Tarjetas Tactical Technology&lt;br /&gt;
1 hora&lt;br /&gt;
&lt;br /&gt;
3 Principios Básicos de seguridad&lt;br /&gt;
Contraseñas seguras&lt;br /&gt;
Antivirus&lt;br /&gt;
Complementos de navegador.&lt;br /&gt;
Buscadores seguros&lt;br /&gt;
&lt;br /&gt;
Actividad práctica/lúdica&lt;br /&gt;
Presentación&lt;br /&gt;
Discusión&lt;br /&gt;
KeepassXC&lt;br /&gt;
Avast&lt;br /&gt;
80 minutos&lt;br /&gt;
&lt;br /&gt;
RECESO ALMUERZO (12/13.30 h)&lt;br /&gt;
&lt;br /&gt;
4 Móviles 1: cómo funcionan los celulares , riesgos y criterios de seguridad&lt;br /&gt;
Conversatorio /actividad práctica / Criterios para elegir apps seguras&lt;br /&gt;
F-Droid&lt;br /&gt;
Tarjetas técnicas rudas&lt;br /&gt;
90 minutos&lt;br /&gt;
&lt;br /&gt;
6 Evaluación y cierre de la jornada&lt;br /&gt;
|Methodologies for training=Durante los días anteriores hicimos un seguimiento de los diversos materiales audiovisuales que Cultural Survival pone a disposición en su sitio.&lt;br /&gt;
También se hizo un breve recorrido bibliográfico por materiales vinculados con la cosmogonía de personas indígenas en Centroamérica. (Ver “Aportes al movimiento continental de Niñez y juventud indígena de Abya Yala por la coordinación y convergencia maya Waqib’kej y Comité organizador en Guatemala – Nota en Píkara Magazine `Takal, takal´. La energía de las encapuchadas)”.&lt;br /&gt;
La preparación implicó lectura de noticias vinculadas a la temática de fuentes como EFF – Derechos Digitales – Prensa Comunitaria y el sitio de IM-Defensoras, entre otras.&lt;br /&gt;
&lt;br /&gt;
El desarrollo de la actividad se dio a partir de propuestas de actividades grupales y posteriores exposiciones de las reflexiones de cada grupo. El seguimiento de la actividad será mediado por la coordinadora de Culture Survival con la intención de viabilizar dudas que surjan después de la primera capacitación. También se entregaron manuales impresos y en formato digital para que las participantes puedan continuar el proceso en el marco de las radios comunitarias en las que participan.&lt;br /&gt;
|Existing toolkits and resources=Herramientas: proyector (cañonera), papelógrafos, presentación en pantalla.&lt;br /&gt;
Manuales: Gendersec, Manual Zen, Currícula de Tactical Tech, DIY Cybersecurity for Domestic Violence.&lt;br /&gt;
|Gender and tech tutorials used=Hands On How the internet works, Gender Tech Personal Memories,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Me sentí muy bien como facilitadora, muy desafiada en principio por lo que significa conocer y trabajar con mujeres indígenas radialistas de la región. Creo que estas mujeres, defensoras del derecho a la libre expresión en todo el continente, tienen una gran cantidad de conocimientos propios de su quehacer y sus activismos en radios que suelen ser criminalizadas por los gobiernos. Muchas otras provienen de contextos de riesgo en donde aprenden medidas de seguridad digital más guiadas por la urgencia que por el placer o la curiosidad de aprender.&lt;br /&gt;
Por otra parte, creo que al haber dado todo el día el programa sola con 20 participantes tuve hacia el final un sentimiento de estar agotada en clara correspondencia ante la demanda que el nivel de contenidos y la cantidad de participantes exige.&lt;br /&gt;
&lt;br /&gt;
De cualquier manera, creo que una sola jornada no es suficiente para poder ahondar la complejidad que algunos de los temas requieren. Por eso, quedamos elaborando y digiriendo la idea de poder dar continuidad a estas temáticas a través de un campamento o una serie de jornadas que puedan extenderse en una mayor cantidad de días, orientada a que las participantes puedan ponerse en una actitud más práctica, crítica y de “manos a la obra” y llevar a la acción muchas de las recomendaciones compartidas durante el taller.&lt;br /&gt;
|Feedbacks=Conocer los caminos para continuar en la seguridad digital.&lt;br /&gt;
&lt;br /&gt;
Felicitar por que la metodología fue bien suave y ayudó a entender estos temas tan complejos&lt;br /&gt;
&lt;br /&gt;
Que los datos y las contraseñas tienen mucho más valor del que nos imaginamos&lt;br /&gt;
&lt;br /&gt;
Las empresas ganan dinero con nuestra información&lt;br /&gt;
&lt;br /&gt;
Estar conscientes que el uso de tecnologías hace uso de nuestros recursos naturales&lt;br /&gt;
&lt;br /&gt;
Utilizar antivirus y hacer respaldos en todos los dispositivos&lt;br /&gt;
&lt;br /&gt;
Cifrar teléfonos&lt;br /&gt;
&lt;br /&gt;
La importancia de no dejar registros&lt;br /&gt;
&lt;br /&gt;
Quitar la batería para que el teléfono deje de rastrearnos&lt;br /&gt;
&lt;br /&gt;
