<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Digital_security_for_Women%2C_Bosnia</id>
		<title>Digital security for Women, Bosnia - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Digital_security_for_Women%2C_Bosnia"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_Women,_Bosnia&amp;action=history"/>
		<updated>2026-05-12T21:26:00Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_Women,_Bosnia&amp;diff=6180&amp;oldid=prev</id>
		<title>Alex at 14:22, 6 January 2016</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_Women,_Bosnia&amp;diff=6180&amp;oldid=prev"/>
				<updated>2016-01-06T14:22:12Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 14:22, 6 January 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l5&quot; &gt;Line 5:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 5:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|End when ?=2015/12/08&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|End when ?=2015/12/08&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Where is located the activity ?=Bosnia-Herzegovina&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Where is located the activity ?=Bosnia-Herzegovina&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Geo-localization of the activity ?=43.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;87466602681492&lt;/del&gt;, 18.&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;298095613718033&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Geo-localization of the activity ?=43.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;874666026815&lt;/ins&gt;, 18.&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;298095613718&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Who organize it=Gender and tech organisation&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|Who organize it=Gender and tech organisation&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|For whom is it organized=Young women interested in gender social justice, feminism, privacy and digital security&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;|For whom is it organized=Young women interested in gender social justice, feminism, privacy and digital security&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_Women,_Bosnia&amp;diff=6149&amp;oldid=prev</id>
		<title>Alex: Created page with &quot;{{Activities |Title of the activity=Digital security for Women, Bosnia |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2015/12/05 |End when ?=2015/...&quot;</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_for_Women,_Bosnia&amp;diff=6149&amp;oldid=prev"/>
				<updated>2015-12-09T09:45:21Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Activities |Title of the activity=Digital security for Women, Bosnia |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start when ?=2015/12/05 |End when ?=2015/...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security for Women, Bosnia&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2015/12/05&lt;br /&gt;
|End when ?=2015/12/08&lt;br /&gt;
|Where is located the activity ?=Bosnia-Herzegovina&lt;br /&gt;
|Geo-localization of the activity ?=43.87466602681492, 18.298095613718033&lt;br /&gt;
|Who organize it=Gender and tech organisation&lt;br /&gt;
|For whom is it organized=Young women interested in gender social justice, feminism, privacy and digital security&lt;br /&gt;
|How many people trained=17&lt;br /&gt;
|Motivations for organizing training=Cyberbullying and online harassment are used massively worldwide to control, manipulate, build up fear and ultimately remove girls and women and non-conforming transgender individuals from online spaces, whether we talk about gaming world or political campaigns run by female politician, the rules of unbalanced power relations between men and women in the offline world, remain and amplify in the virtual one. Sadly, but not surprisingly, Bosnia and Herzegovina is keeping up with this „trend“ too. Institutional reaction in terms of protection are slow and almost not existent. This year we intend to integrate the learning of the tools with the thinking and planning of coordinated response to attacks.&lt;br /&gt;
