Difference between revisions of "Manuals with a gender perspective"

From Gender and Tech Resources

 
(87 intermediate revisions by 4 users not shown)
Line 1: Line 1:
This HowTo focuses on one hand in criteria we should take into account when drafting manuals about privacy and digital security from a gender perspective. On the other hand it aims at listing collectives and organisations working on the production of manuals and to list available ones.  
+
This HowTo is still largely Work In Progress.
  
'''Before producing a new manual some questions you should ask yourself'''
+
A list of manuals about privacy and digital security from a gender perspective
  
* Don't reinvent the wheelǃ Are you duplicating upstream work?
+
== Manuals produced by collectives/organisations ==
* If a similar manual is already availableː Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
+
 
* Who's the public & what are the objectives ? What are their security & technical levels?
+
* '''Access Now - 'A first look at Digital Security''''
* Will your manual will be more about tools and how to configure those, or will it be more about threat modeling and/or behavioral processes?
+
 
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
+
Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.  
+
 
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal withː correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
+
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License
* How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?  
+
 
* Will you provide further support to the readers such as a contact mail or a hotline?
+
Languageː English
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved" ?
+
 
 +
We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.
 +
 
 +
* '''Access Now - 'Digital Security Helpline Community Documentation''''
 +
 
 +
Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html
 +
 
 +
Licenseː  (CC BY 3.0 US) 2019 Access Now.
 +
 
 +
Languageː English
 +
 
 +
In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.
 +
 
 +
* '''Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género'''
 +
 
 +
Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf
 +
 
 +
Licenseː  ?
 +
 
 +
Languageː Castellano
 +
 
 +
Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe.
 +
La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.
 +
 
 +
* '''Ancestra - 'Guía de recursos digitales para mujeres rurales''''
 +
 
 +
Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/
 +
 
 +
Licenseː Licencia Creative Commons Atribución Compartir Igual 2.5 Colombia
 +
 
 +
Languageː Castellano
 +
 
 +
Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.
 +
 
 +
Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.
 +
 
 +
* '''Aluna Acompañamiento Psicosocial y Jass Mesoamérica'''
 +
 
 +
Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf
 +
 
 +
Licenseː  ?
 +
 
 +
Languageː Castellano
 +
 
 +
Esta publicacion  recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y
 +
experiencias.
  
'''List of collectives and organisations achieving privacy and security manuals with a gender perspective'''
+
A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder
 +
continuar construyendo caminos de resistencia y esperanza.
  
 
* '''Association for Progressive Communications - 'Take back the tech''''  
 
* '''Association for Progressive Communications - 'Take back the tech''''  
Line 30: Line 76:
 
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]
 
- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː [http://www.justassociates.org/sites/justassociates.org/files/icts_toolkit_2015.pdf ICTs for Feminist Movement Building: Activist Toolkit]
  
* '''Chayn.org - 'Stay safe''''
+
How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity?  How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?
  
Linkː http://chayn.co/tools/
+
* '''Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno''''
 +
 
 +
Linkː https://akelarreciberfeminista.noblogs.org/category/kits/
 +
 
 +
https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf
 +
 
 +
https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf
 +
 
 +
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional
 +
 
 +
Languageː Spanish
 +
 
 +
Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.
 +
 
 +
* '''Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas'''
 +
 
 +
Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf
 +
 
 +
Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial
 +
 
 +
Languageː Spanish
 +
 
 +
Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia
 +
 
 +
* '''Chayn.org - 'Do It Yourself Online Safety''''
 +
 
 +
Linkː http://chayn.co/safety/
  
 
Licenseː Creative Commons Attribution 4.0 license
 
Licenseː Creative Commons Attribution 4.0 license
  
Languageː English
+
Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.
  
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. We are also a pro bono service to charities who work with vulnerable women.
+
CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms.  This guide can be useful irrespective of your gender, location or situation.
  
 
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.
 
- [http://chayn.co/how-to-build-your-own-case/ How to build your own domestic violence case without a lawyer] is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.
- In the next months they will release the manual 'How Someone Can Track You Online And Offline – And What You Can Do About It' that deals with issues faced by women that face stalking and invasion of privacy by abusers. The guide addresses how to avoid being tracked online and offline (http://chayn.co/staying-safe/).
 
  
*  '''CommunityRED - '9 Ways to Dodge Trolls: A Feminist’s Guide to Digital Security''''
+
* '''Ciberfeministas Guatemala''''
 +
 
 +
Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)
 +
 
 +
Licenseː Copyleft
 +
 
 +
Languageː Spanish
 +
 
 +
[http://www.ciberfeministas.or.gt/fanzines-libres/ Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos], como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la  Privacidad,  Violencia machista en línea,  Ciberactivismo feminista,  Empoderamiento de las mujeres a través de las TIC, Acoso callejero.
 +
 
 +
* '''Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES''''
 +
 
 +
Linkː https://archive.org/details/guiaautodefensatelefonos
 +
 
 +
Licenseː Copyleft
 +
 
 +
Languageː Spanish
 +
 
 +
Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs
 +
que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs.
 +
Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos.
 +
 
 +
* ''' Ciberseguras'''
 +
 
 +
Linkː https://ciberseguras.org/
 +
 
 +
Licenseː CC BY
 +
 
 +
Languageː Spanish
 +
 
 +
Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas. 
 +
Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).
 +
 
 +
* '''Coding Rights - Send nudes''''
 +
 
 +
Linkː http://www.codingrights.org/send-nudes/
 +
 
 +
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
 +
 
 +
Languageː Brasilian, English
 +
 
 +
Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.
 +
 
 +
* '''Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!''''
  
Linkː https://medium.com/thelist/9-ways-to-dodge-trolls-a-feminists-guide-to-digital-security-471f66b98c79
+
Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8
 +
https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66
 +
https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985
  
 
Licenseː ?
 
Licenseː ?
  
Languageː English
+
Languageː English, Spanish, Portuguese
  
This short manual offer to those feminists or allies who dare to publish any troll-life-ruining content a few ways to protect yourselves. Based on what I’ve read, your threat model looks a lot like mine when I worked on Mexican drug cartels and wanted to hide my location for fear of physical reprisals — against which I had little to no legal or political recourse.  
+
Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.
 +
 
 +
* '''Coding Rights - Chupadados'''
 +
 
 +
Linkː https://chupadados.codingrights.org/
 +
 
 +
Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
 +
 
 +
Languageː Brasilian, Spanish
 +
 
 +
Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan?
 +
[https://chupadados.codingrights.org/es/menstruapps-como-transformar-sua-menstruacao-em-dinheiro-para-os-outros/ Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual], aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no?
 +
 
 +
* '''Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista''''
 +
 
 +
Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf
 +
 
 +
Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.
 +
 
 +
Languageː  Spanish
 +
 
 +
En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”.  Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento.
 +
 
 +
* '''CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?'''
 +
 
 +
Linkː https://temboinalinha.org/index.html
 +
 
 +
Licenseː  Creative Commons Attribution NonCommercial 4.0 International License
 +
 
 +
Languageː Portuguese
 +
 
 +
Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas.
 +
Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência.
 +
Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.
 +
 
 +
* '''Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE''''
 +
 
 +
Linkː https://www.cybercivilrights.org/online-removal/
 +
 
 +
Licenseː  Copyright
 +
 
 +
Languageː English
  
 +
At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.
  
* '''Crash Override network - 'So You’ve Been Doxed: A Guide to Best Practices''''  
+
* '''Crash Override network - 'Various''''  
  
 
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices
 
Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices
  
Licenseː
+
Licenseː Not specified
  
 
Languageː English
 
Languageː English
Line 64: Line 222:
 
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.
 
This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.
  
* '''Donestech.net - 'Comic Lela''''  
+
Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here.
 +
Link: http://www.crashoverridenetwork.com/preventingdoxing.html
 +
 
 +
Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it.
 +
Link: http://www.crashoverridenetwork.com/familyandpolice.html
 +
 
 +
So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.
 +
Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html
 +
 
 +
* '''Cyborg Feministas - Recursos''''
 +
 
 +
Linkː https://cyborgfeminista.tedic.org/inicio/recursos/
 +
 
 +
Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional
 +
 
 +
Languageː Spanish
 +
 
 +
Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta;  Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines
 +
 
 +
* '''Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment''''
 +
 
 +
Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf
 +
 
 +
Licenseː Creative Commons Attribution 3.0 Unported license.
 +
 
 +
Languageː English
 +
 
 +
Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.
 +
 
 +
This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.
 +
 
 +
The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.
 +
 
 +
* '''Digital Rights Foundation - 'The art of digital security for pakistani women''''
 +
 
 +
Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf
 +
 
 +
Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.
 +
 
 +
Languageː English, Urdu
 +
 
 +
This  guidebook has been specially made for Pakistani women and is available in Urdu and English.
 +
 
 +
* '''Donestech.net - 'KIT contra les violències masclistes on-line''''
 +
 
 +
Linkː
 +
Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf
 +
Spa: https://donestech.net/files/kitviolencies2019_cast.pdf
 +
 
 +
Licenseː Creative Commons Attribution - Share Alike - No Commercial
 +
 
 +
Languageː Catalan, Spanish
 +
 
 +
Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.
 +
 
 +
Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.
 +
 
 +
* '''Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line''''
 +
 
 +
Linkː https://donestech.net/files/redessociales.pdf
 +
 
 +
Licenseː Creative Commons Attribution - Share Alike - No Commercial
 +
 
 +
Languageː Spanish
 +
 
 +
Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física.  Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas.
 +
 
 +
Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.
 +
 
 +
* '''Donestech.net - 'Various''''  
  
 
Linkː http://donestech.net/
 
Linkː http://donestech.net/
Line 72: Line 299:
 
Languageː Spanish, Catalan, English
 
Languageː Spanish, Catalan, English
  
- Comic Lela
+
- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)
  
- Kit de formacion Genero, Tic y Activismoː  
+
- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)
  
- Gui didactica per a la formacion en perspectiva de genere i interculturalitat
+
- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)
  
* '''Electronic Frontier Foundation - 'Self Defense Guide''''
+
Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.
  
