<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Natasha</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Natasha"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/Natasha"/>
		<updated>2026-04-26T16:57:18Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop:_Safer_Nudes_@Montreal,_Canada&amp;diff=8754</id>
		<title>Workshop: Safer Nudes @Montreal, Canada</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop:_Safer_Nudes_@Montreal,_Canada&amp;diff=8754"/>
				<updated>2017-01-14T14:34:38Z</updated>
		
		<summary type="html">&lt;p&gt;Natasha: Created page with &amp;quot;{{Activities |Title of the activity=Workshop: Safer Nudes @HTMLLES Festival, Montreal - Canada |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2016...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Workshop: Safer Nudes @HTMLLES Festival, Montreal - Canada&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/12/07&lt;br /&gt;
|End when ?=2016/12/07&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Geo-localization of the activity ?=45.5016889, -73.56725599999999&lt;br /&gt;
|Who organize it=Coding Rights&lt;br /&gt;
|organisation(s) website=www.codingrights.org/safernudes&lt;br /&gt;
|For whom is it organized=HTMlles Festival participants&lt;br /&gt;
|How many people trained=15&lt;br /&gt;
|Motivations for organizing training=Since the leaks of nudes and the numerous cases of revenge porn start to become everyday news, we've witnessed all kinds of narratives about it. The vast majority of them are paternalistic, patronizing pieces that ultimately state that sending nudes is irresponsible and unsafe. In this guide, we will try to confront this narrative and introduce the &amp;quot;Send Nudes!&amp;quot; project, a guide to digital security for sharing intimate images that does not base itself on slutshaming, but on a pro-sex attitude. This project aimed to call the attention to how learning to send nudes through the internet in a safer way can be a practice of self-determination for us as sexual bodies and internet users. More than protection, we need to spread knowledge about daily practices and actions that can work towards shifting perspectives about gender roles and digital rights.&lt;br /&gt;
|Topics addressed=Nudes, Digital Security, Privacy&lt;br /&gt;
|Links about the activity=www.codingrights.org/safernudes&lt;br /&gt;
https://htmlles.net/en/&lt;br /&gt;
|Upload content=Ap-1-nudes.ppt.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=2:40  - 2:45  &lt;br /&gt;
5 min ::: presentation &lt;br /&gt;
We will present ourselves and Coding Rights.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2:45 - 2:55&lt;br /&gt;
10 min :: presentation - we ask them to present themselves saying the name or nickname, their field study/work and why they r here.&lt;br /&gt;
&lt;br /&gt;
2:55 - 3:00&lt;br /&gt;
05 min :: presenting the Nudes Zine project: why we did it.&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;manda nudes&amp;quot;, meme brazil 2015. we export the image of sexy women but censor and kill women.&lt;br /&gt;
&lt;br /&gt;
- The expression “Send Nudes!” went viral in 2015 in Brazil.2 The common perception of nudes is that they are taken by young girls with low self-esteem, pressured by some boyfriend or her social3 network, and that eventually she will be the target of slut shaming, exposure, or online violence. Nudies are understood as something you just should not do. If you are a woman who deliberately sends it, you are an attention whore. If you are fat, trans, or anyone who is beyond the traditional standards of what is visible in the mainstream media, you are labeled as ugly, disgusting, or a freak. &lt;br /&gt;
&lt;br /&gt;
- critical texts about selfies and nudes were usually judgemental and patronizing. mainstream opinion is that they'r sent by girls who don't know better. &lt;br /&gt;
&lt;br /&gt;
- Tried to create counterspeech to this narrative, affirming that &amp;quot;Nudes can be an act of self-determination and also an act of pleasurable resistance against racism, sexism, machismo,conservatism and heteronormativity&amp;quot; and that there are tools and strategies that can help us to use technologies on our own favour, while also exercisingself-determination and consent in the digital context. &lt;br /&gt;
&lt;br /&gt;
3:00 - 3:05&lt;br /&gt;
05 min: Privacy and Digital Security &lt;br /&gt;
&lt;br /&gt;