&lt;br /&gt;
Starting from this year experience of the attacks on #takebackthetech, and of similar attack against Balkan activists and groups we intend to go one step further and while continuing to provide capacity to individuals start the conversation of new practices of concerted online solidarity and response groups, envisioning a solidarity network that can support the victim during the attack and generate reverse positive content.&lt;br /&gt;
&lt;br /&gt;
One of the most efficient and successful activities that we have been conducting for past 5 years are digital security trainings for girls, women leaders and women's rights organisations in Bosnia and Herzegovina. Trainings on privacy and security online are a big eye-opener for girls and women and lead to actual changes in the way they think about their own security and how they should use technology and Internet accordingly in their daily lives, professionally and personally.&lt;br /&gt;
|Topics addressed=Information Communication Technologies (ICT), Sexuality, Violence against Girls and Women, online harassment, feminisms, privacy, digital security&lt;br /&gt;
|Links about the activity=Articles, videos, photos on-line, ...&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents='''Day one''' &lt;br /&gt;
HouseRules and Shared Agreements &lt;br /&gt;
Round what is your name and how do you feel?&lt;br /&gt;
&lt;br /&gt;
SESSION 1ː&lt;br /&gt;
Speedgeeking:&lt;br /&gt;
1. go to the person that is across and share what is your superpower? (group of 2) &lt;br /&gt;
2. go to the person you dont know and talk about what are you passionate about (group of 3)&lt;br /&gt;
3. say somethingthat nobody knows about you (or u think so)  – 5 minutes, 2 people(NO NEED TO REPORT BACK)&lt;br /&gt;
&lt;br /&gt;
Agenda Hacking  (post it)&lt;br /&gt;
What are your interests, in relation to:&lt;br /&gt;
1. Tools and Apps,  2. Problem-Challenge, 3. Issue, 4. Devices, 5. Social media or means of communications&lt;br /&gt;
&lt;br /&gt;
SESSION 2 ː &lt;br /&gt;
My Cyber Body &lt;br /&gt;
Q: Your first memory of technology (write down year/your age/what was it) + when did you begin to actively use ICT and for which reasons (write down context and motivations) + could you underline if you enjoy it/your pleasure in tech, and/or if it was a forced and stressful relationship with tech?&lt;br /&gt;
&lt;br /&gt;
Work in groups of 3 – share your personal stories and mark donw commonalities and differences, decide what do you want to report back to the whole group? No names, but we want to hear your story&lt;br /&gt;
&lt;br /&gt;
Risk analysis exercise&lt;br /&gt;
Group Association of ideas around safety/security &lt;br /&gt;
&lt;br /&gt;
Individual exercise: Your daily routine (10/15 mins)&lt;br /&gt;
Put in a paper your daily routine&lt;br /&gt;
&amp;gt; When you wake up, and the rituals you have to start the day (where are you, who are you with...)&lt;br /&gt;
&amp;gt; When you leave your home and where you go first. What do you take with you (e.g. mobile phones, handbags,...) - be sure to include that.&lt;br /&gt;
&amp;gt; Where do you go - what does the journey look like? Who else is there?&lt;br /&gt;
Think about where you are when you're working. Who are you working with? &amp;gt; What devices are you using, if any?&lt;br /&gt;
&amp;gt; Do you eat or relax during the day?&lt;br /&gt;
&amp;gt; How do you get home? Or what do you do before you go home?&lt;br /&gt;
&amp;gt; What do you do in the evenings? When do you sleep? &lt;br /&gt;
&lt;br /&gt;
Now add information about the ICT/Tech in your map (10/15 mins)&lt;br /&gt;
&amp;gt; What kind of data do you produce/manage/move offline and online?&lt;br /&gt;