Hay tecnologías ancestrales que hemos abandonado en función de las tecnologías digitales. Las ancestrales no contaminaban y tenían en cuenta nuestras formas de vida.&lt;br /&gt;
&lt;br /&gt;
Las ganas de continuar y seguir otras formaciones con mas tiempo.&lt;br /&gt;
&lt;br /&gt;
Nos queda la responsabilidad de auto-formarnos, compartirla con la familia y con otras personas.&lt;br /&gt;
&lt;br /&gt;
Hacer spots informativos con estas informaciones&lt;br /&gt;
&lt;br /&gt;
Abrir el micrófono y preguntar a la audiencia si toman medidas de seguridad&lt;br /&gt;
|START=Buscaría nuevos materiales en formato audiovisual. Son muy necesarios para trabajar con comunicadoras indígenas.&lt;br /&gt;
|STOP=Podría elegir menos actividades para profundizar de mayor manera en el “manos a la obra”.&lt;br /&gt;
|KEEP=Las dinámicas de juegos, grupales, de apertura de escucha de lo que las propias participantes saben y pueden aportar desde sus experiencias.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=9642</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=9642"/>
				<updated>2018-11-05T10:28:13Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;bloc-news&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Check out our [https://tacticaltech.org/projects/gendersec-training-curricula/ Gendersec training curricula available in English and Spanish]&lt;br /&gt;
* Check out the documentation and evaluation of the last [https://tacticaltech.org/news/roundup-gti-uruguay/ Gender and Technology Institute for Land Defenders  here]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9641</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9641"/>
				<updated>2018-10-29T17:17:45Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* '''Asociacion de Derechos Digitales - 'Que no quede huella, que no que no'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Dálogos feministas para las libertades y autocuidados digitales, a propósito de la Tor Meeting 2018 en Ciudad de México.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9640</id>
		<title>Manuals with a gender perspective</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Manuals_with_a_gender_perspective&amp;diff=9640"/>
				<updated>2018-10-29T12:04:40Z</updated>
		
		<summary type="html">&lt;p&gt;Alex: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This HowTo is still largely Work In Progress.&lt;br /&gt;
&lt;br /&gt;
A list of manuals about privacy and digital security from a gender perspective&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by collectives/organisations ==&lt;br /&gt;
&lt;br /&gt;
* '''Access Now - 'A first look at Digital Security'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.&lt;br /&gt;
&lt;br /&gt;
* ''Asociacion de Derechos Digitales - 'Que no quede huella, que no que no'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License&lt;br /&gt;
&lt;br /&gt;
Languageː Castellano&lt;br /&gt;
&lt;br /&gt;
Dálogos feministas para las libertades y autocuidados digitales, a propósito de la Tor Meeting 2018 en Ciudad de México.&lt;br /&gt;
&lt;br /&gt;
* '''Association for Progressive Communications - 'Take back the tech'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.takebackthetech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː English, French, Spanish&lt;br /&gt;
&lt;br /&gt;
Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː&lt;br /&gt;
&lt;br /&gt;
- The [https://www.takebackthetech.net/know-more &amp;quot;know more section&amp;quot;] which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.&lt;br /&gt;
&lt;br /&gt;
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]&lt;br /&gt;
&lt;br /&gt;
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/&lt;br /&gt;
&lt;br /&gt;
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf&lt;br /&gt;
&lt;br /&gt;
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.&lt;br /&gt;
&lt;br /&gt;
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia&lt;br /&gt;
&lt;br /&gt;
* '''Chayn.org - 'Do It Yourself Online Safety''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://chayn.co/safety/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 4.0 license&lt;br /&gt;
&lt;br /&gt;
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.&lt;br /&gt;
&lt;br /&gt;
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.&lt;br /&gt;
&lt;br /&gt;
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.&lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeministas Guatemala'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC,  Acoso callejero. &lt;br /&gt;
&lt;br /&gt;