- One of the most important things about &amp;quot;digital security&amp;quot; is identigfying the potential threat. In the case of Nudes,  the main threat is the leak of the intimate images against our will and normaally it will leak through the person you have talked to/&lt;br /&gt;
&lt;br /&gt;
. But there are also other violations of our consent that happen without us noticing most of the times – those are practiced by services and companies.&lt;br /&gt;
- Privacidade. Direito de escolher o que se compartilha e com quem quiser. Não deveria, mas a garantia de seu exercício depende de alguns conhecimentos tecnicos.... &lt;br /&gt;
- Some say that the internet has turned privacy into an outdated idea. However, we still see people who challenge gender normativity being targets of revenge porn, as well as offline and online bullying. Most of the time, these attacks take advantage of the amount of data we leave as footprints when we use the internet. The ideas of caring about our privacy and sending nudes may seem contradictory, but they are not. Privacy is the power to choose who has access to our personal information and under what circumstances. In an online environment, it is deeply related to the choices of the communication technologies we use. &lt;br /&gt;
&lt;br /&gt;
3:05 - 3:10&lt;br /&gt;
05 min: Revenge Porn, privacy rights&lt;br /&gt;
A vigança porno é usado como arma contra o direito da sexualidade feminina, a mulher que se expoe é a culpada pela exposição. Mulher que gosta de sexo é vagabunda, enquanto homem é garanhao. Nudes seguro é uma pauta feminista e mulheres precisam falar de seg digital.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3:10 - 3:40 &lt;br /&gt;
30 min : how the image travel from one mobile to another?&lt;br /&gt;
Com as imagens na mão pedir para a galera montar o percurso que a mensagem faz: mobile, isp, mobile tower, server of google.&lt;br /&gt;
Explain the main vulnerabilities HTTP,  wifi routers and imsi catchers,  cloud server, Metadata.&lt;br /&gt;
&lt;br /&gt;
3:40 - 4:00&lt;br /&gt;
20 min: mobile vunerabilities in layers:&lt;br /&gt;
layers: apps, middleware, OS, hardware - easy to loose, easy to be stolen&lt;br /&gt;
&lt;br /&gt;
show metadata:  camera V - CameraV: tracking movement, light, compass, temperature, location, WIFI, Bluetooth, GPS, celular network information  - to verify date, time, location + digital signature and encryption&lt;br /&gt;
&lt;br /&gt;
4:00- 4:10&lt;br /&gt;
10 min: Bodies&lt;br /&gt;
* One of the key principles of Safer Nudes is self-enjoyment. It doesn't need to follow the mainstream porn codes – the idea is right the contrary. &lt;br /&gt;
&lt;br /&gt;
* We also think of it in a postporn key, where pornography is used as a political tool for resistance, and appropriation of the farmaco-pronographic technologies of identity production. It is based on an idea of multiplication and distortion of the norms of sexual visibility. &lt;br /&gt;
&lt;br /&gt;
* Politically, we think making selfies and nudies can really be a tool for self-knowledge, something that allows people to discover the many ways their bodies can be represented in a way they like, with images they produce. Pleasurable resistance.&lt;br /&gt;
&lt;br /&gt;
* In terms of making it SAFER, so we avoid having such images published when we don't want them to be published, we would recommend taking as many pictures as we need untill we find our favorite angles, and if you are planning to share them, specially with people you don't trust, avoid showing tattos, birthmarks, furniture and other elements that can connect that image to your identity. Images that avoid showing faces, tattoos, birthmarks, scars, furniture etc... &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
4:10 - 4:20&lt;br /&gt;
Break: Internet, Internet, Internet.... &lt;br /&gt;
(take pictures)&lt;br /&gt;
&lt;br /&gt;
4:20 - 4:50 &lt;br /&gt;
30 min: so, what can I do to send safer nudes?&lt;br /&gt;
Mobile encryption.&lt;br /&gt;
senhas&lt;br /&gt;
About conection and metadata: VPN, Orbot, Obscuracam,  Photo Exif Editor (available for iPhone and Android).&lt;br /&gt;
About keeping photos safe: Secrecy&lt;br /&gt;
&lt;br /&gt;
Chat APPs&lt;br /&gt;
diference between apps (telegram, whatsapp, signal)&lt;br /&gt;
Ephemeral and locked : why not use whatsapp and facebook.  KeepSafe to lock our gallery photo&lt;br /&gt;
 &lt;br /&gt;
 Confide as option.&lt;br /&gt;
  Confide: &lt;br /&gt;
     self-destruction messages&lt;br /&gt;
     end-to-end encrypted&lt;br /&gt;
     drag finger down&lt;br /&gt;