&amp;gt; Where is this data? (do you keep personal/professional/activist data together)?&lt;br /&gt;
&amp;gt; How sensitive is this data (from a work/activist/privacy perspective)&lt;br /&gt;
Does it imply personal data about others?&lt;br /&gt;
&amp;gt; Are you sharing your device (mobile/computer) or your accounts (email/social media/etc) with another person (family, partner, colleagues etc)?&lt;br /&gt;
&amp;gt; How do you deal with this data when you are traveling (to do a training/other purposes?)&lt;br /&gt;
&amp;gt; Do you have back up of those data? Have you lost sensitive data before? How did that happen? (device or online account get compromised? )&lt;br /&gt;
&amp;gt; How do you build trust in relation to your data and how you store it?&lt;br /&gt;
&lt;br /&gt;
Report to the group about elements of safety and threats you realised about&lt;br /&gt;
&lt;br /&gt;
SESSION 3ː&lt;br /&gt;
Spectogram: &lt;br /&gt;
1. Revolution is not possible witout feminism&lt;br /&gt;
2. Harasser hide  behind fake names&lt;br /&gt;
3. Pornography harms women&lt;br /&gt;
Create your own statements for spectogram (3 groups of 5 plus one – 5 min)&lt;br /&gt;
&lt;br /&gt;
BARBIE session - understanding how tech is engendered / From barbie computer engineer to Hello Barbie. &lt;br /&gt;
&lt;br /&gt;
Pleasure and privacy: Gender Matrix meets Feminist Principles of the internet &lt;br /&gt;
Individual exercise: How would you translate those elements into your own reality?&lt;br /&gt;
&lt;br /&gt;
SESSION 4ː &lt;br /&gt;
WALL OF FAME:&lt;br /&gt;
Celebration of the contribution of women to tech and other important area for all of us ;-)&lt;br /&gt;
&lt;br /&gt;
'''DAY 2'''&lt;br /&gt;
&lt;br /&gt;
9:30-9:45    Morning Circle&lt;br /&gt;
9:45-10:45   Feminist principles of internet&lt;br /&gt;
10:45-11:00  Break&lt;br /&gt;
11:00-13:00  How the internet works? TOR, circumvention&lt;br /&gt;
13:00-14:00  Lunch&lt;br /&gt;
14:00-15:30  Digital Hygiene:  Anti virus , Back Up, Passwords &lt;br /&gt;
15:30-15:45  Break &lt;br /&gt;
15:45-17:30  Tech Bazaar &lt;br /&gt;
After the break, setting is different 4 tables x 4 girls will go before or after the break depending on time and participants questions &lt;br /&gt;
&lt;br /&gt;
4 stations: &lt;br /&gt;
1st round&lt;br /&gt;
1. File Encryption (30 min)-Alex&lt;br /&gt;
2. E-mail Encryption (30 min)-Gillo&lt;br /&gt;
2nd Round&lt;br /&gt;
3. Chat Encrytion (15 min)&lt;br /&gt;
4. Mobile Encryption (15 min) (iphone and android: surespot/chatsecure)&lt;br /&gt;
&lt;br /&gt;
17:30 - 18:00 Closing of the day&lt;br /&gt;
&lt;br /&gt;
'''DAY 3'''&lt;br /&gt;
&lt;br /&gt;
 9:30 / 10:00 - Introduction/morning circle&lt;br /&gt;
10:00 / 11:30 - Session 1 &lt;br /&gt;
Introduction to history of social networks and social media - going through basic notions of social networs and social networking platforms, terms of service (read the small print)&lt;br /&gt;
Understanding your digital traces and digital shadow - people will assess their digital shadow using different platforms such as my shadow&lt;br /&gt;
Self-doxing - what means doxing and which methodologies can help you to understand what information exists about you on the internet. Participants group in three teams and investigate three profiles which have volunteer (people from the facilitators team), they have 20 minutes to find as much information as possible, then they present to the rest of te group waht they found. &lt;br /&gt;
&lt;br /&gt;
Break&lt;br /&gt;
&lt;br /&gt;
Creating profiles (anonymous/pseudonymous/collective name)and strategies online. Participants team up in three groups and need to develop a campaign in a context where members of the collective want to hide their real name and still make their message ressonate on different platforms. One group will make a strategy to open a campaign in facebook and will list privacy and security dimensions they need to take into account in that specific platform. Another group does the same using a blog, the last group develop a strategy on snapchat and instagram. &lt;br /&gt;