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/guiaautodefensatelefonos&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyleft&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs&lt;br /&gt;
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.&lt;br /&gt;
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos. &lt;br /&gt;
&lt;br /&gt;
* ''' Ciberseguras''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://ciberseguras.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas.  &lt;br /&gt;
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Send nudes''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://www.codingrights.org/send-nudes/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, English&lt;br /&gt;
&lt;br /&gt;
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8&lt;br /&gt;
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66&lt;br /&gt;
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː  English, Spanish, Portuguese&lt;br /&gt;
&lt;br /&gt;
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.&lt;br /&gt;
&lt;br /&gt;
* '''Coding Rights - Chupadados'''&lt;br /&gt;
&lt;br /&gt;
Linkː https://chupadados.codingrights.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː Brasilian, Spanish &lt;br /&gt;
&lt;br /&gt;
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como &amp;quot;Big Data&amp;quot;, &amp;quot;Smart Cities&amp;quot; e &amp;quot;Internet de las Cosas&amp;quot;, creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? &lt;br /&gt;
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no? &lt;br /&gt;
&lt;br /&gt;
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento. &lt;br /&gt;
&lt;br /&gt;
* '''Crash Override network - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.&lt;br /&gt;
&lt;br /&gt;
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.&lt;br /&gt;
Link: http://www.crashoverridenetwork.com/preventingdoxing.html&lt;br /&gt;
&lt;br /&gt;
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/familyandpolice.html&lt;br /&gt;
&lt;br /&gt;
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. &lt;br /&gt;
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html&lt;br /&gt;
&lt;br /&gt;
* '''Cyborg Feministas - Recursos'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional &lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines&lt;br /&gt;
&lt;br /&gt;
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution 3.0 Unported license.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.&lt;br /&gt;
&lt;br /&gt;
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.&lt;br /&gt;
&lt;br /&gt;
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.&lt;br /&gt;
&lt;br /&gt;
* '''Digital Rights Foundation - 'The art of digital security for pakistani women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.&lt;br /&gt;
&lt;br /&gt;
Languageː English, Urdu&lt;br /&gt;
&lt;br /&gt;
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://donestech.net/files/redessociales.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas. &lt;br /&gt;
&lt;br /&gt;
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.&lt;br /&gt;
&lt;br /&gt;
* '''Donestech.net - 'Various'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://donestech.net/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution - Share Alike - No Commercial&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish, Catalan, English&lt;br /&gt;
&lt;br /&gt;
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)&lt;br /&gt;
&lt;br /&gt;
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)&lt;br /&gt;
&lt;br /&gt;
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)&lt;br /&gt;
&lt;br /&gt;
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women. &lt;br /&gt;
&lt;br /&gt;
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://onlinesafety.feministfrequency.com/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups &amp;amp; cybermobs online.&lt;br /&gt;
&lt;br /&gt;
* '''FemTechNet - 'Center for solutions to online violence''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://femtechnet.org/csov/&lt;br /&gt;
&lt;br /&gt;
Licenseː Not specified&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence&lt;br /&gt;
&lt;br /&gt;
* '''Fundacion Karisma''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://karisma.org.co/?wpdmdl=7174&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.&lt;br /&gt;
&lt;br /&gt;
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''&lt;br /&gt;
&lt;br /&gt;
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.&lt;br /&gt;
&lt;br /&gt;
Languageː Português&lt;br /&gt;
&lt;br /&gt;