Linkː https://ssd.eff.org/
+
* '''Feminist Frequency - Countering Online Harassment Safety and Support Guide''''
  
Licenseː Creative Commons Attribution
+
Linkː https://onlinesafety.feministfrequency.com/
  
Languageː English, Spanish, French, Polish, Turkish, Portuguese, Urdu
+
Licenseː ?
  
Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices. The toolkit counts with playlists oriented at different profiles such as journalists, activists or LGTBQ youth that enables to contextualise knowledge and tools presented to the specific threats they could be facing.
+
Languageː English, Spanish, Arabic
  
* '''FemTechNet - 'Addressing anti-feminist violence online''''
+
This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.
  
Linkː http://dmlcompetition.net/proposals/addressing-anti-feminist-violence-online/
+
* '''FemTechNet - 'Center for solutions to online violence''''
  
Licenseː ?
+
Linkː http://femtechnet.org/csov/
 +
 
 +
Licenseː Not specified
  
 
Languageː English  
 
Languageː English  
  
This project is housed at the Arizona State University and is being currently developed by the network of feminist academics [http://femtechnet.org/ FemTechNet] to support women that experiences harassment online to respond. The central focus of this proposal is the development of educational and informational resources that will enable educators and advocates to ensure that connected learning and engagement can proceed even in the face of hostility and harassment. Connected learning breaks down if feminists and women of all ages feel unsafe in digital spaces; we can’t end online harassment, but we can ensure that everyone has the tools necessary to maximize the safety of learners and their data.  
+
The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence
 +
 
 +
* '''Fight Cyberstalking''''
 +
 
 +
Linkː https://www.fightcyberstalking.org
 +
 
 +
Licenseː  Copyright
 +
 
 +
Languageː English
 +
 
 +
FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.
 +
 
 +
* '''Fundacion Karisma''''
 +
 
 +
Linkː https://karisma.org.co/?wpdmdl=7174
 +
 
 +
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.
 +
 
 +
Languageː Spanish
 +
 
 +
Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.
 +
 
 +
* '''Hiperderechos- 'Tecnoresistencias''''
 +
 
 +
Linkː https://hiperderecho.org/tecnoresistencias/
 +
 
 +
Licenseː  Creative Commons Atribución 4.0.
 +
 
 +
Languageː Spanish
 +
 
 +
tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.
 +
 
 +
Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.
 +
 
 +
* ''Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres''''
 +
 
 +
Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/
 +
 
 +
Licenseː  ?
 +
 
 +
Languageː Portuguese
 +
 
 +
Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.
 +
 
 +
* '''Luchadoras- 'La clicka libres en linea''''
 +
 
 +
Linkː https://www.libresenlinea.mx/
 +
 
 +
Licenseː  Creative Commons Attribution NonCommercial
 +
 
 +
Languageː Spanish
 +
 
 +
Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.
 +
 
 +
*  '''Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea '''GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA'''
 +
 
 +
Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf
 +
 
 +
Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.
 +
 
 +
Languageː Português
 +
 
 +
Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens
 +
 
 +
* '''HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion''''
 +
 
 +
Linkː https://hackblossom.org/domestic-violence/
 +
 
 +
Licenseː  CC BY-NC-SA
 +
 
 +
Languageː English
 +
 
 +
Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.
 +
 
 +
* '''HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity''''
 +
 
 +
Linkː https://hackblossom.org/cybersecurity/
 +
 
 +
Licenseː  CC BY-NC-SA
 +
 
 +
Languageː English, Spanish, German
 +
 
 +
You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.
 +
 
 +
* '''Hacking with care''''
 +
 
 +
Linkː http://hackingwithcare.in/
 +
http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki
 +
http://hackingwithcare.in/by/ressources/
 +
 
 +
Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported
 +
 
 +
Languageː English
 +
 
 +
Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist,  growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…
 +
 
 +
Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations,  massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….  
 +
 
 +
* '''Hollaback - Tehcnical safety guides and Social Media Safety Guides''''
 +
 
 +
Linkː https://iheartmob.org/resources
 +
 
 +
Licenseː  Copright
 +
 
 +
Languageː English
 +
 
 +
* [https://iheartmob.org/resources/tech Technical Safety Guide]: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.
 +
* [https://iheartmob.org/resources/safety_guides Social Media Safety Guides]:  We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!
 +
* [https://iheartmob.org/resources/self_care Self-Care Guide]: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.
 +
* [https://www.ihollaback.org/online-harassment-comparative-policy-analysis-dla-piper-for-hollaback/ Online Harassment: A Comparative Policy Analysis] [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.
 +
* [https://iheartmob.org/resources/rights Know Your Rights]: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.
 +
* [https://www.ihollaback.org/blog/2017/06/26/fake-news-and-harassment/ How to Spot Fake News and Recognize Harassment]:    Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.
 +
* [https://iheartmob.org/resources/supportive_organizations Supportive Organizations]: This is a list of organizations with resources for people experiencing online harassment.
 +
 
 +
* '''Internet Democracy Project - Gendering surveillance''''
 +
 
 +
Linkː https://genderingsurveillance.internetdemocracy.in/
 +
 
 +
Licenseː  Creative Commons BY 4.0 (unless otherwise specified).
 +
 
 +
Languageː English
 +
 
 +
The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of [https://genderingsurveillance.internetdemocracy.in/safety-app/ safety apps], [https://genderingsurveillance.internetdemocracy.in/phone_ban/ phone bans], or the use of [https://genderingsurveillance.internetdemocracy.in/cctv/ CCTV in garment factories].
 +
 
 +
* '''Institute for War and Peace Reporting- 'Cyber women''''
 +
 
 +
Linkː https://cyber-women.com/en/
 +
 
 +
Licenseː Creative Commons BY - SA- NC
 +
 
 +
Languageː English, Spanish, Arabic
 +
 
 +
Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.
 +
 
 +
* '''Institute for War and Peace Reporting- 'Hacks de vida''''
 +
 
 +
Linkː https://archive.org/details/DocumentoHacksdeVida_201803
 +
 
 +
Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez
 +
 
 +
Languageː Spanish
 +
 
 +
Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género
 +
 
 +
Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea.  Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida:
 +
https://archive.org/details/DocumentoHacksdeVida_201803
 +
Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida
 +
 
 +
* '''Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls''''
 +
 
 +
Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/
 +
 
 +
Licenseː Creative Commons By Share Alike
 +
 
 +
Languageː English
  
FemTechNet has been a leader in online and distributed education with the highly successful Distributed Online Collaborative Course (DOCC). In addition to extensive presence within accredited institutions, the DOCC includes community courses and self-directed learners who access the resources, materials, tools, and communities online. With these experiences in virtual, blended, and face-to-face classrooms, FemTechNet is uniquely situated to be able to educate and serve online feminist learning communities. We have a well-developed content structure, including high-quality video dialogues, as well as a system for holding teach-ins and open online office hours. Our distributed model of online education also facilitates peer-to-peer connections, thereby strengthening and expanding the level of communal engagement possible with this project.
+
In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner.
 +
Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.
  
* '''Safe Hub Collective - 'DIY Guide to feminist Cybersecurity''''
+
* '''National Network to End Domestic Violence''''
  
Linkː https://tech.safehubcollective.org/cybersecurity/
+
Linkː https://www.techsafety.org/documentationtips/
  
 
Licenseː ?
 