     msgs cannot be saved or forwarded&lt;br /&gt;
     screenshot&lt;br /&gt;
 &lt;br /&gt;
 4:50-5:20&lt;br /&gt;
30 min: lets play&lt;br /&gt;
get one of the emails in the screen, create your account using another identity, send your secret message, photo or nudes to someone in the list. &amp;gt;&amp;gt; pensei em ja criar esses emails temporarios, para facilitar a brincadeira, assim eles precisam so escolher um email para ser o perfil e outro para mandar.&lt;br /&gt;
 &lt;br /&gt;
To instal and sign up:&lt;br /&gt;
&amp;gt;     email address or phone number is required    &lt;br /&gt;
&amp;gt; anonbox.net provides you free, completely anonymous one-time email addresses.&lt;br /&gt;
Acquire one in our web interface and use it to receive emails up to the next day. Check for new emails in your browser.&lt;br /&gt;
&lt;br /&gt;
&amp;gt; Lista de emails&lt;br /&gt;
https://docs.google.com/document/d/1H4BisRr4mF5WmsqovEIO6UMdW1YalL1C3xXJrlkMx3c/edit?usp=sharing&lt;br /&gt;
&lt;br /&gt;
&amp;gt; Não add telefone&lt;br /&gt;
&amp;gt; Confirmar email abrindo no link q foi junto com o email&lt;br /&gt;
&amp;gt; no not allow access to contacts - &amp;quot;continue without contacts&amp;quot;&lt;br /&gt;
&amp;gt; Set Passworld Lock&lt;br /&gt;
&amp;gt; send msg to:  &lt;br /&gt;
    email from the list    &lt;br /&gt;
    not possible to find though user names&lt;br /&gt;
&amp;gt; ready to send nudes&lt;br /&gt;
&amp;gt; you can change your name once    &lt;br /&gt;
&amp;gt; About Sent Message history - only for mobile, just for msgs (no photos, docs or audio), encrypted and stored locally in your device, deleted after your read a new msg or 48hs.  &lt;br /&gt;
&amp;gt;Premium &lt;br /&gt;
 - allows retract (un-send)    &lt;br /&gt;
     &lt;br /&gt;
5:20 - 5:30 -  Conclusion: &lt;br /&gt;
Talk to people about it.&lt;br /&gt;
Some provokative questions:&lt;br /&gt;
How was the experience of sending nudes or secret messages?&lt;br /&gt;
What can we do after these images are leaked?&lt;br /&gt;
In your opinion the expereince can be different in context other cultures? &amp;gt;&amp;gt; se tiver varias estrangeiras&lt;br /&gt;
|Gender and tech tutorials used=Hands On How the internet works, Threat analysis - Information Mapping I, myshadow.org,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=&amp;lt;3&lt;br /&gt;
|Feedbacks=super positive&lt;br /&gt;
|START=getting people to interact more with each other BEFORE we propose the anonymous mail activity&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Natasha</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Ap-1-nudes.ppt.pdf&amp;diff=8753</id>
		<title>File:Ap-1-nudes.ppt.pdf</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Ap-1-nudes.ppt.pdf&amp;diff=8753"/>
				<updated>2017-01-14T14:27:24Z</updated>
		
		<summary type="html">&lt;p&gt;Natasha: slides present during the workshop&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;slides present during the workshop&lt;/div&gt;</summary>
		<author><name>Natasha</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Tracking_your_period:_Data_economy_and_the_risks_for_privacy_and_security_of_(very)_personal_data&amp;diff=8752</id>
		<title>Tracking your period: Data economy and the risks for privacy and security of (very) personal data</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Tracking_your_period:_Data_economy_and_the_risks_for_privacy_and_security_of_(very)_personal_data&amp;diff=8752"/>
				<updated>2017-01-14T14:14:41Z</updated>
		
		<summary type="html">&lt;p&gt;Natasha: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Tracking your period: Data economy and the risks for privacy and security of (very) personal data - Coding Rights&lt;br /&gt;
|Category=Privacy Advocacy, Gender and Tech&lt;br /&gt;
|Start when ?=2016/09/09&lt;br /&gt;
|End when ?=2016/09/09&lt;br /&gt;
|Number of hours if only one day ?=16:30-17h&lt;br /&gt;
|Geo-localization of the activity ?=-12.579738, -41.7007272&lt;br /&gt;
|Who organize it=Coding Rights&lt;br /&gt;
|For whom is it organized=AWID participants&lt;br /&gt;
|How many people trained=15&lt;br /&gt;