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/domestic-violence/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.&lt;br /&gt;
&lt;br /&gt;
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://hackblossom.org/cybersecurity/&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC BY-NC-SA&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, German&lt;br /&gt;
&lt;br /&gt;
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.&lt;br /&gt;
&lt;br /&gt;
* '''Hacking with care''''&lt;br /&gt;
&lt;br /&gt;
Linkː http://hackingwithcare.in/&lt;br /&gt;
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki&lt;br /&gt;
http://hackingwithcare.in/by/ressources/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body &amp;amp; soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…&lt;br /&gt;
&lt;br /&gt;
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch…. &lt;br /&gt;
&lt;br /&gt;
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://iheartmob.org/resources&lt;br /&gt;
&lt;br /&gt;
Licenseː  Copright &lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.&lt;br /&gt;
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!&lt;br /&gt;
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.&lt;br /&gt;
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.&lt;br /&gt;
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.&lt;br /&gt;
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.&lt;br /&gt;
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Internet Democracy Project - Gendering surveillance''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://genderingsurveillance.internetdemocracy.in/&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY 4.0 (unless otherwise specified). &lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Cyber women'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://cyber-women.com/en/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons BY - SA- NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.&lt;br /&gt;
&lt;br /&gt;
* '''Institute for War and Peace Reporting- 'Hacks de vida'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género&lt;br /&gt;
&lt;br /&gt;
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:&lt;br /&gt;
https://archive.org/details/DocumentoHacksdeVida_201803&lt;br /&gt;
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida&lt;br /&gt;
&lt;br /&gt;
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons By Share Alike&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.&lt;br /&gt;
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.&lt;br /&gt;
&lt;br /&gt;
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://onlineharassmentfieldmanual.pen.org&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright.&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).&lt;br /&gt;
&lt;br /&gt;
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.&lt;br /&gt;
&lt;br /&gt;
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://jensiat.io/&lt;br /&gt;
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality&lt;br /&gt;
&lt;br /&gt;
Licenseː CC Attribution-NonCommercial 2.5 Generic &lt;br /&gt;
&lt;br /&gt;
Languageː Farsi&lt;br /&gt;
&lt;br /&gt;
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to. &lt;br /&gt;
&lt;br /&gt;
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː  Spanish&lt;br /&gt;
&lt;br /&gt;
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.&lt;br /&gt;
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Gendersec Curricula''''&lt;br /&gt;
&lt;br /&gt;
Linkː&lt;br /&gt;
ENG: https://en.gendersec.train.tacticaltech.org/&lt;br /&gt;
SPA: https://es.gendersec.train.tacticaltech.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://myshadow.org/train +  https://myshadow.org/materials&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish &lt;br /&gt;
&lt;br /&gt;
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue. &lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English and Spanish&lt;br /&gt;
&lt;br /&gt;
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely? &lt;br /&gt;
&lt;br /&gt;
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://securityinabox.org/en/lgbti-mena&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.&lt;br /&gt;
&lt;br /&gt;
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''&lt;br /&gt;
&lt;br /&gt;
Linkː  https://womensrights.informationactivism.org/&lt;br /&gt;
&lt;br /&gt;
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)&lt;br /&gt;
&lt;br /&gt;
Languageː English, Hindi, Arabic and Swahili.&lt;br /&gt;
&lt;br /&gt;
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.&lt;br /&gt;
&lt;br /&gt;