They have 30 minutes to develop the strategy and present the security and privacy dimension they should take into account to remain safe. &lt;br /&gt;
&lt;br /&gt;
 13:30 / 14:30 - Lunch&lt;br /&gt;
&lt;br /&gt;
Privacy and security settings (FB, Twitter, others by participants)&lt;br /&gt;
Gender-based online violence VS feminist campaigns&lt;br /&gt;
We share about what is online harassment, our perspectives and experiences of it and what is the current situation in bosnia. The  we share about current succesful and inspiring campaigns. &lt;br /&gt;
&lt;br /&gt;
17:00 Closure - Closing circle and Evaluation&lt;br /&gt;
|Methodologies for training='''DAY 1'''&lt;br /&gt;
&lt;br /&gt;
SESSION 1 - Intro/Speedgeeking&lt;br /&gt;
https://en.wikipedia.org/wiki/Speed_geeking&lt;br /&gt;
&lt;br /&gt;
SESSION 2 - My cyber body&lt;br /&gt;
https://www.coursera.org/ (free online courses Higher Education)&lt;br /&gt;
&lt;br /&gt;
SESSION 3 - Barbie&lt;br /&gt;
Feminist Hacker Barbie&lt;br /&gt;
https://computer-engineer-barbie.herokuapp.com/&lt;br /&gt;
Fair Use Barbie: Changing the narrative &amp;amp; the legality of remix&lt;br /&gt;
http://caseyfiesler.com/2014/11/24/fair-use-barbie/&lt;br /&gt;
http://www.tampabay.com/news/business/retail/privacy-advocates-try-to-keep-hello-barbie-from-hitting-shelves/2220896&lt;br /&gt;
What does Barbie says:&lt;br /&gt;
http://hellobarbiefaq.mattel.com/wp-content/uploads/2015/11/hellobarbie-lines-v2.pdf&lt;br /&gt;
Campaign against Hello Barbie:&lt;br /&gt;
http://www.commercialfreechildhood.org/action/hell-no-barbie-8-reasons-leave-hello-barbie-shelf&lt;br /&gt;
Hacking Hello Barbie:&lt;br /&gt;
http://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children&lt;br /&gt;
&lt;br /&gt;
Pleasure and Privacy&lt;br /&gt;
The online terrain for women’s rights&lt;br /&gt;
https://www.giswatch.org/en/report-introduction/online-terrain-women-s-rights&lt;br /&gt;
Gender at Work Matrix&lt;br /&gt;
http://www.genderatwork.org/OurWork/OurApproach/GWFramework.aspx&lt;br /&gt;
&lt;br /&gt;
SESSION 4 - Wall of fame &lt;br /&gt;
Time to come out!: Pioneering women in history of technology&lt;br /&gt;
http://www.genderit.org/feminist-talk/time-come-out-pioneering-women-history-technology&lt;br /&gt;
From string theory to clothes wringers: A historical map of women shaping science and technology&lt;br /&gt;
http://www.genderit.org/resources/string-theory-clothes-wringers-historical-map-women-shaping-science-and-technology&lt;br /&gt;
The computers (ENIAC PROGRAMMERS PROJECT)&lt;br /&gt;
http://eniacprogrammers.org/&lt;br /&gt;
&lt;br /&gt;
Lelacoders, interviews with women hackers (spanish, englis, catalan):&lt;br /&gt;
https://vimeo.com/user8966514&lt;br /&gt;
online group:https://n-1.cc/g/donestech+lelacoders&lt;br /&gt;
&lt;br /&gt;
Animation about the HerStory in Sciences and Computer Sciences:&lt;br /&gt;
https://vimeo.com/107858829&lt;br /&gt;
&lt;br /&gt;
'''DAY 2'''&lt;br /&gt;
&lt;br /&gt;
SESSION 1 - Feminist Principle of the internetː&lt;br /&gt;
http://www.genderit.org/articles/feminist-principles-internet&lt;br /&gt;
http://www.genderit.org/sites/default/upload/fpi_v3.pdf&lt;br /&gt;
http://zenskaposla.ba/content/feministicki-principi-interneta (bhs prevod)&lt;br /&gt;
&lt;br /&gt;
How technology issues impact women’s rights: 10 points on Section J&lt;br /&gt;
http://www.genderit.org/articles/how-technology-issues-impact-women-s-rights-10-points-section-j&lt;br /&gt;
&lt;br /&gt;
Zašto je feminizam važan za internet&lt;br /&gt;
http://oneworldplatform.net/category/zenska-prava/page/2/&lt;br /&gt;
Why feminism matters to Internet?&lt;br /&gt;
http://oneworldplatform.net/en/why-feminism-matters-to-internet/&lt;br /&gt;
In the continuum of privacy and data&lt;br /&gt;
http://hvale.me/2015/01/in-the-continuum-of-privacy-and-data/&lt;br /&gt;
