Special

Search by property

This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.

Search by property

A list of values that have the property "Detailed schedule and contents" assigned.

Showing below up to 15 results starting with #101.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)


    

List of results

  • The training was divided in three parts. D
    The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information. During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders.
    nd use veracrypt to encrypt their folders.  +
  • The workshop consisted of the use of encrypted email, encrypted instant messaging, anonymous surfing with Tails and use of VPN. And a monitoring process for two months.  +
  • This session will last two hours and its p
    This session will last two hours and its principal aims are to brainstorm together in order to imagine how we can build regional networks for tackling tech-related violence and create networks of support and solidarity. This entrails from thinking what type of training and curricula such networks would required in order to blossom, but also what could be their needs in relation to autonomous infrastructure, low tech and/or privacy and security oriented tools of communication. We will try to make the best of the time we have in our hands, this is why we would ask you to think about one good example of community/network of support (does not have to be gender oriented) and to carefully think about it is successful (impact, resilience, sustainability, etc). The workshop will be participative and we hope that ideas and exchanges that will take place during the session will inspire all of us in our own practices. Brainstorm about how practices taking place in those networks could be boosted in our own training activities to privacy and digital security? How do we transform training in seeds for change inside regional territories? What are the basic elements for a training to create a network of support that remains over time? (hotline, information on time when under attack, psychosocial counseling at distance, regional and local aspects of tech-related violence and tactics to mitigate and overcome it, etc.) Which dimensions should be taken into account for an appropriate curricula and training methodologies that would have those objectives in mind? Are they any requirements in relation to collective and participants which are trained? What should be the technical infrastructure? Etc Quick round of introduction people in the room: By families maybe (gender, holistic, training, tech development, documentation, etc To be decided) – 10 mins maximum Presentation and introduction should not take more than 20 mins In order to make the most of the session, we will work in 4 or 5 small groups (between 4 or 5 persons) around a common guideline and will then share all together – 30 to 45 mins Put in common: 20 mins / Debate and synthesis: 20 mins
    : 20 mins / Debate and synthesis: 20 mins  +
  • Through the event, the participants attend
    Through the event, the participants attended different sessions distributed in the following big topics: digital security, security in mobiles, privacy, data politics, gender and technology, replication and training. They were developed across the following sessions: - Digital security: basic concepts about security, how to take control of the browser, malware’s attacks, server’s attacks, web hosting, anonymity, encryption, TOR, TAILS and deep web. - Mobile security: Understand infrastructure and mobiles, security and privacy settings for mobiles, telephony alternatives with VOIP. - Data politics: Metadata, create and protect databases, free mapping processes, technology sovereignty, collective memory. - Campaigns: Creative uses of social media, planning of campaign considering privacy and security, search engine optimization, push profiles of land right defenders under risk, hate speech and feminist counter-speech. - Holistic security: Technology in demonstrations, documenting violence, preparing an event or training in an unknown context, emotions and addictions using social media. And at the end of the day there were two labs that people could attend: the feminist hackerspace and the self-care lab. We noticed that many of the participants went to the hackerspace, even when that activity was not required for the institute. It shows us that digital security, privacy and self-learning are activities that they understand are relevant for their own work. Some of them didn’t have any previous experience with free software and privacy tools, but they were looking to learn about this options and use them as soon as they could. In the self-care lab, one facilitator was providing methodologies to deal with stress and anxiety as well as to learn to relax and ground in front of fear and trauma. She provided a space to share methods of collective and individual care. About the schedule, the first day we worked with all the participants to clarify the goals of the GTI, the shared agreements, media protocols and documentation, as well as all important logistic information. There was also a symbolic action to begin the institute and connect between all of us. In the afternoon the participants shared in small groups about knowledge that comes from their ancestors and their first memories of technology as well as how their relationship with technology has been influenced by their gender as well as other intersectional dimensions like geographic origin, social class, access to education, opportunities to education and so on. Based on those conversations we moved on into a first collective session about what integral security means, detailing many areas that can be protected as well as strategies of mitigation that exist. The participants shared some of their security strategies linking the relationship between physical integrity, digital security and psychosocial well-being. The last session allowed us all to visibilize the diversity of knowledge and security practices that the participants and their networks already have. It also let us see that the participants were already applying security practices that we also use in digital environments, strategies known like “fortification”, “reduction”, “obfuscation” and "compartmentalization". That first day allowed the participants to understand that technologies are diverse and broad and that ancestral technologies are valuable technical knowledge that we need to reclaim, showing how all of them have an expert relationship with many technical knowledges. It also allowed us to all of us to start from a shared vocabulary as well as to have a better understanding of the diversity of contexts, challenges and strategies. About the schedule during the GTI, it usually was 3 different sessions in parallel that allowed the participants to find the session that better accommodate their interests. All the sessions were facilitated by 2 or 3 facilitators and one additional person was taking notes. Finally, all the facilitators were meeting at the end of the day to evaluate how everything went, what was the evaluation of their sessions by the participants and which changes they needed to implement the next day. The last day was designed for the participants to have strategical conversations about topics they needed to go deep in. And at the end we had a closing session where we discussed next steps after the GTI, which activities, trainings, or facilitations they were planning, how they wanted to keep in touch and how to manage the documentation of the sessions. The next steps will be to create a mailing list for participants, share reviewed documentation, update the curricula as well as to create this document. We will also do a follow up of each participant to understand which are the trainings and awareness raising activities they are planning in their own networks and communities, and see what is the best way that we can support their efforts.