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores&lt;br /&gt;
&lt;br /&gt;
Licenseː CC BY SA NC&lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish&lt;br /&gt;
&lt;br /&gt;
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.&lt;br /&gt;
&lt;br /&gt;
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'''' &lt;br /&gt;
&lt;br /&gt;
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/&lt;br /&gt;
&lt;br /&gt;
Licenseː Commons Attribution-ShareAlike 4.0 International &lt;br /&gt;
&lt;br /&gt;
Languageː English, Spanish, Arabic&lt;br /&gt;
&lt;br /&gt;
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment. &lt;br /&gt;
&lt;br /&gt;
* '''Trollbusters - 'Digital Hygiene Course''''&lt;br /&gt;
&lt;br /&gt;
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.&lt;br /&gt;
&lt;br /&gt;
* '''Web we wantː Recipes for a Digital Revolution'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.&lt;br /&gt;
&lt;br /&gt;
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''&lt;br /&gt;
&lt;br /&gt;
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.&lt;br /&gt;
&lt;br /&gt;
* '''Women's Media Center - 'Speech project'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://wmcspeechproject.com/online-abuse-101/&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.&lt;br /&gt;
&lt;br /&gt;
== Manuals produced by individuals == &lt;br /&gt;
&lt;br /&gt;
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf&lt;br /&gt;
&lt;br /&gt;
Licenseː ?&lt;br /&gt;
&lt;br /&gt;
Languageː English &lt;br /&gt;
&lt;br /&gt;
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this. &lt;br /&gt;
&lt;br /&gt;
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'''' &lt;br /&gt;
&lt;br /&gt;
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf &lt;br /&gt;
https://archive.org/details/FanzineNecesitoPrivacidad&lt;br /&gt;
&lt;br /&gt;
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.&lt;br /&gt;
	&lt;br /&gt;
* '''Smart Girl's Guide to Privacy by Violet Blue'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.nostarch.com/smartgirlsguide&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites. &lt;br /&gt;
&lt;br /&gt;
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://www.patreon.com/posts/12240673&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. &lt;br /&gt;
&lt;br /&gt;
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c&lt;br /&gt;
 &lt;br /&gt;
Licenseː Copyright&lt;br /&gt;
&lt;br /&gt;
Languageː English&lt;br /&gt;
&lt;br /&gt;
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.&lt;br /&gt;
&lt;br /&gt;
* '''Programas de radio El Desarmador por Imilla hacker'''' &lt;br /&gt;
&lt;br /&gt;
Linkː  https://archive.org/details/@imilla_hacker&amp;amp;tab=uploads and http://www.eldesarmador.org/&lt;br /&gt;
 &lt;br /&gt;
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)&lt;br /&gt;
&lt;br /&gt;
Licenseː Creative Commons Attribution-NonCommercial 4.0 International&lt;br /&gt;
&lt;br /&gt;
Languageː Spanish&lt;br /&gt;
&lt;br /&gt;
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.&lt;br /&gt;
&lt;br /&gt;
== Before producing a manual ==&lt;br /&gt;
&lt;br /&gt;
Before producing a new manual some questions we should askː&lt;br /&gt;
* Don't reinvent the wheelǃ Are you duplicating upstream work?&lt;br /&gt;
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?&lt;br /&gt;
* Who's the public and what are the objectives ? What are their security &amp;amp; technical levels? What are their comprehension about feminism? &lt;br /&gt;
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?&lt;br /&gt;
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?&lt;br /&gt;
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?&lt;br /&gt;
* Credits your reviewers and experts that have provided you with feed back!!&lt;br /&gt;
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you. &lt;br /&gt;
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.&lt;br /&gt;
* How will you achieve or not translation &amp;amp; translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance? &lt;br /&gt;
* Accessible for disable people &lt;br /&gt;
* Will you provide further support to the readers such as a contact mail or a hotline?&lt;br /&gt;
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist &amp;quot;approved&amp;quot;?&lt;br /&gt;
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?&lt;br /&gt;
* How the distribution will be done? What is the target public?&lt;br /&gt;
* Think about potential partnerships (researchers, academia, volunteer translators etc)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	</feed>