Licenseː ?
Line 108: Line 492:
 
Languageː English
 
Languageː English
  
This guide is intended to be a comprehensive and accessible introduction to some of the most valuable cybersecurity tools available. There’s a lot of information here, so it can get a bit overwhelming! Feel free to read each section at your own pace: there’s no obligation to read through the whole guide and install every piece of tech we recommend.  
+
Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.
 +
 
 +
* '''Pen America - ONLINE HARASSMENT FIELD MANUAL''''
 +
 
 +
Linkː https://onlineharassmentfieldmanual.pen.org
 +
 
 +
Licenseː Copyright.
 +
 
 +
Languageː English
 +
 
 +
For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).
 +
 
 +
As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.
 +
 
 +
* '''Protection International- 'Protection of LGBTI Defenders'''
 +
 
 +
Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf
 +
 
 +
Licenseː  Copyright
 +
 
 +
Languageː English
 +
 
 +
For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.
 +
 
 +
* '''Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran''''
 +
 
 +
Linkː  https://jensiat.io/
 +
https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality
 +
 
 +
Licenseː CC Attribution-NonCommercial 2.5 Generic
 +
 
 +
Languageː Farsi
 +
 
 +
Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to.
 +
 
 +
* '''Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta''''
 +
 
 +
Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/
 +
 
 +
Licenseː CC BY SA NC
 +
 
 +
Languageː  Spanish
 +
 
 +
Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos.
 +
Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.
 +
 
 +
* '''Stalking Resource Center'' National Center for Victims of Crime ''
 +
 
 +
Linkː http://victimsofcrime.org/our-programs/stalking-resource-center
 +
 
 +
Licenseː  Copyright
 +
 
 +
Languageː English
 +
 
 +
The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.
 +
 
 +
 
 +
* '''Tactical technology collective - 'Gendersec Curricula''''
 +
 
 +
Linkː
 +
ENG: https://en.gendersec.train.tacticaltech.org/
 +
SPA: https://es.gendersec.train.tacticaltech.org/
 +
 
 +
Licenseː CC BY SA NC
 +
 
 +
Languageː English and Spanish
 +
 
 +
The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats.
 +
 
 +
* '''Tactical technology collective - 'Data Detox Dating apps''''
 +
 
 +
Linkː https://datadetox.myshadow.org/en/bonus/dating
 +
 
 +
Licenseː CC BY SA NC
 +
 
 +
Languageː English, Spanish, Deutsch, French, Portuguese
 +
 
 +
Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.
 +
 
 +
* '''Tactical technology collective - 'My Shadow Curricula + Materials''''
 +
 
 +
Linkː https://myshadow.org/train +  https://myshadow.org/materials
 +
 
 +
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
 +
 
 +
Languageː English and Spanish
 +
 
 +
Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue.  
  
 
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''
 
* '''Tactical technology collective - 'Zen and the art of making tech work for you''''
  
 
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual
 
Linkː  https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual
 +
https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es
  
 
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
 
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
  
Languageː English (future translations are previewed)
+
Languageː English and Spanish
  
 
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?  
 
Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues:  First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?  
  
 
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.
 
The manual grew out of the [https://tacticaltech.org/gender-tech-institute 2014 Gender and Technology Institute], organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope  to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added.  We hope to have it translated, edited and printed in 2016.
 +
 +
* '''Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa'''
 +
 +
Linkː  https://securityinabox.org/en/lgbti-mena
 +
 +
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
 +
 +
Languageː English
 +
 +
̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.
 +
 +
* '''Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit'''
 +
 +
Linkː  https://womensrights.informationactivism.org/
 +
 +
Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)
 +
 +
Languageː English, Hindi, Arabic and Swahili.
 +
 +
The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.
 +
 +
* '''Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators''''
 +
 +
Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators
 +
 +
https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores
 +
 +
Licenseː CC BY SA NC
 +
 +
Languageː English, Spanish
 +
 +
This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.
 +
 +
* '''The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH''''
 +
 +
Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/
 +
 +
Licenseː Commons Attribution-ShareAlike 4.0 International
 +
 +
Languageː English, Spanish, Arabic
 +
 +
Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the  perspective of everyone involved in your work is the first step in fostering a productive and safe environment.
 +
 +
* '''Trollbusters - 'Digital Hygiene Course''''
 +
 +
Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/
 +
 +
Licenseː ?
 +
 +
Languageː English
 +
 +
Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.
 +
 +
* '''Web we wantː Recipes for a Digital Revolution'''
 +
 +
Linkː  http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution
 +
 +
Licenseː Copyright
 +
 +
Languageː English
 +
 +
10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.
 +
 +
* '''Without My Consent: Tools to fight online harassment''''
 +
 +
Linkː https://withoutmyconsent.org/resources
 +
 +
Licenseː Copyright.
 +
 +
Languageː English
 +
 +
If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back.  These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn.
 +
 +
* ''' Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders'''
 +
 +
Linkː  http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf
 +
 +
Licenseː  Creative Commons BY (Creative Commons Attribution 4.0 International Licence)
 +
 +
Languageː English
 +
 +
Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.
 +
 +
* '''Women's Media Center - 'Speech project''''
 +
 +
Linkː http://wmcspeechproject.com/online-abuse-101/
 +
 +
Licenseː Copyright
 +
 +
Languageː English
 +
 +
The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.
 +
 +
== Manuals produced by individuals ==
 +
 +
* '''How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer''''
 +
 +
Linkː  https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf
 +
 +
Licenseː ?
 +
 +
Languageː English
 +
 +
Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the  midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or  how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.
 +
 +
* '''Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)''''
 +
 +
Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf
 +
https://archive.org/details/FanzineNecesitoPrivacidad
 +
 +
Licenseː  CC Attribution-Noncommercial-Share Alike 3.0
 +
 +
Languageː Spanish
 +
 +
Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.
 +
 +
* '''Smart Girl's Guide to Privacy by Violet Blue''''
 +
 +
Linkː  https://www.nostarch.com/smartgirlsguide
 +
 +
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)
 +
 +
Licenseː Copyright
 +
 +
Languageː English
 +
 +
In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to:  Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.
 +
 +
* '''Twenty ways to help someone who's being bullied online..... by Laurie Penny''''
 +
 +
Linkː  https://www.patreon.com/posts/12240673
 +
 +
Licenseː Copyright
 +
 +
Languageː English
 +
 +
Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. 
 +
 +
* '''So, you’re getting harassed on the Internet. What do you do now?  by Deanna Zandt''''
 +
 +
Linkː  https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c
 +
 +
Licenseː Copyright
 +
 +
Languageː English
 +
 +
The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.
 +
 +
* '''Programas de radio El Desarmador por Imilla hacker''''
 +
 +
Linkː  https://archive.org/details/@imilla_hacker&tab=uploads and http://www.eldesarmador.org/
 +
 +
You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)
 +
 +
Licenseː Creative Commons Attribution-NonCommercial 4.0 International
 +
 +
Languageː Spanish
 +
 +
El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.
 +
 +
* '''Podcasts Señoras de internet''''
 +
 +
Linkː  https://soundcloud.com/tristanaproducciones/sets/senoras-de-internet
 +
 +
Licenseː ?
 +
 +
Languageː Spanish
 +
 +
Señoras de internet es un podcast ciberfeminista acerca de los futuros porvenires tecnológicos. Es, también, una invitación en formato de podcast a un té radial en el que se degustan las agridulces contradicciones del presente tecnopolítico.
 +
 +
Ladies of the Internet is a cyberfeminist podcast about future technological achievements. It is also an invitation in podcast format to a radio tea in which the bittersweet contradictions of the technopolitical present are tasted.
 +
== Before producing a manual ==
 +
 +
Before producing a new manual some questions we should askː
 +
* Don't reinvent the wheelǃ Are you duplicating upstream work?
 +
* If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
 +
* Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
 +
* Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
 +
* Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
 +
* Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
 +
* Credits your reviewers and experts that have provided you with feed back!!
 +
* How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
 +
* How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
 +
* How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for  achieving the translation? Will you achieve also cultural translation for instance?
 +
* Accessible for disable people
 +
* Will you provide further support to the readers such as a contact mail or a hotline?
 +
* How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
 +
* How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
 +
* How the distribution will be done? What is the target public?
 +
* Think about potential partnerships (researchers, academia, volunteer translators etc)
 +
 +
<br />
 +
  
 
[[Category:How_To]]
 
[[Category:How_To]]

Latest revision as of 08:02, 8 March 2019

This HowTo is still largely Work In Progress.

A list of manuals about privacy and digital security from a gender perspective

Manuals produced by collectives/organisations

  • Access Now - 'A first look at Digital Security'

Linkː https://www.accessnow.org/your-spring-welcoming-gift-is-here-the-freshest-version-of-a-first-look-at-digital-security/

Licenseː Creative Commons Attribution NonCommercial 4.0 International License

Languageː English

We created “A First Look at Digital Security” — an open-source booklet — to help you take the first steps toward improving your digital security online, and we continue to update it online at Github to make sure it remains accessible for anyone who needs it. The guide uses five user archetypes to introduce the concept of threat modeling, and there is a glossary to explain the most difficult terms and ideas. If you are a digital security trainer, you can use and further develop the user archetypes that we present as scenarios for your teaching activities, and we have now added space — a blank persona building page — that your students can use to create their own threat model, based concretely on their particular situation and needs.

