User

Difference between revisions of "Lilith2"

From Gender and Tech Resources

m (Mindmaps and mindsets)
m (Mindmaps and mindsets)
Line 12: Line 12:
 
* [[Petty tyrants]] - contains pages on analysis and further investigation of several narratives organised by way of the "petty tyrant" mindmap. The “petty tyrants” are mentioned in The Fire Within <ref />: A petty tyrant is a tormentor. Someone who either holds the power of life and death over warriors or simply annoys them to distraction. Petty tyrants can teach us detachment.  
 
* [[Petty tyrants]] - contains pages on analysis and further investigation of several narratives organised by way of the "petty tyrant" mindmap. The “petty tyrants” are mentioned in The Fire Within <ref />: A petty tyrant is a tormentor. Someone who either holds the power of life and death over warriors or simply annoys them to distraction. Petty tyrants can teach us detachment.  
 
* [[captivating capital and copyfighting|Captivating capital and copyfighting]] - Patent and copyright laws support the expansion of the range of creative  human activities that can be commodified, paralleling the ways in which capitalism is leading to the commodification of many aspects of social life that before were not considered to have monetary or economic value.
 
* [[captivating capital and copyfighting|Captivating capital and copyfighting]] - Patent and copyright laws support the expansion of the range of creative  human activities that can be commodified, paralleling the ways in which capitalism is leading to the commodification of many aspects of social life that before were not considered to have monetary or economic value.
* [[Threats, detection, protection and (counter) moves]] is a page listing theoretical defenses and detection methods for selected groups of leaked surveillance programs and services. This is just a thought experiment covering (theoretical) defenses against these attacks and not intended to spread fear, uncertainty or doubt about surveillance states. Due to the age and limited scope of the leaked documents and what we are up against <ref><nowiki><ref>Cryptome: Communications privacy folly http://cryptome.org/2012/06/comms-folly.htm</nowiki><br>
+
* [[Digital threats, detection, protection and (counter) moves]] is a page listing theoretical defenses and detection methods for selected groups of leaked surveillance programs and services. This is just a thought experiment covering (theoretical) defenses against these attacks and not intended to spread fear, uncertainty or doubt about surveillance states. Due to the age and limited scope of the leaked documents and what we are up against <ref><nowiki><ref>Cryptome: Communications privacy folly http://cryptome.org/2012/06/comms-folly.htm</nowiki><br>
 
<nowiki></ref></nowiki></ref>, the defenses mentioned in these tables should not be relied upon for protection and I make no guarantees to their accuracy. You need to do research in your own environment as to what new developments are and make informed decisions knowing it is impossible to be completely safe. Things move incredibly fast in this arena and I will update these tables when more is found and/or theorised.
 
<nowiki></ref></nowiki></ref>, the defenses mentioned in these tables should not be relied upon for protection and I make no guarantees to their accuracy. You need to do research in your own environment as to what new developments are and make informed decisions knowing it is impossible to be completely safe. Things move incredibly fast in this arena and I will update these tables when more is found and/or theorised.
 
* [[Underminers]] gives a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.
 
* [[Underminers]] gives a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.

Revision as of 09:38, 6 June 2015

Narratives

People and communities use stories to understand the world and our place in it. These stories are embedded with power - the power to explain and justify the status quo as well as the power to make change imaginable and urgent. A narrative analysis of power encourages us to ask: Which stories define cultural norms? Where did these stories come from? Whose stories were ignored or erased to create these norms? And, most urgently, what new stories can we tell to help create the world we desire? [1]

Mindmaps and mindsets

If a mindmap is a cognitive "hathanger" then a mindset are the clothes hanging on the hathanger. Most traditions have mindmaps that have been and are evolving locally from the experiences of the previous generations on what worked and what didn't for them. Afaik, the oldest mindmaps use trees and wheels. And all mindmaps are generalisations in the wind without grounding details if not from there. Asking for details from ones own cultural matrix is not enough. Not even close. One needs to eat the local food, drink the water, breathe the air, listen to the stories, smell the earth, feel the bark of the trees, see local peoples, and experience local ways to catch what can only be described as a mere glimpse of the answer 42, the knowledge hidden in the trees and wheels in that specific locality on this beautiful planet.