    est way that we can support their efforts.  +
  • Throughout this event, participants were i
    Throughout this event, participants were involved in different tracks such as digital security, mobiles security, politics of data, gender and technology and training which were complemented with three different labs. Each track encompassed the following sessions: - Digital Security: Security basics, Browser control, Malware attacks, Server attacks and hosting solutions, Anonymity, Encryption, TAILS and Deep web. - Mobiles security: Understanding of infrastructure and mobiles, Security and privacy configuration for mobiles, Alternatives for telephony over VOIP. - Politics of data: Metadata, Criteria for selecting and developing apps, Creating and protecting databases, SEO and positioning your contents. - Gender and technology: Creative uses of social networks, Feminist campaigning taking into account privacy and security, Reporting and documenting gender based online violence, Hacking hate speech, Big data and sexual surveillance. - Training skills: ADIDS for education to technologies, Create safe spaces. Besides those sessions, there were three labs at the end of the day that people could attend: the feminist hackerspace, a science fiction lab and a self care lab. We can note that lots of participants engaged in the hackerspace even if it was not a mandatory activity. It shows that digital security and privacy are concepts that they understood as relevant for their activity. Some didn't have any experience with free software and privacy tools before, but they were clearly in search for learning and using immediately or as soon as possible those in their routines. The other most attended lab was the self care one where the facilitator provided methodologies for dealing with stress and anxiety, how to relax and rebalance when facing fear and trauma, and provided space for exchanging on methods for collective and individual self care. The science fiction lab was also attended by some participants during the first two days but was dropped in the last two days as participants felt it was more urgent to attend the hackerspace or the self care lab. Anyhow it enabled to work on the issue of creativity and how to develop methodologies that easy the process of collective creation of imaginaries, narratives and desires in relation to our technologies and activisms.