  • Access Now - 'Digital Security Helpline Community Documentation'

Linkː https://accessnowhelpline.gitlab.io/community-documentation/index.html

Licenseː (CC BY 3.0 US) 2019 Access Now.

Languageː English

In this website you will find guides we use at Access Now Digital Security Helpline to handle different kinds of cases during our 24/7 operations. If you run a digital security helpdesk or are just advising your friends about how to secure their online activities or respond to a digital security incident, you can find some useful tips and procedures in these guides.

  • Acoso.online - 'Guía práctica para tratar casos de pornografía no consentida en recintos educacionales bajo estándares de derechos humanos y equidad de género

Linkː https://acoso.online/wp-content/uploads/2018/12/Guia-Practica-Establecimientos-Educacionales_AcosoOnline_2018.pdf

Licenseː  ?

Languageː Castellano

Esta guía es un recurso para que establecimientos educacionales establezcan parámetros base para lidiar con casos de difusión no consentida de imágenes y videos íntimos (también conocida como pornografía no consentida) en un marco de derechos humanos y equidad de género. Ha sido elaborado por Acoso.Online, un proyecto colaborativo e independiente que busca dar orientaciones concretas a las víctimas de pornografía no consentida en Latino América y el Caribe. La necesidad de entregar esta guía nace debido a dos razonamientos principales: por un lado, la abrumadora mayoría de casos que ocurren en contextos estudiantiles y, por otro, el silenciamiento y naturalización de este tipo de agresión. En esa combinación, esta guía pretende ser orientadora para todo institución educacional y comunidad relacionada y, en general, toda persona que quiera proponer estándares de acción para respetar los derechos humanos de las víctimas de esta agresión.

  • Ancestra - 'Guía de recursos digitales para mujeres rurales'

Linkː https://ancestraguia.wordpress.com/2018/02/06/descarga-la-guia-de-recursos-digitales-para-mujeres-rurales/

Licenseː Licencia Creative Commons Atribución Compartir Igual 2.5 Colombia

Languageː Castellano

Ancestra es una guía básica sobre tus derechos como mujer y las posibilidades y recursos digitales disponibles en internet para potenciar tu desarrollo emocional, físico, educativo, laboral, familiar y comunitario. Ser mujer campesina no te excluye de internet ni de ningún otro ámbito de comunicación y participación, a pesar de las grandes diferencias que existen en el acceso a Internet entre hogares urbanos y rurales colombianos.

Si una vez al día, a la semana o al mes puedes conectarte a través de un computador, tablet o teléfono celular, Ancestra quiere entregarte algunas ideas para que se enriquezca tu experiencia de navegar e interactuar en internet.

  • Aluna Acompañamiento Psicosocial y Jass Mesoamérica

Linkː https://docs.wixstatic.com/ugd/536db9_b0f243eefe5e4b4190fbe1e71424e1f7.pdf

Licenseː  ?

Languageː Castellano

Esta publicacion recopila diferentes reflexiones de defensoras de Mesoamérica sobre el miedo desde sus propias historias y experiencias.

A lo largo del diálogo surgieron muchas preguntas sobre qué es el miedo y sobre cómo lo afrontan las defensoras, especialmente cuando lo ubicamos en una sociedad patriarcal, en un contexto de violencia socio-política y cuando las sujetas que afrontan ese miedo son mujeres defensoras que, por su condición de género, además de esa violencia generalizada tienen que enfrentar las violencias cotidianas contra su ser femenino y feminista. En respuesta a ello, a través de este documento se intentó crear un tejido de ideas y testimonios sobre sus miedos, con el objetivo de verse reflejadas en ellos y así poder continuar construyendo caminos de resistencia y esperanza.

  • Association for Progressive Communications - 'Take back the tech'

Linkː https://www.takebackthetech.net/

Licenseː Copyleft

Languageː English, French, Spanish

Take Back The Tech is a global campaign that connects the issue of violence against women and information and communications technology (ICT). It aims to raise awareness on the way violence against women is occurring on ICT platforms such as the Internet and mobile phones, and to call for people to use ICT in activism to end violence against women. It was initiated by the Association for Progressive Communications, Women's Networking Support Programme, in 2006. Since then, the campaign has been taken up and organised by individuals, collectives and non-governmental organizations in at least 24 countries. The platform includes various manuals and howtos such asː

- The "know more section" which list specific information regarding types of Violence Against Women such as Black mail, cyberstalking and hate speech.

- In 2015 they have released with Just Associates (JASS) Southern Africa and Women's Net the following manualː ICTs for Feminist Movement Building: Activist Toolkit

How do we tell our own stories and make ourselves heard? How do we tell stories that empower and inspire, and challenge mainstream stories that tend to silence, erase women’s lives, experiences and voices? How do we communicate with each other and with people beyond our movements? What is the best way to develop messages that reach out to people and make our movements bigger? What tools make the most sense for our context and capacity? How can we communicate safely and securely in a world that has become increasingly risky for activists and women’s rights activists online and offline?

  • Akelarre Ciberfeminista - Kit de autodefensa ciberfeminista #uno'

Linkː https://akelarreciberfeminista.noblogs.org/category/kits/

https://ia801504.us.archive.org/28/items/kit-de-autodefensa-ciberfeminista-uno/kit-de-autodefensa-ciberfeminista-uno.pdf

https://ia801502.us.archive.org/2/items/santoral_digital/santoral_digital.pdf

Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Este fanzine se cocina durante los encuentros, físicos y virtuales, del #AkelarreCiberfeminista. Surge de una propuesta presentada por Virginia Díez y Lyann Quartas para la convocatoria de “Narrativas digitales en tiempo real” de Medialab-prado. Dicha convocatoria se enmarca en el proyecto de investigación sobre stream y procesos creativos con software y tecnologías libres, que coordina Julián Pérez. #Akelarreciberfeminista (que se colectiviza a través de una convocatoria pública más para formar un grupo de investigación diverso) se trata de empoderarnos y diseñar juntxs un kit de autodefensa feminista en la red. Durante casi tres meses, hemos analizado el activismo digital, con sus nuevas narrativas y performatividades, desde una perspectiva de género y con el objetivo de realizar una guía de seguridad digital feminista.

  • Akelarre Subversiva - Taller de seguridad digital feminista Mis dispositivos, mis cuentas, mis reglas

Linkː https://aquelarresubversiva.net/theme/pdf/taller-manual-aquelarre.pdf

Licenseː Creative Commons Reconocimiento-CompartirIgual - No Comercial

Languageː Spanish

Manual de seguridad desarrollado por Imilla Hacker para el Encuentro Aquelarre Subversiva, Espacio Autónomo Feminista Autogestionado de Bolivia

  • Chayn.org - 'Do It Yourself Online Safety'

Linkː http://chayn.co/safety/

Licenseː Creative Commons Attribution 4.0 license

Languageː English, Arabic, Spanish, French, Farsi, Pashto, Urdu and Russian.

CHAYN is an open-source project that leverages technology to empower women against violence and oppression so they can live happier and healthier lives. Running solely on the passion of skilled volunteers, Chayn leverages technology to address the problems women face today. They are also a pro bono service to charities who work with vulnerable women. Written in simple language, the guide will teach you everything you need to know about how you can be tracked – and how to hide your tracks on email, browsers, facebook and other platforms. This guide can be useful irrespective of your gender, location or situation.

- How to build your own domestic violence case without a lawyer is based on their experience from working with survivors of domestic abuse and their realisation that women can often not have access to legal aid/help because they are either very depressed, it’s too difficult for them to think their way around the legal jargon, they cannot physically approach a lawyer and increasingly, there is no legal aid or counsel is too expensive. Irrespective of whether someone wants to take legal action (criminal, divorce, child custody or asylum) – collecting and presenting evidence is critical.

  • Ciberfeministas Guatemala'

Linkː http://www.ciberfeministas.or.gt/fanzines-libres/ (March 2018: website is down)

Licenseː Copyleft

Languageː Spanish

Hicimos unas pequeñas publicaciones, fanzines, revistitas o folletitos, como quieran llamarlos, para compartir entre todas. Compartimos acá los PDF, para imprimir en hoja oficio, y los editables en .svg para que puedas adaptarlos. Encontraran fanzines acerca de la Privacidad, Violencia machista en línea, Ciberactivismo feminista, Empoderamiento de las mujeres a través de las TIC, Acoso callejero.