|Motivations for organizing training=Fertility awareness methods have been known and practised by women since antiquity, and were widely used in the 20th century until hormonal birth control methods suppressing or controlling menstruation were developed. Historically, monitoring fertility expanded on the personal knowledge of one’s cycle and body, and has therefore been encouraged by some menstruation activists as a way to better understand and live their cyclic nature in a positive way. Mobile applications can now take on the role of monitoring a woman’s cycle2 and are amongst the most popular health applications in app stores. (excerpt from QUANTIFYING FERTILITY AND REPRODUCTION THROUGH MOBILE APPS: A Critical Overview, by Vanessa Rizk and Dalia Othman, at ARROW FOR CHANGE, vol. 22 no. 1 2016)&lt;br /&gt;
|Topics addressed=Data protection, Data capitalism, Trackers, Health,&lt;br /&gt;
|Links about the activity=http://www.forum.awid.org/forum16/program/feminist-internet-exchange&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Introduction&lt;br /&gt;
&lt;br /&gt;
Going around and asking people if they use a tracker, or not, and why they chose to attend this session. &lt;br /&gt;
(each letter below stands for a participant)&lt;br /&gt;
&lt;br /&gt;
D: used a period tracker once when she got off birth control – used for a few months – didn't find it particularly helpful connecting my period to an app on my phone&lt;br /&gt;
&lt;br /&gt;
O: never used tracker but knows people who do because their periods are irregular &lt;br /&gt;
&lt;br /&gt;
E: so no need for period trackers but is very curious about the development of applications for this&lt;br /&gt;
&lt;br /&gt;
M uses one, but only to research it; mentions what kinds of data were collected by Clue, which is also based in Berlin.&lt;br /&gt;
&lt;br /&gt;
D: does use a period tracker but wants to know more about how it works.&lt;br /&gt;
  &lt;br /&gt;
W wanted to know: she knows nothing about apps but is very interested in data protection issues &lt;br /&gt;
&lt;br /&gt;
D: experience of having worked on analysis of apps for the ARROW bulletin on SRHR, sexuality and the internet &lt;br /&gt;
The research for the article lead us to question how much data (especially metadata) is being collected by these applications. Who the companies share the data with when they say third party organizations. &lt;br /&gt;
&lt;br /&gt;
Going beyond the data, how the algorithms are developed and being used to process the data and what that means in terms of notifications sent out to the users. Is it based on data points collected from all the users and analyzed together? There is a lack of clarity how the data and notifications are pushed out to users and whether it's based on some scientific process. &lt;br /&gt;
&lt;br /&gt;
Also added points to the research centers and what they are doing with the collected data.. elaborated on that issue in the discussion below. &lt;br /&gt;
&lt;br /&gt;
Discussion points:&lt;br /&gt;
&lt;br /&gt;
M: The idea that a woman entrepreneur makes a period tracker, or any tech that is for women, somehow suggests that because a woman made or developed the app, it is somehow better and more ethical. Why are we so deterministic? Some women, as in the case of Clue, are just business women &lt;br /&gt;
&lt;br /&gt;
Questions about membership and data sharing. Most of these apps are based on a significant data business model. They collect data for further resale and sharing. Only Clue allows the user to store data offline on their phone and not share it, or to share it via with Cloud. &lt;br /&gt;
&lt;br /&gt;
M: Is the data being collected used to push messages to change behaviour?&lt;br /&gt;
&lt;br /&gt;
E: what sort of collectivity do we want – we may want to know about what happens when we have pain, feel the craving for carbs, have sensitive breasts. The social and collective space is quite valuable for women, or at least knowing other women's experiences can be quite useful when shared. Maya shared that with the use of Clue, most popular among young women, enables a sort of collective sharing and discussion through the medium of the app.  The information women have and share could be useful and it helps to talk to others – what kind of collectivity is being promoted through this? Is it on women's terms? Is collectivity being enabled or reduced through the app?&lt;br /&gt;
&lt;br /&gt;
Ethical issues around collecting data through apps. Clue is an app that says it wants to share the data they collect with public health research institutes like Columbia University's School of Public Health in the interest of furthering scientific knowledge about women's health, a notoriously difficutt topic to research and collect data on. However, it is unclear  what sorts of norms and guidelines govern this sort of research. How do Columbia and other universities rationalise the use of data collected in this way? What kinds of research ethics are in place for data collected through mobile phone apps in non research, ie not controlled setting?  This process is opaque to users or anyone else. &lt;br /&gt;
