Resources
From Gender and Tech Resources
Revision as of 14:34, 25 May 2015 by Helen (Talk | contribs) (→Introduction: What does it mean to include gender into privacy and security?)
Zen and the art of making your tech work for you
Including Gender into privacy and security
Welcome to this wiki that will be edited in the next three weeks and turn into an awesome many hands, brains and hearts crafted manual. This is a roadmap FROM FIRE TO DESIRE TO INSPIRE.
Read more about how to add contents to this manual here
Contents
Introduction: What does it mean to include gender into privacy and security?
Who: Alexandra, Valentina, Nuria
------------------ Including gender in privacy and digital security 1. Context and distance travelled 2. Acknowledging gender roles and Violence Against Women along the technological cycle (From production of technologies; Access, Uptake and development; Governance of Internet and ICT; end of life of technologies) 3. Shifting from exclusion and discrimination processes (inclusion and self-inclusion of women in ICT and the opportunities this brings for all) 4. Adopting an intersectional and integrated (holistic) approach to privacy and digital security 5. A feminist internet and its reflection on policy, violence against Women, privacy and digital security 6. Safe Spaces as Feminist Practices (Relationship between Offline and Online, what are Safe Spaces, Safe Space Online?) 7. Building Online Safe Space for you and your collectives/organizations (Netiquette, Feminist Principles of the Internet, Why are these principles important?)
-----------------------------
Aims:
- Show existing links between privacy and security from a gender and inter-sectional approach
- Convince WHRD and LGTBI activists that privacy and security consists of different but interconnected elements (ie physical, digital and well-being)
- Support and empower WHRD and LGTBI to adopt better privacy and security behaviors by knowing methods, processes and liberating technologies
- Provide arguments, methodologies and examples to get the buy in from their organisations/communities to adopt integrated approaches which include gender into privacy and security
- Understanding the different type of gaps into technology access, uptake, use and development
- Shifting paradigm from exclusion to self-inclusion
Step 0: Mapping your data and devices
Length: 6 pages
Who: Alex, Marte (4)
Aims:
- Assessing privacy and security risks requires first to understand what should be protected
- Better management of data and devices from a physical and psycho-social well being perspective
Step 1: Understanding and managing your digital shadow
(Floriana, Jillian, Faith)
Step 1 1 1. Knowing our digital shadow and the traces we leave in the internet 1.1 Understanding our digital shadow 1.2 What is a digital shadow? 1.3 Why are these data collected? 1.4 Exploring our own digital shadow 1.5 Strategies of obfuscating our digital shadow 1.6 Hiding parts of our content and metadata 1.7 Self-Doxing 1.8 Social domains: Our several small-world networks 1.9 Can we change our identities and our digital past? 2 2. Assessing risks and potentials: how to choose which online identity fits our purpose 2.1 "Real" or virtual identity? 2.2 Strategies for separating identities online 2.3 Persistent Pseudonymity 2.4 Collective Identity 3 3. Securing and anonymizing our connections 3.1 Securing our identities 3.2 Creating and using strong passwords 3.3 Anonymizing tools 3.3.1 VPN: accessing the web through an encrypted tunnel 3.3.2 Torbrowser: anonymous web browsing 4 4. Creating a new online identity 4.1 Virtual suicide? 4.2 Disposable email and mail aliases 4.3 What’s in a name? 4.4 Writing our own story 4.5 Creating a site of one’s own 4.6 A credible persona 5 5. Managing multiple online identities 5.1 A different profile for each persona 5.2 Managing our identities on social networks 5.3 Alternative social networks 5.4 Collective virtual personas 5.5 Managing collective identities... or simple collective accounts 5.6 Crabgrass: a social network for managing groups 6 6. A different machine for each identity 6.1 Tails: a live system that leaves no traces 6.2 Security by isolation: Qubes OS 6.3 Tails, Whonix, Qubes OS: how to choose
----------------------
Aims:
- Understanding digital shadow and metadata
- Awareness on risks and empowering potential of online identities (using real names, pseudonyms, collective names and anonymity)
- Creating new online identities
- Managing various online identities
Step 2: Building safe spaces
Length: 22 pages
Who: Sophie, Faith (4), Paula (4)
Aims:
- Becoming a moderator well aware of fundamentals of net-etiquette and how to contribute to the creation and enforcement of social rules within online communities
- Understanding how to build Safe spaces online and offline
- Gaining knowledge on process and methodologies to “reclaim” and maintain yourself and your collective into “hostile” spaces
- Become aware of current initiatives and processes that can be replicated in your community, organization, collective in order to become a safer space
Conclusions
Aims:
- Understanding major current challenges in relation to privacy and security posed by commercial and governmental agents managing our information infrastructure
- Assessing how a technology is a liberating and empowering one for women and LGTBQ activists
- Becoming aware of not for profit, citizen alternatives for OS, hardware, data hosting and ISP
- Learning to pay attention and shape with your allies, organization, community your own communication infrastructure to minimize risks of being surveilled, shut down and/or censored.