A feminist internet and its reflection on privacy, security, policy and violence against Women&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/A_feminist_internet_and_its_reflection_on_privacy,_security,_policy_and_violence_against_Women&lt;br /&gt;
2013 - Women's rights, gender and ICTs&lt;br /&gt;
https://www.giswatch.org/2013-womens-rights-gender-and-icts&lt;br /&gt;
2015 - Sexual rights and the internet&lt;br /&gt;
https://www.giswatch.org/2015-sexual-rights-and-internet&lt;br /&gt;
&lt;br /&gt;
SESSION 2 &lt;br /&gt;
&lt;br /&gt;
WHAT IS NSA? https://en.wikipedia.org/wiki/National_Security_Agency&lt;br /&gt;
WHAT IS TOR AND WHAT IS TOR PROJECT? https://www.torproject.org/&lt;br /&gt;
Virtual rasicm campaign - http://www.racismovirtual.com.br/&lt;br /&gt;
&lt;br /&gt;
Session 4 - Tech bazar&lt;br /&gt;
&lt;br /&gt;
Antivirus sessionː&lt;br /&gt;
Visualiation malware: https://cybermap.kaspersky.com/&lt;br /&gt;
&lt;br /&gt;
Folder and devices encryption (Veracrypt):&lt;br /&gt;
How to Create and Use a VeraCrypt Container:&lt;br /&gt;
https://veracrypt.codeplex.com/wikipage?title=Beginner%27s%20Tutorial&lt;br /&gt;
Hidden volumes with Veracrypt:&lt;br /&gt;
https://veracrypt.codeplex.com/wikipage?title=Hidden%20Volume&lt;br /&gt;
Protect hidden volumes from damage:&lt;br /&gt;
https://veracrypt.codeplex.com/wikipage?title=Protection%20of%20Hidden%20Volumes&lt;br /&gt;
&lt;br /&gt;
'''DAY 3'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual&lt;br /&gt;
https://donottrack-doc.com/en/intro/&lt;br /&gt;
http://digitalshadow.com/&lt;br /&gt;
https://myshadow.org/lost-in-small-print/&lt;br /&gt;
https://myshadow.org/trace-my-shadow&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Self-doxing&lt;br /&gt;
&lt;br /&gt;
Session Doxxing - Self doxxing &lt;br /&gt;
&lt;br /&gt;
https://startpage.com/&lt;br /&gt;
https://duckduckgo.com/&lt;br /&gt;
http://www.whois-search.com/&lt;br /&gt;
http://yacy.net/en/index.html&lt;br /&gt;
&lt;br /&gt;
Searching for information using a post or discussion:&lt;br /&gt;
http://omgili.com/&lt;br /&gt;
&lt;br /&gt;
Searching for information using an image:&lt;br /&gt;
https://tineye.com&lt;br /&gt;
&lt;br /&gt;
Bosnia specific&lt;br /&gt;
https://www.bhtelecom.ba/imenik.html&lt;br /&gt;
http://www.europronet.ba/imenik/index.php/imenik/fizickalica&lt;br /&gt;
http://www.hteronet.ba/telefonski-imenik&lt;br /&gt;
http://www.telemach.ba/Privatni+korisnici/980/Telefonski+imenik.shtml&lt;br /&gt;
http://www.mtel.ba/single-article/879&lt;br /&gt;
&lt;br /&gt;
Looking for profile(s) of (a) person(s):                         &lt;br /&gt;
Check Usernames: http://checkusernames.com/&lt;br /&gt;
Lullar: http://com.lullar.com&lt;br /&gt;
Peek You: http://www.peekyou.com&lt;br /&gt;
Pipl:https://pipl.com/&lt;br /&gt;
Recorded Future: https://www.recordedfuture.com/&lt;br /&gt;
Social Mention: http://socialmention.com/&lt;br /&gt;
WebMii: http://webmii.com/&lt;br /&gt;
Whos Talkin: http://www.whostalkin.com/&lt;br /&gt;
&lt;br /&gt;
Domain tools /Who is?&lt;br /&gt;
http://www.faqs.org/rfcs/rfc1834.html&lt;br /&gt;
http://www.faqs.org/rfcs/rfc954.html&lt;br /&gt;
&lt;br /&gt;
Europe&lt;br /&gt;
http://www.archivesportaleurope.net/directory&lt;br /&gt;
http://www.wayp.com/eng/europa3.shtml&lt;br /&gt;
|Existing toolkits and resources=Ženskaposla.ba (feminist portal)&lt;br /&gt;
http://zenskaposla.ba/&lt;br /&gt;
&lt;br /&gt;
TakeBackTheTech campaing&lt;br /&gt;
https://www.takebackthetech.net/&lt;br /&gt;
Safety Road map&lt;br /&gt;
https://www.takebackthetech.net/know-more&lt;br /&gt;
&lt;br /&gt;
GenderIt - Changing the way you see ICT (feminist reflections on interent policies&lt;br /&gt;
http://www.genderit.org/&lt;br /&gt;
&lt;br /&gt;
ICTs for Feminist Movement Building: Activist Toolkit&lt;br /&gt;
https://www.apc.org/en/pubs/icts-feminist-movement-building-activist-toolkit&lt;br /&gt;
&lt;br /&gt;
One World Platform&lt;br /&gt;