&lt;br /&gt;
O: is it possible that young women who already feel pressure to be normal will feel even more pressure to be normal? Is it a good thing in this day and age when young women face pressure? &lt;br /&gt;
&lt;br /&gt;
D: Also talked about how free basics and Facebook is now adding similar applications for women who are not connected to the internet to access information and collect further data. How does that influence the overall global data being collected when apps move beyond well connected areas and women with smart phones to other countries in the world with limited connectivity. How do these apps and information influence these women. Also noted was the fact that Facebook requires all third party apps to share the data collected through them. &lt;br /&gt;
&lt;br /&gt;
J: What if we start thinking about this differently. What does  a feminist app look like? Maybe a feminist app would ask different questions, collect and share information differently.&lt;br /&gt;
|Methodologies for training=Conversation&lt;br /&gt;
|Existing toolkits and resources=https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/&lt;br /&gt;
&lt;br /&gt;
http://arrow.org.my/wp-content/uploads/2016/08/AFC22.1-2016.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>Natasha</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Tracking_your_period:_Data_economy_and_the_risks_for_privacy_and_security_of_(very)_personal_data&amp;diff=8751</id>
		<title>Tracking your period: Data economy and the risks for privacy and security of (very) personal data</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Tracking_your_period:_Data_economy_and_the_risks_for_privacy_and_security_of_(very)_personal_data&amp;diff=8751"/>
				<updated>2017-01-14T14:08:03Z</updated>
		
		<summary type="html">&lt;p&gt;Natasha: Created page with &amp;quot;{{Activities |Title of the activity=Tracking your period: Data economy and the risks for privacy and security of (very) personal data - Coding Rights |Start when ?=2016/09/09...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Tracking your period: Data economy and the risks for privacy and security of (very) personal data - Coding Rights&lt;br /&gt;
|Start when ?=2016/09/09&lt;br /&gt;
|End when ?=2016/09/09&lt;br /&gt;
|Number of hours if only one day ?=16:30-17h&lt;br /&gt;
|Geo-localization of the activity ?=-12.579738, -41.70072720000002&lt;br /&gt;
|Who organize it=Coding Rights&lt;br /&gt;
|For whom is it organized=AWID participants&lt;br /&gt;
|How many people trained=15&lt;br /&gt;
|Motivations for organizing training=Fertility awareness methods have been known and practised by women since antiquity, and were widely used in the 20th century until hormonal birth control methods suppressing or controlling menstruation were developed. Historically, monitoring fertility expanded on the personal knowledge of one’s cycle and body, and has therefore been encouraged by some menstruation activists as a way to better understand and live their cyclic nature in a positive way. Mobile applications can now take on the role of monitoring a woman’s cycle2 and are amongst the most popular health applications in app stores. (excerpt from QUANTIFYING FERTILITY AND REPRODUCTION THROUGH MOBILE APPS: A Critical Overview, by Vanessa Rizk and Dalia Othman, at ARROW FOR CHANGE, vol. 22 no. 1 2016)&lt;br /&gt;
|Topics addressed=Data protection, Data capitalism, Trackers, Health,&lt;br /&gt;
|Links about the activity=http://www.forum.awid.org/forum16/program/feminist-internet-exchange&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Introduction&lt;br /&gt;
&lt;br /&gt;
Going around and asking people if they use a tracker, or not, and why they chose to attend this session. &lt;br /&gt;
(each letter below stands for a participant)&lt;br /&gt;
&lt;br /&gt;
D: used a period tracker once when she got off birth control – used for a few months – didn't find it particularly helpful connecting my period to an app on my phone&lt;br /&gt;
&lt;br /&gt;
O: never used tracker but knows people who do because their periods are irregular &lt;br /&gt;
&lt;br /&gt;
E: so no need for period trackers but is very curious about the development of applications for this&lt;br /&gt;
&lt;br /&gt;