    elation to our technologies and activisms.  +
  • Topics include How Internet Works, History of Internet from global to Philippines context, Risk Assessment, Managing Identities Online, Building Strategies to counter online gender-based violence and mobile security.  +
  • Viernes – 07 de diciembre Hora Actividad R
    Viernes – 07 de diciembre Hora Actividad Responsable Materiales 12h30 Llegada y almuerzo en Hostal Casa Kolping CEDHU 14h00-14h30 Bienvenida al curso, presentación de objetivos del módulo y explicación de temas logísticos. CEDHU Presentación de lxs participantes y equipo de facilitación. Reglas durante el taller. CEDHU 14h30-16h00 Recuento del módulo anterior y revisión de tareas Facilitadora: CEDHU Presentación de resultados del trabajo con las herramientas cartográficas usadas el módulo III Facilitadora: CEDHU 16h00-18h00 Presentación de herramientas jurídicas: Derechos colectivos y mecanismos de exigibilidad Facilitadora: Nathy Yépez 18h00-19h00 Cena Casa Kolping Sábado 08 de diciembre Hora Actividad Metodología Responsable 7:30 – 8:30 Desayuno 8:45 – 9:00 Inicio Dinámicas de inicio jornada Jorge 9:00 – 9:15 Presentación de taller comunicación Facilitadoras dan la bienvenida Presentación de agenda – taller Jorge 9:15 – 9:30 Presentación grupal Cada persona hace una presentación corta:
nombre, de qué organización, comunidad viene, qué actividad realiza y qué comida le gusta. Jorge 9:30 – 9:45 Establecimiento de acuerdos Escribimos en un papelote los acuerdos a los que llegamos para el taller a partir de dos preguntas generadoras. ¿Qué quiero aprender en el taller? ¿Qué saber puedo compartir en el taller? Jorge 9:45 – 10:30 El Árbol Vital: Comunicar como defensor de Derechos Humanos y de la Naturaleza Ejercicio de reconocimiento como defensor/a Este árbol soy yo Ahora vamos a dibujar en la cartulina A4 el árbol que encontramos en nuestro paseo imaginario. En el tronco del árbol escribamos nuestro nombre. A continuación relacionamos cada parte del árbol con nuestra vida comunitaria, así: La Raíz, Hojas, Flores, Frutos Jorge 10:30 11:00 Plenaria JOrge 11:00 11:30 Lluvia de ideas Se pide a los y las participantes que realicen una lluvia de ideas con pocas palabras sobre la palabra comunicación y que la escriban en una cartulina. Cada uno deberá leer su cartulina al grupo y pagarla en el papelote. Jorge 11:30 – 11:45 Trabajo de cooperación, dialogo y organización Ejercicio de organización por grupos de la torre de sorbetes Jorge 11:45 12:45 ¿Qué quiero comunicar? Mapa de la comunicación y defensa del territorio Se organizan en grupos a partir de su cercanía territorial. Cada grupo deberá dibujar un mapa donde represente a su comunidad, organización, barrio, ciudad. (se dividen por regiones) JOrge 12:45 – 13:00 Plenaria Plenaria sobre dialogo y construcción colectiva Jorge 13:00 – 14:00 Almuerzo Barriga llena corazón contento Módulo IV, Segunda parte: Protección y Seguridad para defensoras y defensores del territorio. Seguridad Digital: telefonía celular e internet. Hora Actividad Metodología Responsable 14:00 – 14:10 Introducción al Análisis de Riesgos y la protección integral Breve introducción al enfoque integral de la protección a defensoras. En trabajo en grupos (los mismos que en la mañana) se deben contestar preguntas en un papelografo. Maka 14:10 – 14:20 Mapa de Actividades - ¿Cuáles son todas las actividades de defensa y promoción de los derechos humanos que realiza la defensora y/o su organización? ¿Algunas son más riesgosas? ¿Los riesgos son de ataques a nuestra integridad física y digital o también emocional y riesgos por desgaste? Maka 14:20 – 14:30 Análisis de contexto ¿Cuál es el contexto económico, político, jurídico, social en el que nos desempeñamos? ¿Existen actores agresores que no sean actores estatales? Califica el contexto psicosocial: ¿existe temor, miedo, frustración social por un contexto de violencia política? ¿Cómo impacta en la labor? Maka 14:30 – 14:40 Mapa de Actores ¿Quién son los actores susceptibles de atacarnos por nuestra labor? ¿Qué tan fuertes y amplias son nuestras alianzas con actores a nivel local, estatal, nacional e internacional? ¿Cuál es la cadena de mando? ¿Existe manera de incidir en ellos? ¿Qué actores tienen más o menos poder? ¿De qué manera se pueden movilizar lox aliadxs? ¿Qué apoyo podrían brindar? Maka 14:40 – 15:00 Identificar riesgos Incidente de Seguridad Un evento fuera de lo común que afecta a la seguridad física, digital y/o emocional de la defensora y/o de su familia, organización, entorno. Amenaza Una amenaza es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. No todos los incidentes de seguridad son amenazas, pero todas las amenazas son incidentes de seguridad. Ataque Un ataque es un incidente de seguridad que tiene un impacto alto en la integridad física, digital y/o emocional de la defensora, y del cual recuperarse es más difícil. El ataque es directamente dirigido en contra de la persona defensora o su familia o aliados estratégicos. Maka 15:00 – 15:30 Diseño de planes de protección digital Planes de prevención y mitigación poniendo énfasis en la comunicación y el bienestar colectivo. Maka 15:30 – 17:00 Herramientas de seguridad digital ¿Cómo funciona la telefonía celular e Internet? Maka 17:00-18:00 Comunicación móvil Conocer nuestro celular, revisar la configuración de cuentas Googles y conocer algunas aplicaciones seguras de comunicación Maka Domingo 9 de Diciembre Hora Actividad Metodología Responsable 8:00 – 9:00 Continuidad Herramientas de mensajería Cuáles son los criterios para escoger una aplicación de mensajería segura Maka 9:00 – 10:00 Correo Seguro Cómo funciona el correo electrónico Maka 10:00 – 11:00 Contraseñas seguras Cuáles son los criterios para crear una contraseña segura Maka 11:00 – 12:00 Evaluación y preguntas Cierre CEDHU
    12:00 Evaluación y preguntas Cierre CEDHU  +
  • Vimos los básicos: contraseñas seguras, co
    Vimos los básicos: contraseñas seguras, correo seguro, como compartir archivos de manera segura, como usar las herramientas de documentos compartidos seguros, como guardar información. Por otro lado celulares, uso de aplicaciones seguras, signal y telegrama chat secreto.