http://oneworldplatform.net/&lt;br /&gt;
&lt;br /&gt;
APC - Association for Progressive Communication&lt;br /&gt;
https://www.apc.org/&lt;br /&gt;
&lt;br /&gt;
Privacy and digital security -&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Security in a box:&lt;br /&gt;
https://securityinabox.org/&lt;br /&gt;
&lt;br /&gt;
Me and my shadow:&lt;br /&gt;
https://myshadow.org/trace-my-shadow&lt;br /&gt;
&lt;br /&gt;
Gender and technology Institute: &lt;br /&gt;
http://tacticaltech.org/genderandtechnologyinstitute&lt;br /&gt;
&lt;br /&gt;
Manual for social media + safe spaces with gender perspective&lt;br /&gt;
ttc.io/zenmanual&lt;br /&gt;
&lt;br /&gt;
Manuals for security and privacy with a gender perspective:&lt;br /&gt;
https://gendersec.tacticaltech.org/wiki/index.php/Manuals_with_a_gender_perspective&lt;br /&gt;
&lt;br /&gt;
Public digital libraries:&lt;br /&gt;
https://www.memoryoftheworld.org/blog/2014/11/06/a-public-library-of-my-own/&lt;br /&gt;
&lt;br /&gt;
Feminist public library:&lt;br /&gt;
http://feminism.memoryoftheworld.org/&lt;br /&gt;
&lt;br /&gt;
Documentary Donestech, women and tech (spanish sub eng):&lt;br /&gt;
https://www.youtube.com/watch?time_continue=37&amp;amp;v=KTaxQZbcL1g&lt;br /&gt;
&lt;br /&gt;
Install Calibre for viewing, organising, transforming ebooks (like the calibre feminist you have in your USB key)ː http://calibre-ebook.com/&lt;br /&gt;
|Gender and tech tutorials used=Gender Tech Herstory Exhibition, Gender Tech Personal Memories, Hands On How the internet works, Hands On Understanding the group – Spectrogram, Holistic security - A day in your life, Holistic Security - Demonstrating the interconnectedness, Threat analysis - Information Mapping I, Threat analysis - Information Mapping II,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=The participants were very heterogeneous and provide a lot of diversity and richness in the room. They bound a lot among them because in general they felt alone in relation to their interests in technology and gender-related topics. They felt they had meet new friends and were eager to stay in touch.&lt;br /&gt;
During the evening sessions we screen a documentary on internet meme culture and in the second day we had a small party where we play collective games. That worked very well and participants were happy to see facilitators joining them. We also provided them with an USB key with SIAB selected software and also documentation such as guides on security with a gender perspective (zen manual among others) and participants appreciate that material a lot. &lt;br /&gt;
&lt;br /&gt;
Finally, we felt that the rhythm and pace of the agenda worked very well as the first day we concentrate more on the links between gender, feminism and technology enabling the participants to share about their own personal experience. On the second day we concentrate more on notions around anonymity, circumvention and encryption going then to hands on session on a selection of tools. The third day we address in-depth social media platforms as participants were all very intensive users of those and were not aware of many of their privacy and security flaws. By treating them as experts of those platforms and enabling them to pull together their own tactics, they realise that they knew a lot and could develop strategies to make their voices heard without exposing their real identity. That was felt as a very empowering moment.&lt;br /&gt;
|Feedbacks=Review of participants evaluation showed that all participants felt this training had empowered them and enable them to better understand links between gender, feminism, tech related violence, privacy and digital security.&lt;br /&gt;
|START=Screening related documentaries in the evening.&lt;br /&gt;
|STOP=Training to enigmail.&lt;br /&gt;
|KEEP=First memories about something technological.&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Alex</name></author>	</entry>

	</feed>