  • Ciberfeminismos-Ciberbrujeria - 'GUÍA BÁSICA DE AUTODEFENSA DIGITAL PARA CELULARES'

Linkː https://archive.org/details/guiaautodefensatelefonos

Licenseː Copyleft

Languageː Spanish

Editado para el 32° ENCUENTRO NACIONAL DE MUJERES, TRANS TRAVAS Y LESBIANAS en CHACO, 2017. Nuestros teléfonos no solo son ventanas abiertas en nuestras vidas, sinotambién en las vidas de nuestrxs amigxs, familias, compas...y cualquiera d e nuestrxs contactos. Quizás se piense que no hay nada para ocultar pero no podemos asegurar lo mismo por todxs los contactos con lxs que interactuamos por vía telefónica. Proteger la información de nuestro teléfono es también proteger a nuestrxs amigxs. Cuando hacemos una llamada telefónica o enviamos mensajes, se registran al menos la ubicación geográfica de quien llama y quien contesta, sus números de teléfono, la hora y duración de la comunicación y los números de serie de los dispositivos utilizados. De igual manera pueden ser capturados los datos de nuestras comunicaciones por medio de alguna aplicación del smartphone. En un mismo aparato se vinculan los datos del número telefónico, correo, contactos, actividad en redes sociales, SMS, fotografías, archivos, datos de GPS y a veces la sincronización con otros dispositivos.

  • Ciberseguras

Linkː https://ciberseguras.org/

Licenseː CC BY

Languageː Spanish

Somos varias, cada una con distintos poderes, venimos de diferentes galaxias pero constelamos juntas. Nuestro espacio compartido es la red y nos unimos para ahuyentar a las fuerzas ocultas que nos atacan. Para hacerles frente, conspiramos en aquelarres ciberfeministas. Ciberseguras es el fuego que nos reúne en un círculo de goce, baile y encuentro. Aquí aprendemos juntas. Ciberseguras somos Clandestina (Brasil) , Ciberfeministas GT (Guatemala), Derechos Digitales (Chile-México), Dominemos la tecnología - APC, Luchadoras (México), Nodo Común (Bolivia), SocialTIC (México).

  • Coding Rights - Send nudes'

Linkː http://www.codingrights.org/send-nudes/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, English

Digital security can also be fun. By apropriation of the meme “send nudes!”, this small project has the goal to spread the word about digital security for the average user, who relies on digital media for their communication, but are not necessarily tuned with the specifics of digital security debate. Also discussing post-porn aesthetics and strategies for combating gender inequalities in the web, it was thought to be more appealing to women and sexual minorities, since they are more easily exposed to online haressment, by practices such as revenge “porn”, doxxing, cyberbulling, etc.

  • Coding Rights - SaferSisters: Feminist Digital Security Hints in gifs!'

Linkː https://medium.com/read-write-participate/safersisters-online-security-tips-in-gifs-222589166ed8 https://medium.com/codingrights/safermanas-dicas-de-seguran%C3%A7a-digital-em-gifs-bf270086eb66 https://medium.com/@codingrights/safermanas-tips-de-seguridad-digital-en-gifs-4453cf18d985

Licenseː ?

Languageː English, Spanish, Portuguese

Coding Rights will publish a new themed gif per week under the hash #SaferSisters. The ones to follow will explain how to protect nude photos, how to prevent the misuse of location data by creepy stalkers, how to choose a period-tracking app that does not leak the inners of our wombs to the cyber world, what to think when we use dating or taxi apps and even how to escape sexist ads that haunt us for days. All gifs will be produced in Portuguese, English and Spanish.

  • Coding Rights - Chupadados

Linkː https://chupadados.codingrights.org/

Licenseː Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)

Languageː Brasilian, Spanish

Estos dispositivos son bonitos, gentiles, nos hacen compañía y nos hacen sentir atractivos y amparados. Nos apasionamos por ellos y depositamos en ellos toda nuestra confianza, desde los gestos más cotidianos hasta los secretos más íntimos. Ellos son nuestros objetos de deseo y sueños de consumo. Hasta el día en que nos damos cuenta de que controlan lo que hacemos, monitorean con quiénes nos encontramos y comparten nuestra intimidad con gente que no tiene nada que ver con eso. A partir de conceptos como "Big Data", "Smart Cities" e "Internet de las Cosas", creemos que la abundancia de datos, sumada a la alta capacidad de procesamiento de las computadoras con algoritmos inteligentes, facilitan y proporcionan más eficiencia a las ventas, la economía, el combate al crimen, la movilidad, la protección del medio ambiente, la garantía de la seguridad, de la salud y muchos de los problemas que enfrentamos globalmente. Pero ¿cómo funcionan estas tecnologías y al servicio de qué intereses trabajan? Vean por ejemplo la seccion sobre Cuerpos y su analisis de aplicaciones para control menstrual, aplicaciones deportivas, aplicaciones de salud, dildos, termómetros y colectores menstruales conectados a internet. Gracias a esos dispositivos hoy podemos convertir enfermedades, sexualidades, calorías y sangre menstrual en información, números y valor. El Chupadatos interpreta esas informaciones como mejor le parece. Con su mente oscura, te impone patrones normativos sobre tu peso, tu salud y tu vida sexual, e incluso comparte tu información íntima por ahí. Molesto, ¿no?

  • Consorcio para el Diálogo Parlamentario y la Equidad Oaxaca A.C. - 'Lineamientos para la construcción de planes integrales de protección con enfoque feminista'

Linkː https://gendersec.tacticaltech.org/wiki/images/5/5a/MANUAL_web.pdf

Licenseː Está permitido compartir, copiar y redistribuir los contenidos siempre que se cite la fuente y sea sin fines de lucro.

Languageː Spanish

En el marco de la Campaña de los 16 días de Activismo contra la Violencia de Género, Consorcio Oaxaca presentó el Folleto “Lineamientos para la Construcción de Planes Integrales de Protección con Enfoque Feminista”. Frente al grado de falta de acción por parte del Gobierno para garantizar la labor, la vida y la seguridad de defensoras, defensores y periodistas, resulta necesario dicho instrumento.

  • CMI-Rio - Centro de Mídia Independente Rio de Janeiro e gaivotas.- 'Tem Boi na Linha?

Linkː https://temboinalinha.org/index.html

Licenseː Creative Commons Attribution NonCommercial 4.0 International License

Languageː Portuguese

Esse site parou de ser atualizado em 2015. Algumas recomendações de ferramentas podem estar desatualizadas. Para os movimentos sociais, a comunicação rápida e segura entre membros de um coletivo, entre coletivos, ou entre ativistas independentes é fundamental tanto para o planejamento e a eficácia das ações, como também para o fortalecimento do próprio movimento de resistência. Na era analógica, espionar as comunicações de um indivíduo ou grupo e apreender documentos sensíveis, eram ações bastante comuns, apesar de serem dirigidas a alvos específicos e um tanto difíceis de serem camufladas. Com a internet, essa prática se tornou mais discreta, silenciosa e ainda mais comum, sendo utilizada em larga escala, para a espionagem em massa, e por motivos que ultrapassam os estritamente políticos.

  • Cyber Civil Rights Initiative - 'ONLINE REMOVAL GUIDE'

Linkː https://www.cybercivilrights.org/online-removal/

Licenseː Copyright

Languageː English

At the Cyber Civil Rights Initiative, we know how traumatic and distressing it can be to find your intimate images online when you didn’t consent to them being shared. We worked with all of the major social media and tech companies to come up with the following document to provide you with a list of how to report this violation on all of their platforms.

  • Crash Override network - 'Various'

Linkː http://crashoverridenetwork.tumblr.com/post/114270394687/so-youve-been-doxed-a-guide-to-best-practices

Licenseː Not specified

Languageː English

This anti-online hate task force, staffed by former targets, provides resources, outreach, and support to combat mob hatred and harassment. They have drafted a manual for everyone, including those curious about doxing and those who have already been targeted, the following is a primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment.

Preventing Doxing: “Doxing” is a common first-stage tactic of mobs abusers looking to intimidate their targets and start digging up information on their life. Learn some tricks to help prevent it here. Link: http://www.crashoverridenetwork.com/preventingdoxing.html

Guide: Talking to Family and Police: We’ve assembled a few basic tips that we’ve found help the less tech-savvy people in our lives understand the very real toll of internet harassment, as well as some basic tips to get on the same page with the people in your life and law enforcement, in the event that you unfortunately need it. Link: http://www.crashoverridenetwork.com/familyandpolice.html

So You’ve Been Doxed: A Guide to Best Practices: A primer on the realities, pathology, and personal solutions for this particularly nasty form of online harassment. Link: http://www.crashoverridenetwork.com/soyouvebeendoxed.html

  • Cyborg Feministas - Recursos'

Linkː https://cyborgfeminista.tedic.org/inicio/recursos/

Licenseː Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional

Languageː Spanish

Recursos para descargar e imprimir: Cyborg Feminismo por Adriana Peralta; Sexting por Regi Rivas; Iconos de super mujeres por Florencia Aguirre + Toolkits de Seguridad Digital: Serie de Fanzines

  • Data Society - Best Practices for Conducting Risky Research and Protecting Yourself from Online Harassment'

Linkː https://datasociety.net/pubs/res/Best_Practices_for_Conducting_Risky_Research-Oct-2016.pdf

Licenseː Creative Commons Attribution 3.0 Unported license.