M uses one, but only to research it; mentions what kinds of data were collected by Clue, which is also based in Berlin.&lt;br /&gt;
&lt;br /&gt;
D: does use a period tracker but wants to know more about how it works.&lt;br /&gt;
  &lt;br /&gt;
W wanted to know: she knows nothing about apps but is very interested in data protection issues &lt;br /&gt;
&lt;br /&gt;
D: experience of having worked on analysis of apps for the ARROW bulletin on SRHR, sexuality and the internet &lt;br /&gt;
The research for the article lead us to question how much data (especially metadata) is being collected by these applications. Who the companies share the data with when they say third party organizations. &lt;br /&gt;
&lt;br /&gt;
Going beyond the data, how the algorithms are developed and being used to process the data and what that means in terms of notifications sent out to the users. Is it based on data points collected from all the users and analyzed together? There is a lack of clarity how the data and notifications are pushed out to users and whether it's based on some scientific process. &lt;br /&gt;
&lt;br /&gt;
Also added points to the research centers and what they are doing with the collected data.. elaborated on that issue in the discussion below. &lt;br /&gt;
&lt;br /&gt;
Discussion points:&lt;br /&gt;
&lt;br /&gt;
M: The idea that a woman entrepreneur makes a period tracker, or any tech that is for women, somehow suggests that because a woman made or developed the app, it is somehow better and more ethical. Why are we so deterministic? Some women, as in the case of Clue, are just business women &lt;br /&gt;
&lt;br /&gt;
Questions about membership and data sharing. Most of these apps are based on a significant data business model. They collect data for further resale and sharing. Only Clue allows the user to store data offline on their phone and not share it, or to share it via with Cloud. &lt;br /&gt;
&lt;br /&gt;
M: Is the data being collected used to push messages to change behaviour?&lt;br /&gt;
&lt;br /&gt;
E: what sort of collectivity do we want – we may want to know about what happens when we have pain, feel the craving for carbs, have sensitive breasts. The social and collective space is quite valuable for women, or at least knowing other women's experiences can be quite useful when shared. Maya shared that with the use of Clue, most popular among young women, enables a sort of collective sharing and discussion through the medium of the app.  The information women have and share could be useful and it helps to talk to others – what kind of collectivity is being promoted through this? Is it on women's terms? Is collectivity being enabled or reduced through the app?&lt;br /&gt;
&lt;br /&gt;
Ethical issues around collecting data through apps. Clue is an app that says it wants to share the data they collect with public health research institutes like Columbia University's School of Public Health in the interest of furthering scientific knowledge about women's health, a notoriously difficutt topic to research and collect data on. However, it is unclear  what sorts of norms and guidelines govern this sort of research. How do Columbia and other universities rationalise the use of data collected in this way? What kinds of research ethics are in place for data collected through mobile phone apps in non research, ie not controlled setting?  This process is opaque to users or anyone else. &lt;br /&gt;
&lt;br /&gt;
O: is it possible that young women who already feel pressure to be normal will feel even more pressure to be normal? Is it a good thing in this day and age when young women face pressure? &lt;br /&gt;
&lt;br /&gt;
D: Also talked about how free basics and Facebook is now adding similar applications for women who are not connected to the internet to access information and collect further data. How does that influence the overall global data being collected when apps move beyond well connected areas and women with smart phones to other countries in the world with limited connectivity. How do these apps and information influence these women. Also noted was the fact that Facebook requires all third party apps to share the data collected through them. &lt;br /&gt;
&lt;br /&gt;
J: What if we start thinking about this differently. What does  a feminist app look like? Maybe a feminist app would ask different questions, collect and share information differently.&lt;br /&gt;
|Methodologies for training=Conversation&lt;br /&gt;