    seguras, signal y telegrama chat secreto.  +
  • Voces de Mujeres (Women's Voices) was a 3
    Voces de Mujeres (Women's Voices) was a 3 days training on multimedia production with WHRD in Amecameca, Estado de Mexico. During this 3 days we covered: Narrative - How to tell a story How to conduct an ethic and secure interview Video, photo, text and audio production Digital security: How the Internet works? - What do we use Internet for? - What type of information do we exchange through Internet? - Exercise with the cards: giving each person a card (router, computer, ISP, Google..) - Looking at the risks - What could go wrong on each stage? - What can we do or which tools can we use to solve this? - Questions
    we use to solve this? - Questions  +
  • We began with stories. Personal and collec
    We began with stories. Personal and collective stories of our struggles that form as bookmarks and knots to the long thread of feminist organising and movement building in issues as diverse as queer rights in Aceh, to sex work in Uganda, funding women's rights organisations in Georgia, and building autonomous feminist internet radio networks in Brazil. We brought artefacts from our movements – photographs, posters, publications, stickers, protest banners, anti-surveillance toolkits, bottles of healing elixirs and more – and threaded our stories through them. How we became involved, why this mattered, how we lost people whom we were loving inspired by and through that, building relationships of care and solidarity, and how our presence and action ruptured the normality of discrimination. This was important not just to locate ourselves in our collective history of movement building, but to also to recognise that we've got this. That as a movement, or as movements, we have encountered innumerable challenges and worked together in different ways to figure things out and respond with shared political commitment. To also know that we have much to build from, and that this is a moment in a long trajectory of feminist organising in creative and resilient ways all over the world. And that memory is resistance, especially when our histories and contribution have been and are actively being rendered invisible. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. The act of recalling, of naming, is to also make visible our claim in shaping the world we are in. Discourse as a site of activism Digitally networked technologies have seeded and enabled the proliferation of feminist expression in multiple spaces, from online journals to podcasts, digital archives, the humble comments section, digital storytelling projects, social media engagement and more. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. There were many activists at the MFI who were engaged in content and discourse related initiatives, such as the Kohl Journal that surfaces critical analysis on gender and sexuality in the MENA region, Skin Stories that provides deep reflection on the many dimensions of disabilities and sexuality in India, and Bnt Al Masarwa, an independent feminist band that transformed conversations with women across three villages in Egypt into lyrics that provoke further conversation. This does not yet include the many people present who engage on social media as a political site of their everyday activism in pushing back against patriarchal discourse and norms, and face serious and critical backlash in response. This has contributed to the most stubborn and invisible quadrant of change in the classic framework of how change happens: that of culture and norms, and in behaviour, thoughts and attitudes. Yet, women's movements tend to instrumentalise our engagement with digitally networked technologies. There is an approach of “using social media to reach out to more people,” instead of seeing it as a space of activism in and of itself. Perhaps this is understandable due to the milestones achieved in engagement with policy and legal reform in recent decades, but in an age of unprecedented circulation of information, discourse, visuals and knowledge – there is a need to reimagine and understand better discourse as a site of activism, in and of itself, and its potential for deep transformative change. Constellation of actors, leadership & accountability In particular, discourse as a site for activism is important to also see new and emerging actors who are part of feminist organising, but remain outside of the more familiar format of organisations. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. The internet and its capacity for anonymity and distance has also enabled actors who are diffident of visibility for various reasons (e.g. risk, introverts etc) to participate actively and expressively in organising for change. Some of them are content creators, some are social media activists, some are part of interest-driven collectives, some are feminist techies, and some are what I like to call “free radicals” - nodes that connect between formal organising and informal networks who act as key bridge builders and interlocutors of different actors and different spaces. This is significant for several reasons. First, to appreciate the actual breadth and diversity of the movement. Even as there are valid concerns about the sustainability of organisations in terms of new leadership, it is both pivotal and reassuring the recognise that the movement is in fact, much more diverse and broader than imagined. This brings with it some key questions compel attention as we think through how to contribute to building stronger movements. For example, the backlash and attacks that are being faced by those who agitate patriarchy with feminist narratives in the public-private domain online. Without a recognition and an effort to forge connections, we are coming up short in our efforts at solidarity and resilience. Another question is on leadership and accountability, where we have placed our investment on this, and the challenges that arise from it. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. We have thought through and provided for this through the model of institutions. But where we have different and informal lines of accountability to each other through shared political commitment, there is a discernible lacuna. Much of this is being taken up online, by individuals and collectives, that brings with it both possibilities and challenges. One instance is on addressing sexual harassment in the movement – a conversation that is currently alive and having the potency of upturning the quiet toxic culture of sexualised power in our everyday engagement. How do we think through accountability in a movement where there is a diversity in terms of constellation of actors and how we relate to each other? Who do we see as leaders and custodians of the principles that matter to us in our work for change? And is it possible to reframe the question of intergenerational leadership to one that is perhaps more about intersection of actors, spaces and ways of organising? Documentation of MFI meeting 2017, Malaysia. Museum of Movements, photograph by Fungai Machirori Pace, sustainability and ways of organising Another cluster of issues discussed at the convening was on the pace and sustainability of our organising. This is relevant not just in terms of resource mobilisation – although facets for consideration of that are many, ranging from supporting actors who are involved in informal ways of organising, to greater restrictions placed by the state to funds that can be received by NGOs – but also in terms of the rhythms of our movement. There appears to be campaigns, protests and threats in rapid succession, creating a hectic cadence that result in several things. One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. Another is rendering moments of abeyances invisible. The everyday labour of organising that happens in the in-between times. What do we see, and not, in our activism? In an age where internet technologies run on the logic capital of visibility and eyeballs, how are we resisting this by reclaiming our pace, and privileging the everyday work, and the people who do them? How does the everyday work look like in the evolving and nebulous ecosystem of our movements in a digital age? One is burn out and an increasing sense of fatigue that requires serious consideration as we reflect on what it means to practice the politics of self and collective care. It was also recognised that the steps in which we understood movement building to happen is no longer as clear and linear (perception of injustice > leadership > critical analysis > building shared political agenda > organising & building constituency > identify actions, strategies & priorities > act for change > visibility/backlash > gains > analysis > expansion of membership base). While this may have always been true to an extent, the distribution of leadership, actors and ways of organising enabled through digitally networked relationships and sites of organising have troubled this in significant ways. In particular, the building of a shared political agenda and the development of strategies and actions. This is happening at multiple sites, through the leadership of multiple nodes, that may or may not be in relationship with each other. A visible conversation online could be the start, rather than an outcome, of taking action for change and the building of a constituency. Perhaps what is more important than consideration of which steps come first, is the shifting terrain of each component. One is the notion of constituency in a digital age. This was discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. Access to what kind of internet was a key issue at the MFI. Recognising that access is not just about connectivity and devices, but also skills, online communications culture and dominant languages played a role in terms of who can be seen, heard and included in particular moments in the movement. This conversation had many complex layers – from thinking about current disparity in internet access between and within geographical locations and people; to the commodification of our narratives and political actions as we rely on privatised online spaces for our organising; to the need to think about feminist digital infrastructures not just as technical responses, but a response that subverts the current logic capital of technology and access; to the ability of multiple connections and the forging of global political solidarities; as well as enabling muted voices within feminist movements as well as in the larger public to find kin and amplify their realities. We discussed in terms of the more familiar question of who is representing whom, particularly in unstructured formats that lie outside of institutional structures, as well as the critical question of access to the internet. What became evident to me throughout the four days, is also the need for an exchange of movement building skills, capacities and strategies that can