Languageː English

Researchers who investigate sensitive topics may face online harassment, social shaming, or other networked forms of abuse. In addition to potential impacts on the researcher’s reputation and mental health, fear of harassment may have a chilling effect on the type of research that is conducted and the capabilities of individual researchers.

This document is a set of best practices for researchers – especially junior researchers – who wish to engage in research that may make them susceptible to online harassment. We provide recommendations for academic institutions, supervisors, and individuals, including cyber-security guidelines and links to other resources.

The authors welcome feedback about this document. Please send suggestions and edits to risky research at datasociety dot net.

  • Digital Rights Foundation - 'The art of digital security for pakistani women'

Linkː https://digitalrightsfoundation.pk/wp-content/uploads/2017/11/Hamara-Internet-Guidebook-English-Version-2016.pdf

Licenseː Creative Commons Attribution-ShareAlike (CC BY·SA) license.

Languageː English, Urdu

This guidebook has been specially made for Pakistani women and is available in Urdu and English.

  • Donestech.net - 'KIT contra les violències masclistes on-line'

Linkː Cat: https://donestech.net/files/kitcontraviolenciesmasclistesonline2018.pdf Spa: https://donestech.net/files/kitviolencies2019_cast.pdf

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Catalan, Spanish

Des d’una posició crítica i feminista, introduïm les violències masclistes on-line i, sobretot, posem a la vostra disposició una sèrie de propostes, recursos i iniciatives per a que ens cuidem, ens defensem, contrarestem i alteractuem davant d’aquestes violències.

Aquest KIT creiem que resultarà molt útil per a les dones i persones LGTBIQ*, especialment per aquelles dones violentades, però també les destacades, les feministes i dissidents sexuals i de gènere que es veuen afectades per aquestes violències on-line de forma creixent. Us animem a utilitzar aquest KIT tant de forma preventiva com reactiva i esperem que us sigui d’utilitat.

  • Donestech.net - 'Redes Sociales en perspectiva de género: Guía para conocer y contrarrestar las violencias de género on-line'

Linkː https://donestech.net/files/redessociales.pdf

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Spanish

Dentro de ese entramado de redes sociales que se despliegan en nuestras vidas conectadas y fuera de Internet operan una multitud de posibilidades que se entrelazan fuertemente. Por todo ello, es cada vez más importante entender dónde y cómo nos movemos por los espacios conectados, para poder saber cómo operar e influenciar cambios positivos, así como para poder cuidar y cuidarnos entre nosotras para contrarrestar y sobrepasar estas violencias, agresiones y vulnerabilidades que pueden amplificar, complementar o, incluso, cambiar las que ya se experimentan en la vida física. Por todo ello esta publicación incluye, en una primera parte, la presentación de algunas de las características de las redes sociales en general y de las plataformas de redes sociales on-line. Lo abordamos de forma crítica y con perspectiva de género, así como relacionamos internet, las identidades, la privacidad y la seguridad con el género. Seguidamente nos adentramos en las violencias de género y, específicamente, las violencias de género on-line. Partimos de un análisis del panorama de datos cuantitativos y cualitativos existentes para, en la medida de lo posible, visibilizar qué está pasando si nos preguntamos sobre este tipo de violencias. Después, en una segunda parte, exponemos en detalle las violencias de género on-line, así como las posibilidades de hacerles frente. En este sentido, identificamos y definimos un conjunto de violencias de género que están ocurriendo en las redes sociales on-line y presentamos, a la vez, pistas, recomendaciones e iniciativas para profundizar en ellas y lograr autodefendernos, así como contrarrestarlas.

Esta publicación pues, está pensada para que pueda utilizarse también como guía y manual para entender mejor cuales son los componentes de género que atraviesan las redes sociales on-line. Sin embargo, y sobre todo, buscamos contribuir a que desde una posición más informada, crítica y feminista se puedan detectar y conocer las violencias de género on-line y,en la medida de lo posible y en un futuro próximo, se puedan sobrepasar. Por ello, esta publicación puede resultar muy útil a las mujeres, especialmente a las mujeres vocales, feministas y disidentes sexuales y de género, que de forma creciente se ven afectadas por las violencias de género on-line. Además, por el idioma utilizado, las autorías, voces y miradas, así como la mayoría de datos y referencias utilizadas, esta guía resulta especialmente interesante para las mujeres latinas e iberoamericanas.

  • Donestech.net - 'Various'

Linkː http://donestech.net/

Licenseː Creative Commons Attribution - Share Alike - No Commercial

Languageː Spanish, Catalan, English

- Comic Lela: A comic for kids and grown ups available in spanish, catalan, english about free software and free culture (https://www.donestech.net/comic-lela)

- Kit de formacion Genero, Tic y Activismoː A compilation of articles in Spanish about how to link gender, activism and a tactical use of ICT (https://donestech.net/files/kit_cast_5.pdf)

- Guia didàctica per a la formació en perspectiva de gènere i interculturalitat: A toolkit in catalan for telecentres about how to provide trainings to ICT that take into account gender and cultural diversityː (http://www.donestech.net/ca/guia_didactica)

Donestech.net is a cyberfeminist activist research and action collective that investigates the specificities of the relations of women in/with ICT, enhance access of women to technology, creates networks and incorporate/experiment technologies in their research processes and in their technoactivist practices. Comic Lela wants to be a teaching resource, artistic, media and awareness to promote sustainable and radical use of technologies by women.

  • Feminist Frequency - Countering Online Harassment Safety and Support Guide'

Linkː https://onlinesafety.feministfrequency.com/

Licenseː ?

Languageː English, Spanish, Arabic

This guide contains things we’ve learned about how to keep yourself safe from individuals, loosely organized groups & cybermobs online.

  • FemTechNet - 'Center for solutions to online violence'

Linkː http://femtechnet.org/csov/

Licenseː Not specified

Languageː English

The Center for Solutions to Online Violence is both a digital resource space, hosted in perpetuity by FemTechNet, and a community of people working to address the ever-evolving risks faced by women and feminists online. Going forward, the project will be co-facilitated by T.L. Cowan and Moya Bailey, who have been essential to the work this year. They, in turn, are supported by a committee of volunteers and the broader FemTechNet network. In the coming year, CSOV will continue to connect survivors of online violence to resources and communities who can help. It will also continue the hard work of making visible the violences that women of color, queer and trans-creators, and other marginalized communities experience – too often at the hands of those who purport to want to help. Trust is partially about understanding the risks that others face and demonstrating that you are willing to address those risks before doing any additional work. This is the foundation of the Center for Solutions to Online Violence

  • Fight Cyberstalking'

Linkː https://www.fightcyberstalking.org

Licenseː Copyright

Languageː English

FightCyberstalking.org is an online resource site for cyberstalking victims: information on reporting a cyberstalker, online privacy tips, and tips for safer socializing online on social media sites, such as Twitter, Facebook, Instagram and YouTube. FightCyberstalking.org was launched and created in 2010 after the founder, Lisa Woeller, become a victim of a cyber stalker in 2006. If you find this site helpful, please feel free to share our website, like, and follow us on the web.

  • Fundacion Karisma'

Linkː https://karisma.org.co/?wpdmdl=7174

Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.

Languageː Spanish

Seguridad, privacidad y proteccion en Twitter, una guia para personas sobrevivientes de acoso y abuso. Esta publicación está basada en Safety, Privacy on Twitter. A guide for survivors of harassment and abuse, elaborada por la National Network to End Domestic Violence (NNEDV) con el apoyo de Twitter. La traducción y adaptación para América Latina ha sido posible gracias al apoyo de Twitter.

  • Hiperderechos- 'Tecnoresistencias'

Linkː https://hiperderecho.org/tecnoresistencias/

Licenseː Creative Commons Atribución 4.0.

Languageː Spanish

tecnoresistencias es un espacio donde encontrarás información para tu autodefensa digital desarrollado por Hiperderecho, una organización peruana que defiende el derecho de todas y todos a participar de espacios digitales con libertad y seguridad.

Esta página es el resultado de nuestra investigación sobre violencia de género en línea donde participaron activistas, defensorxs de derechos humanos, personas de la comunidad LGBTIQ+, feministas y personas quienes han enfrentado este tipo de violencia. A cada una de ellas les agradecemos por su tiempo, interés y ganas de seguir luchando por espacios digitales seguros. Ahora, te invitamos a seguir descubriendo Tecnoresistencias. En las siguientes secciones detallamos los tipos de violencia que hemos encontrado, cómo denunciarlos y los talleres de #AutoDefensaDigital que ofreceremos este año. Esperamos esta información sea útil y que te sirva para disfrutar de internet sin violencia.