|Existing toolkits and resources=https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/&lt;br /&gt;
&lt;br /&gt;
http://arrow.org.my/wp-content/uploads/2016/08/AFC22.1-2016.pdf&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>Natasha</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop:_Health,_sexuality,_algorithms_and_data&amp;diff=8750</id>
		<title>Workshop: Health, sexuality, algorithms and data</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop:_Health,_sexuality,_algorithms_and_data&amp;diff=8750"/>
				<updated>2017-01-14T13:41:38Z</updated>
		
		<summary type="html">&lt;p&gt;Natasha: Created page with &amp;quot;{{Activities |Title of the activity=Health, Sexuality, Algorithms and data |Start when ?=2016/09/13 |End when ?=2017/01/14 |Number of hours if only one day ?=13-17h |Where is...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Health, Sexuality, Algorithms and data&lt;br /&gt;
|Start when ?=2016/09/13&lt;br /&gt;
|End when ?=2017/01/14&lt;br /&gt;
|Number of hours if only one day ?=13-17h&lt;br /&gt;
|Where is located the activity ?=Local level&lt;br /&gt;
|Geo-localization of the activity ?=UERJ&lt;br /&gt;
|Who organize it=Coding Rights/ Tactical Tech/ Latin American Center for Sexuality and Human Rights (CLAM)/ Institute of Social Medicine (UERJ)&lt;br /&gt;
|For whom is it organized=Graduate researchers of the social medicine program at Rio de Janeiro's State University (UERJ)&lt;br /&gt;
|How many people trained=30&lt;br /&gt;
|Motivations for organizing training=Context: First class of a semester course named &amp;quot;Researching in and with the Internet&amp;quot;, offered by the graduate program of social medicine at UERJ.&lt;br /&gt;
&lt;br /&gt;
Motivation:  Bring in concepts such as privacy, surveillance, big data, data capitalism to be discussed with researchers who are looking at social and economic issues that impact access to health, public services, sexuality and human rights. &lt;br /&gt;
&lt;br /&gt;
Description: Big Data, quantification, data society. We have to start figuring out what these terms mean. They mark an important change on how the internet works and affects everybody who uses it. &lt;br /&gt;
Internet today works with a new business model, in which every click, like, share, and even how long the cursor of your mouse spends, is converted in value. &lt;br /&gt;
Data technologies are capable of extracting information and value of every action, including information about our bodies, intimate thoughts, feelings and relationships. The massive use and processing of data, or Big Data, forces s to think about the meaning of privacy in different contexts. &lt;br /&gt;
&lt;br /&gt;
CLAM/IMS-UERJ, in collaboration with Coding Rights and Tactical Tech Collective, will host an introductory workshop on how these technologies and databases relate to gender and sexuality issues. &lt;br /&gt;
&lt;br /&gt;
In the workshop, we will discuss how data technologies work, how they track information, what kind of personal data is collected by health apps such as period and fertility trackers.&lt;br /&gt;
&lt;br /&gt;
The workshop is open to the participation of researchers, activists and general public.&lt;br /&gt;
|Topics addressed=Data Privacy, Quantification, Big Data, Sexuality, Health, Data Capitalism&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Introduction:&lt;br /&gt;
- Big Data&lt;br /&gt;
- Algorithms/machine learning&lt;br /&gt;
- Data capitalism&lt;br /&gt;
&lt;br /&gt;
Activity I: &lt;br /&gt;
- Each participant would draw on a sheet of paper the equipments and services they used everyday&lt;br /&gt;
- Discussion about apps and serivces business models &lt;br /&gt;
&lt;br /&gt;
Activity II:&lt;br /&gt;
- How to analyze apps? Break up in groups to analyze different health apps (like sick weather, periodtrackers, pregnancy/baby apps, sports apps etc)&lt;br /&gt;
- Share analysis between groups&lt;br /&gt;
&lt;br /&gt;
Wrap up&lt;br /&gt;
|Methodologies for training=Activity two was inspired in 'adapted applications scoring system'&lt;br /&gt;
|Gender and tech tutorials used=Threat analysis - Information Mapping I, Threat analysis - Information Mapping II,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=Rich environment , great experience of reaching out to groups not previously involved in digital security/privacy debate&lt;br /&gt;
|Feedbacks=Extremely positive&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Natasha</name></author>	</entry>

	</feed>