  • All of us, without exception, believe a mix of truth and misinformation, and often enough, disinformation. We strive to understand the world as it is, and not how it looks only according to our preconceptions, which are shaped by a multitude of forces, embedded as we are in our cultural matrix. Sometimes, the most unlikely seeming explanation turns out to be the correct one. In a warrior mindset we consider alternative views, but question everything.
  • Petty tyrants - contains pages on analysis and further investigation of several narratives organised by way of the "petty tyrant" mindmap. The “petty tyrants” are mentioned in The Fire Within Cite error: Invalid <ref> tag;

refs with no content must have a name: A petty tyrant is a tormentor. Someone who either holds the power of life and death over warriors or simply annoys them to distraction. Petty tyrants can teach us detachment.

  • Captivating capital and copyfighting - Patent and copyright laws support the expansion of the range of creative human activities that can be commodified, paralleling the ways in which capitalism is leading to the commodification of many aspects of social life that before were not considered to have monetary or economic value.
  • Digital threats, detection, protection and (counter) moves is a page listing theoretical defenses and detection methods for selected groups of leaked surveillance programs and services. This is just a thought experiment covering (theoretical) defenses against these attacks and not intended to spread fear, uncertainty or doubt about surveillance states. Due to the age and limited scope of the leaked documents and what we are up against [2]</nowiki></ref>, the defenses mentioned in these tables should not be relied upon for protection and I make no guarantees to their accuracy. You need to do research in your own environment as to what new developments are and make informed decisions knowing it is impossible to be completely safe. Things move incredibly fast in this arena and I will update these tables when more is found and/or theorised.
  • Underminers gives a highly practical approach to the process of undermining in all its many hues. At once entertaining, shocking and inspiring, Underminers draws on the author’s own experience dealing at first hand with the lies of the industrial machine, and that of a wide range of other people who have their own unique take on the swath of topics covered in the book.

Methodologies, processes and choreographies

Most processes are adapted to allow for minimalist approaches and to minimalise the risk of becoming the petty tyrants we fight.

Unexpected forms of logic

  • All senses and common sense
  • Non-linear time
  • Roleplay and controlled folly
  • Confusing surveillance systems

Sisters arming themselves with linux

We use lawful techniques and tools. And if need be we invent new (GNU and creative commons licensed) techniques and tools [3].

Linux

  • Shopping for a linux distro
  • Installing linux tips & tricks
  • Installing a stripped debian (running *only* what you need)
  • Making your own images

Kinky linux commandline

  • Command Line Culture (CLI)
  • Getting started
  • Working with files
  • Input/Output redirection
  • Regular expressions
  • Network connections
  • Process management (job control)
  • Shell scripting
  • Network connections
  • Reconnaissance
  • Reverse engineering
  • Network exploitation and monitoring

Linux security

  • Turning camera off
  • Turning microphone off
  • Managing passwords
  • Learning to use a firewall
  • Safer browsing
  • ...
  • Implementing an encryption strategy (see Threat modeling the quick and dirty way)
  • Further hardening
  • Maintaining integrity of your system

Anonymising

  • Liberté Linux, Tails, Whonix, Freepto, which one will work for me?
  • Liberté Linux, Tails, Whonix, Freepto: security notes

Autonomy shaping infrastructure

  • Using server auctions
  • Setting up a linux server
  • Server security
  • ...

References

  1. Harnessing the power of narrative for social change https://www.newtactics.org/conversation/change-story-harnessing-power-narrative-social-change
  2. <ref>Cryptome: Communications privacy folly http://cryptome.org/2012/06/comms-folly.htm
    </span> </li> <li id="cite_note-3"><span class="mw-cite-backlink">[[#cite_ref-3|↑]]</span> <span class="reference-text">Portal - 'Still Alive' https://www.youtube.com/watch?v=Y6ljFaKRTrI</span> </li> </ol>
.