  • Instituto Patrícia Galvão' - 'Dossiê Violência contra as Mulheres''

Linkː https://dossies.agenciapatriciagalvao.org.br/violencia/

Licenseː  ?

Languageː Portuguese

Este é um dossiê digital feito para contribuir com a divulgação de informações e o debate sobre a violência contra as mulheres. Para isso, conta com um banco de fontes de especialistas e também com um banco de pesquisas que reúne dados e estudos atuais sobre a violência de gênero no Brasil. O dossiê também dispõe de uma seção de conteúdos especiais, que compilam informações, dados e análises.

  • Luchadoras- 'La clicka libres en linea'

Linkː https://www.libresenlinea.mx/

Licenseː Creative Commons Attribution NonCommercial

Languageː Spanish

Libres en línea es una campaña de La Sandía digital y Luchadoras como parte de Dominemos la tecnología.

  • Marialab, Blogueiras Negras, Universidade Livre Feminista e Cfemea GUIA PRÁTICA DE ESTRATÉGIAS E TÁTICAS PARA A SEGURANÇA DIGITAL FEMINISTA

Linkːhttp://feminismo.org.br/guia/guia-pratica-seguranca-cfemea.pdf

Licenseː Licencia Creative Commons Reconocimiento-Compartir Igual 4.0.

Languageː Português

Esta  Guia  Prática  de  Estratégias  e  Táticas  para  a  Segurança  Digital  Feminista  tem  o  objetivo  de proporcionar  às  mulheres  maior  autonomia  e  segurança  na  internet,  apresentando  estratégias  e táticas de defesa digital para feministas. Os conteúdos são dirigidos para o público de mulheres da América Latina e foram elaborados considerando diferentes mulheres: negras, trans, lésbicas, ativistas/militantes de movimentos organizados de mulheres ou que atuam individualmente na rede, sendo de periferias urbanas, rurais, com distintos níveis de acesso à tecnologia nas suas abordagens

  • HACK*BLOSSOM - `DIY Cybersecurity for Domestic Violence: A resource of privacy + compassion'

Linkː https://hackblossom.org/domestic-violence/

Licenseː CC BY-NC-SA

Languageː English

Why Cybersecurity? Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital. DIY Cybersecurity asserts your privacy online. When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our Threat Scenarios explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have Defense Strategies for proactively securing your digital life. There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on Private Web Browsing.

  • HACK*BLOSSOM - `A DIY Guide to Feminist Cybersecurity'

Linkː https://hackblossom.org/cybersecurity/

Licenseː CC BY-NC-SA

Languageː English, Spanish, German

You have a right to exist safely in digital spaces. Although we have to rely on outside parties for technology to access these spaces, there are tons of helpful tools and strategies that allow you to take greater control of your digital life and mitigate the risk of malicious threats. We’ll walk through common areas of digital life such as web browsing, private data, and smartphones to show you different ways that you can implement as much or little security as you’re comfortable with. You have power to set boundaries and protections in your digital spaces as you see fit: we hope that this guide will help you to make informed, personal decisions on what is right for you.

  • Hacking with care'

Linkː http://hackingwithcare.in/ http://hackingwithcare.in/wiki/doku.php/start#welcome_to_hacking_with_care_wiki http://hackingwithcare.in/by/ressources/

Licenseː CC Attribution-Noncommercial-Share Alike 3.0 Unported

Languageː English

Hacking With Care is collective composed of hackers-activists, caregivers, artists, sociologist, growing quite literally by contact and affinity. Together we imagine, circulate, put in common resources and tools for care in accordance with hackers ethics and peer-to-peer philosophy. We create occasions for body & soul rejuvenation and collective (re)appropriation of care. We work with an understanding of the needs and requirements of specific contexts, as can be found in hacking and activism. Similarly, we like to transmit to caregivers some hackers-activists tools and best practices, for example in relation to privacy/data protection, technological independence, operational security. Other aspects we like are creativity in care, access to knowledge, interdisciplinarity, questioning of norms…

Our actions evolve around two principal axis that could be (but not limited to): Care for hackers-activists and Hackers ethics and tools for caregivers. They include care corners at hackers-activists events, pop-up massage sessions at the quarters of activists organizations, massage and well-being workshops and tutorials, compilation of resources and creation of original resources, research, news watch….

  • Hollaback - Tehcnical safety guides and Social Media Safety Guides'

Linkː https://iheartmob.org/resources

Licenseː Copright

Languageː English

  • Technical Safety Guide: Chances are, you’ve either been harassed online or you might be in the future. We partnered with Take Back the Tech! to design a guide that will walk you through the immediate steps you need to take to feel safe and give you the information you need to make informed decisions.
  • Social Media Safety Guides: We have worked hard alongside each of these platforms to make the process of understanding online safety a priority. Every guide gives user friendly information on how to best use reporting and privacy tools on each platform, and for the very first time all of this information is located in one location!
  • Self-Care Guide: Experiencing online harassment can be overwhelming. You may feel a whole host of (totally valid) emotions. You could even be experiencing physical symptoms such as a pounding heart, nausea, or difficulty sleeping. You might simply feel numb. In these situations, it’s really important to take time out to take care of yourself.
  • Online Harassment: A Comparative Policy Analysis [pdf]: This November 2016 report from DLA Piper offers a comparative analysis on law and policy addressing online harassment in Canada, the UK, the US, and Australia.
  • Know Your Rights: Trying to understand what your rights are on the internet and when they’ve been crossed is tricky. This guide offers US-based readers insight into the federal laws that are meant to protect us; others vary from state to state. It also details several avenues for response.
  • How to Spot Fake News and Recognize Harassment: Brought to you by HeartMob, this resource in comic-form explains how fake news is used to harass and silence – and how to tell whether news is legit.
  • Supportive Organizations: This is a list of organizations with resources for people experiencing online harassment.
  • Internet Democracy Project - Gendering surveillance'

Linkː https://genderingsurveillance.internetdemocracy.in/

Licenseː Creative Commons BY 4.0 (unless otherwise specified).

Languageː English

The Gendering surveillance project aims at showing how the digital age may have further deepened the scrutiny to which women are subjected, women have always been under stringent surveillance - by actors ranging from partners and parents to the state. And this has shaped, and harmed, women’s lives in multiple ways. What can be learned about surveillance from gendering it, then? And what do these insights imply for the fight for stronger human rights protections in the face of surveillance more broadly? See for instance their review and analysis of safety apps, phone bans, or the use of CCTV in garment factories.

  • Institute for War and Peace Reporting- 'Cyber women'

Linkː https://cyber-women.com/en/

Licenseː Creative Commons BY - SA- NC

Languageː English, Spanish, Arabic

Cyberwomen is a digital security curriculum with a holistic and gender perspective, aimed at offering in-person learning experiences to women human right defenders and journalists work in high-risk environments. The guide is geared towards both professional trainers and persons who want to learn how to train others on their digital protection, and include gender considerations as they do so. It is made up of training modules, interactive games, recommendations for evaluating the training, as well as audio-visual and graphic materials as instructional aids. There are some recommendations about which modules to use for different learning levels, time and contexts. You can browse the guide online or download the full version from the site. The creation of CyberWomen was a collaborative process between many devoted people and partner organizations.

  • Institute for War and Peace Reporting- 'Hacks de vida'

Linkː https://archive.org/details/DocumentoHacksdeVida_201803

Licenseː CC BY-ND, Atribución-SinDerivadas Estrella Soria y Luisa Ortiz Pérez

Languageː Spanish

Hacks de vida: Entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género

Este documento es el resultado de más de 20 entrevistas con mujeres que ayudan a otras mujeres a enfrentarse a las violencias de género en línea con valentía, ingenio y esperanza. Contiene consejos, ideas, reflexiones para entender mejor la forma de ayudar y enfrentar la violencia juntxs. Además cuenta con una revisión de la bibliografía más reciente sobre del tema en la región y un poster con consejos prácticos para personas que dan apoyo tecnológico a lxs que enfrentan violencias de género en línea. Con mucho gusto, orgullo y agradecimiento les informamos que está disponible en línea la primera edición de Hacks de Vida: https://archive.org/details/DocumentoHacksdeVida_201803 Los stickers y posters están en archive si los necesitan o los quieren replicar: https://archive.org/details/@hacks_de_vida

  • Mozzila Foundation - 'Teaching Kit: Combatting Cyber Violence Against Women and Girls'

Linkː https://d157rqmxrxj6ey.cloudfront.net/amira/33977/

Licenseː Creative Commons By Share Alike

Languageː English

In this three-part series learners focus on understanding the impact of cyber violence against women and girls, creating safer places online, knowing how to address bullying or attacks when they happen, and participating in online communities in a supportive manner. Activities will take young women and girls from understanding online violence to actively advocating against it. This module was created for women and girls in emerging countries where internet adoption for women is at the utmost highest, along with a concern for security and harassment, but can be adapted for audiences everywhere.