integrate lessons and questions from onground and online organising. On how we understand leadership, accountability, constituency building, representation, issues, ways of organising, sites of activism, pace, change and impact. Breaking the binary: Feminist Principles of the Internet Perhaps the most important point of conversation at the MFI was the urgent need to break the binary between what is perceived as online and onground. Rather than see them as distinct, to understand the flow and impact between one and the other, and where embodiment lies as a site of this intersection. This is not just in terms of the ways in which we recognise and understand the shape and form of our movements, but also the intersection of issues that we need to take into account as we continue in our work to critically analyse power structures towards imagining transformative futures. The collectively developed Feminist Principle of the Internet can act as a seed and a framework for the conversation. To recognise that first, feminists and women's movements have always been part of the history of the internet for social justice and change, and have played a pivotal role in its development. And that we need to apply a feminist lens of deconstructing power in understanding and engaging with an increasingly digitally networked world. From issues of access, to expression, the economy, governance, embodiment and public participation. And when we begin the conversation with our political framework, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future. When we begin the conversation with our political framework of feminism, and grounded through the diverse realities of our contexts, then we locate ourselves as critical stakeholders, articulators, shapers, dreamers and political actors of our unfolding past, present and future.
    of our unfolding past, present and future.  +
  • We have a number of questions we would lik
    We have a number of questions we would like to address through this newer line of work and these will inform the framing of the session: What can and cannot be learned about online harassment through the approaches, tools, and responses we've developed globally in response to harassment faced by women? What do we know about the contexts and shapes of harassment faced by different communities/groups of people marginalised because of their religion, ethnicity, gender identity or race? Is it problematic to think about harassment along identity categories? What might it afford us, what in turn prevent? What are the spaces and forms that identity-based harassment takes (f.ex. Reddit threads, Twitter abuse, images, memes, fanfiction)? How is online hate speech and harassment directed at specific religious, ethnic, linguistic, or political communities experienced? How might an intersectional lens affect our working definition of online harassment? How does expanding our focus beyond women affect our thinking about responses to online harassment (f.ex. in terms of design, tools, policy, research methodologies, activism, etc.)? We see this session as an opportunity for discussion and reflection, and to contribute to an agenda that is more specific and contextual with respect to responding to targeted online attacks. We invite people working on online harassment, advocates of freedom of expression and participation online, those working on human rights, as well as interested technologists, activists, and researchers to attend this session. We especially welcome civil society organisations based in Brussels. This session will consist of an introductory presentation to frame the issues and the terms of the debate, a plenary brainstorming session to collaboratively identify further relevant topics/question around online harassment, breakout group discussions, and conclude with a plenary discussion to consolidate the outcomes of our work as a group.
    idate the outcomes of our work as a group.  +
  • Workshop for a grassroot organization in t
    Workshop for a grassroot organization in the North Sierra of Puebla (Mexico) The workshop was held in a village about an hour from the capital Puebla, it took place in a center to teach and learn crafts with mud that also counts with a computer room. The computers were installed with Windows and the Internet connection was only working if there was no more than two computers connected at the same time (sounds familiar? ;-). Most of the attendees brought their personal computers with Windows but there was also two persons using Ubuntu. About 12 people attended, mostly men aged between 19 years - 60 years. The level of education and occupation was variable. The workshop gave an introduction to technopolitical aspects of surveillance, digital security and digital tools. The possibility of using TAILS was discussed and I brought some USB installed with me but we did not have enough time to work on that topic. The workshop consisted in mail encryption using Thunderbird and Enigmail. It took place on Saturday, which is the most appropriate day for the community and lasted from 10AM to 6 PM with an hour break for lunch.
    10AM to 6 PM with an hour break for lunch.  +
  • You can read about the evaluation and agenda of the GTI in Ecuador here: https://gendersec.tacticaltech.org/wiki/images/7/72/Documentacion_Evaluacion_IGT.pdf The document is available in Spanish so far.  +
  • http://www.journalismfestival.com/programme/2016  +
  • la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.  +