Difference between revisions of "Lilith2"
From Gender and Tech Resources
m (→Mindmaps and mindsets) |
m (→Mindmaps and mindsets) |
||
Line 17: | Line 17: | ||
== Mindmaps and mindsets == | == Mindmaps and mindsets == | ||
− | If a mindmap is a cognitive "hathanger" then a mindset are the clothes hanging on the hathanger. Most traditions have mindmaps that have been and are evolving locally from the experiences of the previous generations on what worked and what didn't for them. Afaik, the oldest mindmaps use trees and wheels. And all mindmaps are generalisations in the wind without grounding details if not from there. The petty tyrants map is useful for gathering and interpreting data from narratives, questioning and timelines into a framework of possible threats | + | If a mindmap is a cognitive "hathanger" then a mindset are the clothes hanging on the hathanger. Most traditions have mindmaps that have been and are evolving locally from the experiences of the previous generations on what worked and what didn't for them. Afaik, the oldest mindmaps use trees and wheels. And all mindmaps are generalisations in the wind without grounding details if not from there. The adversary grouping of the petty tyrants map is useful for gathering and interpreting data from narratives, questioning and timelines into a framework of possible threats. |
=== Threat modeling === | === Threat modeling === |
Revision as of 21:18, 22 July 2015
Contents
Narratives
All of us, without exception, believe a mix of truth and misinformation, and often enough, disinformation. We strive to understand the world as it is, and not how it looks only according to our preconceptions, which are shaped by a multitude of forces, embedded as we are in our cultural matrix. Sometimes, the most unlikely seeming explanation turns out to be the correct one. In a warrior mindset we consider alternative views, but question everything.
Asking for details from ones own cultural matrix is not enough. Not even close. One needs to eat the local food, drink the water, breathe the air, listen to the stories, smell the earth, feel the bark of the trees, see local peoples, and experience local ways to catch what can only be described as a mere glimpse of the answer 42, the knowledge hidden in the trees and wheels in that specific locality on this beautiful planet.
People and communities use stories to understand the world and our place in it. These stories are embedded with power - the power to explain and justify the status quo as well as the power to make change imaginable and urgent. A narrative analysis of power encourages us to ask: Which stories define cultural norms? Where did these stories come from? Whose stories were ignored or erased to create these norms? And, most urgently, what new stories can we tell to help create the world we desire? [1]
Humour
Timelines
Mindmaps and mindsets
If a mindmap is a cognitive "hathanger" then a mindset are the clothes hanging on the hathanger. Most traditions have mindmaps that have been and are evolving locally from the experiences of the previous generations on what worked and what didn't for them. Afaik, the oldest mindmaps use trees and wheels. And all mindmaps are generalisations in the wind without grounding details if not from there. The adversary grouping of the petty tyrants map is useful for gathering and interpreting data from narratives, questioning and timelines into a framework of possible threats.
Threat modeling
Linux
Autonomy
- Autonomy patterns
- Autonomous collectives
Methodologies, processes and choreographies
Most processes are adapted to allow for minimalist approaches and to minimalise the risk of unintentionally becoming the petty tyrants we fight [2].
Threat modeling
- Threat modeling the quick and dirty way
- Threats, detection, protection and (counter) moves (food for gut)
- Scenario planning (food for thought)
Linux
Consensus processes that work
Edge
Unexpected forms of logic
Social engineering
Linux
Controlled folly
Standing on a hilltop in a thunderstorm on bare feet, wearing wet copper armour, holding a lightning rod and shouting ... bring it on, ye gods and godesses!
We use lawful techniques and tools. And if need be we invent new (GNU and creative commons licensed) techniques and tools [3].
Getting started with linux
- Installing linux
- Linux applications
- Linux security
- Kinky linux command-line
- Anonymising your traffic with linux
- Clean up all the things
- Shell scripting
- Encrypt everything
Hack to learn
Social engineering
Autonomy shaping infrastructure
Setting up servers
- Installing a linux server
- Linux server applications
- Linux server services
- Linux server security
- Linux home servers
- Dynamic DNS
- Onionland
- Garlicland
Communication
Community owned, user controlled.
- Radio
- Libraries
- Meshnets
- Clusternets
Solidarity network
References
- ↑ Harnessing the power of narrative for social change https://www.newtactics.org/conversation/change-story-harnessing-power-narrative-social-change
- ↑ Portal 2 Soundtrack Cara Mia (Turret Opera) One Hour https://www.youtube.com/watch?v=wFKfkfCeFj4
- ↑ Portal - 'Still Alive' https://www.youtube.com/watch?v=Y6ljFaKRTrI