Browse wiki
FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia |
Category | Digital Security + , Gender and Tech + , Privacy Advocacy + |
---|---|
Detailed schedule and contents |
Feminist Hack Days To End Violence Against … Feminist Hack Days To End Violence Against Women & LGBT
AGENDA
Day 1: Feminist Hackathon #femhack
23 May 2015
Time Session
09:30 – 09:55 Registration
09:55 – 10:15 Opening and Introduction
10:15 – 11:45 Digital Privacy – Presentation and Discussion
11:45 – 13:00 Online Violence Against Women & LGBT - Presentation
13:00 – 14:00 Lunch
14:00 – 14:30 Online Violence Against Women & LGBT – Sharing Experience
14:30 – 15:30 Discussion
15:30 – 16:00 Break
16:00 – 17:00 Social Media Survey
17:00 – 17:30 Conclusion & Review
Day 2: Digital Security Training
24 May 2015
Time Session
10:00 – 10:30 Women in Tech - Presentation
10:30 – 11:00 How the Internet Works & Digital Communication Model
11:00 – 12:00 Strong Password - Keepass
12:00 – 13:00 Circumvention Tools
13:00 – 14:00 Lunch
14:00 – 14:30 Circumvention Tools
14:30 – 15:30 Privacy & Anonymity
15:30 – 16:00 Break
16:00 – 17:00 Be safe online – Share your strategy!
17:00 – 17:30 Review
Day 3: Digital Security Training
25 May 2015
Waktu Session
09:30 – 13:00 Secure Mail & PGP
13:00 – 14:00 Lunch
13:30 – 15:00 Secure Mail & PGP, Key signing party
15:00 – 16:00 OTR (Off-The-Record) Messaging
16:00 – 16:15 Break
16:15 – 18:00 Mobile Security
18:00 – 18:30 Review 18:00 Mobile Security
18:00 – 18:30 Review +
|
End when | 25 May 2015 + |
Existing toolkits and resources | I wrote/prepared all presentations based on my personal knowledge, experience and skills on the issues and add some resources from the GTI notes. + |
Feedbacks |
Participants were very grateful and excite … Participants were very grateful and excited about the event and the new issues they were learning in the training. All of them were very excited to share what they have learned with their friends in their organizations and collectives as now they know that most of digital security strategies will only work if it is applied collectively.
Participants also express their hopes for the continuation of the training and discussion after the event, not only for women and LGBTIQ activists but also for other activists working on different social justice issues. orking on different social justice issues. +
|
Feelings |
The event went very well. As the organizer … The event went very well. As the organizer, I felt a great satisfaction to be able to conduct the training and share what I have learned in the past year. This small achievement serves as a seed of work to show and convince activists about the importance of the issues and it also serves very valuable ground work for me on the issues to build the gender and tech movement in Indonesia.
As for participants, they showed big interest and enthusiasm to start taking up the issues within their organization and movement. es within their organization and movement. +
|
For whom is it organized | Feminists and LGBTIQ activists from Jakarta and Jogjakarta + |
Gender and tech tutorials used | Security in the box + , LevelUp + |
Geo-localization of the activity |
-6° 15' 19", 106° 48' 42"Latitude: -6.255418246073 Longitude: 106.81172132427 + |
How many people trained | 20 + |
KEEP |
Keep learning about the development of the … Keep learning about the development of the issues of digital rights and digital security. Keep putting gender and sexuality perspective into privacy and digital security discussion and training, even if it is for activists who are not focusing on gender and sexuality issues.
Keep doing this work with or without financial support. is work with or without financial support. +
|
Methodologies for training |
Methodologies:
Using the approach of adult … Methodologies:
Using the approach of adult learning where everyone is equal and everyone is both learning and teaching. But given the fact that the issues of Privacy and Digital Security are fairly new to most activists participating in the training, there were several presentation by me and followed with open and interactive discussions. Group discussions methodology were used for experience sharing and strategies sharing. A couple of games were applied to explain specific topics. s were applied to explain specific topics. +
|
Motivations for organizing training |
Activists have been using ICT to express t … Activists have been using ICT to express their opinions both individually on the causes that they care about and organizationally for their campaigns in the most possible ways, especially with the emerging of social media platforms in the last decade. Women and LGBTIQ persons, although significantly less in number, are also increasingly taking advantage of ICT.
ICT especially social media has proven effective in amplifying our voices as activists. But will all the advantages we gain, also come ‘new’ threats along with that: privacy violation, surveillance, online harassment and violence, online threats and even arrest under the country’s cyber law.
Although both men and women (activists) become target of those threats, women and LGBTIQ persons are more targeted. Because besides the general threats that men received online. Women and LGBTIQ are being attacked more often and on the basis of their gender and sexualities, such as body shaming, slut calling, and even rape threats.
To address the aforementioned problems, there is an urgent need for women and LGBTIQ activists to understand that while using the technology they also need to understand the threats and how to deal with it. This was the major reason why this FemHack and digital security training were being conducted. al security training were being conducted. +
|
START | Start looking for opportunities to spread the knowledge and skills on the issues through trainings or public discussions/events. Start collaborating with as many activists as possible. + |
STOP | Stop waiting for organizations to come and ask for training. I should be more proactive in approaching individuals to collaborate with, so that they can be the champions on the issues in their organizations/collective and in the movement. + |
Start when | 23 May 2015 + |
Title of the activity | Feminist Hackathon and Digital Security Training For Women & LGBTIQ Activist in Indonesia + |
Topics addressed | Privacy & Anonymity, Online Violence Against Women & LGBT, Hands-on digital security training (strong password/keepass, circumvention/TOR, secure mail & PGP, OTR messaging, social media security strategy, basic mobile security) + |
Where is located the activity | Jakarta, Indonesia + |
Who organize it | Dhyta Caturani and PurpleCode Collective + |
Categories | Activities , Pages with a map rendered by the Maps extension |
Modification date This property is a special property in this wiki.
|
14 July 2015 16:13:51 + |
hide properties that link here |
No properties link to this page. |