  • National Network to End Domestic Violence'

Linkː https://www.techsafety.org/documentationtips/

Licenseː ?

Languageː English

Abusers and perpetrators will often misuse technology to further abuse and control victims. Misuse of technology could include monitoring technology use, including computers or cell phones, sending multiple unwanted or threatening text messages or voicemail messages, or posting negative comments or images of the survivor online. In some cases, how technology is misused to harass and control may seem unbelievable. However, it is important to trust your instincts. If you believe that you are being monitored or stalked via technology, you might be. Narrowing down what is happening, including the tactic and the technology used, can help to determine if stalking is occurring and if so, how to address is.

  • Pen America - ONLINE HARASSMENT FIELD MANUAL'

Linkː https://onlineharassmentfieldmanual.pen.org

Licenseː Copyright.

Languageː English

For years, online harassment was dismissed in some quarters as less real, or less harmful, than harassment in the “real world.” More recently, after sustained efforts and pressure from those who bear the brunt of this harassment—women, people of color, LGBTQ+ individuals and people identifying with other marginalized or threatened groups—social media companies and the broader public have begun to take this issue seriously. There is now a growing recognition that online harassment can affect its targets’ freedom to express themselves, their livelihoods, and their mental and physical health. It is also clear that online harassment can extend to the offline world, especially for those who receive direct, specific threats of sexual violence, bodily harm, and even death, and who have their personal information published without their consent (known as “doxing”).

As an organization of writers, PEN America is particularly concerned about the ways in which online harassment affects writers’ work. Our 2017 Online Harassment Survey of over 230 journalists and writers found that 67 percent of respondents had experienced a severe reaction to being targeted by online harassment, including refraining from publishing their work, permanently deleting their social media accounts, and/or fearing for their safety or the safety of their loved ones. More than one-third of respondents reported avoiding certain topics in their writing due to online harassment, 16 percent reported permanently deleting a social media account, and 37 percent felt that online harassment had damaged their reputations. These survey findings align with years of reports from writers, journalists, and activists that experiencing harassment and hateful speech online can drive people offline entirely or lead them to avoid speaking or writing about topics that they fear will lead to further harassment.

  • Protection International- 'Protection of LGBTI Defenders

Linkː https://protectioninternational.org/wp-content/uploads/2012/04/LGBTI_PMD_2nd_Ed_English.pdf

Licenseː Copyright

Languageː English

For the purposes of this manual the authors tried to avoid using any definitions of the terms lesbian, gay, bisexual, transgender and intersex. However on developing the manual and in conversations with various defenders working on a wide range of rights it became evident that some form of definition was needed in order to increase a general understanding of the issues at stake and improve the security enjoyed by defenders working on sexual orientation and sex/gender identity and gender expression issues and the rights to equality and non-discrimination of the LGBTI community.

  • Small Media - Jensat: Graphic Novel Illustrates Cybersecurity, Gender, and Sexuality in Contemporary Iran'

Linkː https://jensiat.io/ https://thecreatorsproject.vice.com/blog/iranian-graphic-novel-cybersecurity-gender-sexuality

Licenseː CC Attribution-NonCommercial 2.5 Generic

Languageː Farsi

Jensiat is a newly launched online graphic novel addressing cybersecurity, gender, and sexuality in contemporary Iran. The site, designed and developed by UK-based Small Media, is the combined effort of a team of journalists, writers, and artists seeking to bring light to these issues through a story any young Iranian can relate to.

  • Social TIC/Ciberseguras - 'Violencia contra las mujeres y tecnología: Estrategias de respuesta'

Linkː https://socialtic.org/blog/violencia-contra-las-mujeres-y-tecnologia-estrategias-de-respuesta/

Licenseː CC BY SA NC

Languageː Spanish

Compartimos un compilado de tácticas para el combate de la violencia relacionada con la tecnología. Este compilado incluye varias formas en las que mujeres han respondido ante diferentes tipos de agresiones, varias de estas respuesta cuentan con notas y ejemplos. Al compartirlo, buscamos que más mujeres que enfrentan este tipo de violencia puedan usarlo para trazar una estrategia de respuesta y también que quienes acompañamos a mujeres en estas situaciones encontremos una herramienta útil de consulta.

  • Stalking Resource Center National Center for Victims of Crime

Linkː http://victimsofcrime.org/our-programs/stalking-resource-center

Licenseː Copyright

Languageː English

The mission of the Stalking Resource Center is to enhance the ability of professionals, organizations, and systems to effectively respond to stalking. The Stalking Resource Center envisions a future in which the criminal justice system and its many allied community partners will have the best tools to effectively collaborate and respond to stalking, improve victim safety and well-being, and hold offenders accountable.


  • Tactical technology collective - 'Gendersec Curricula'

Linkː ENG: https://en.gendersec.train.tacticaltech.org/ SPA: https://es.gendersec.train.tacticaltech.org/

Licenseː CC BY SA NC

Languageː English and Spanish

The Gendersec Curricula introduces a feminist perspective to privacy and digital security trainings. Informed by our experience organising Gender and Technology Institutes for women and trans activists around the world, this free resource is available in English and Spanish and covers over 20 topics including Hacking Hate Speech, Risks and Strategies when Using Dating Platforms, Creative Uses of Social Media, Handling Stress and Strategies of Resistance. Trainers, facilitators, defenders can access these workshops and adapt them to their communities to support Women Human Rights Defenders in protecting themselves from online and offline threats.

  • Tactical technology collective - 'Data Detox Dating apps'

Linkː https://datadetox.myshadow.org/en/bonus/dating

Licenseː CC BY SA NC

Languageː English, Spanish, Deutsch, French, Portuguese

Tinder, Grindr, Happn, OkCupid, Match, eHarmony... there are so many dating services out there. This Data Detox Extra will introduce you to the third wheel in your dating life and give you tips on how to share less and keep more secrets.

  • Tactical technology collective - 'My Shadow Curricula + Materials'

Linkː https://myshadow.org/train + https://myshadow.org/materials

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English and Spanish

Session outlines for trainers. WORKSHOP outlines can be used to run longer, structured sessions; these often pull in multiple activities. Stand-alone ACTIVITIES can be used to illustrate a single issue.

  • Tactical technology collective - 'Zen and the art of making tech work for you'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual/es

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English and Spanish

Tactical Technology Collective (in the framework of its one year project “Securing Online and Offline Freedoms for Women: Expression, Privacy and Digital Inclusion”) has released in September 2015 a manual tackling some privacy and security issues from a gender perspective. It is the result of a collaborative effort that has involved our growing community of women and trans* activists, human rights defenders and technologists. The manual was created in response to our community’s requests for ideas and guidance on topics they needed, but couldn’t find elsewhere and has been written and reviewed by over 20 women coming from 19 different countries. The current content focuses on two overlapping issues: First, how can we craft appropriate online presences (or a series of them) that strengthen our ability to communicate and work online safely?; Secondly, how can we collaboratively create safe online and offline spaces that enable our communities to share, collaborate, and communicate safely?

The manual grew out of the 2014 Gender and Technology Institute, organised by Tactical Technology Collective and the Association for Progressive Communications (APC). Until next January 2016, we hope to achieve a better understanding of the readers audience, their background and needs and also to gather through this extended community more feed back about the manual in order to get a better grasp of the dimensions that are missing and which are the other tools, processes, readings and cases studies that should be added. We hope to have it translated, edited and printed in 2016.

  • Tactical technology collective - Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa

Linkː https://securityinabox.org/en/lgbti-mena

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English

̟̇̇̇̇̇̇̇̇̆̈Digital Security tools and tactics for the LGBTI community in the Middle East and North Africa was designed and written in collaboration with LGBTI human rights defenders from the region. The guide serves as a contextualised introduction to the Security in-a-Box toolkit for human rights defenders, produced by Tactical Technology Collective and Front Line Defenders, expanding on its content to include important information, tools and tips particularly relevant to the LGBTI community in this region region, as identified by members of the community in workshops carried out in 2012.

  • Tactical technology collective - Women's Rights Campaigning Info-activism Toolkit

Linkː https://womensrights.informationactivism.org/

Licenseː Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)

Languageː English, Hindi, Arabic and Swahili.

The Women's Rights Campaigning: Info-Activism Toolkit is a guide for women's rights activists, advocates, NGOs and community-based organisations who want to use technology tools and practices in their campaigning.

  • Tecnicas Rudas - 'Digital Security Assessment for Human Rights Organizations: A guide for facilitators'

Linkː https://gendersec.tacticaltech.org/wiki/index.php/Digital_Security_Assessment_for_Human_Rights_Organizations:_A_guide_for_facilitators

https://gendersec.tacticaltech.org/wiki/index.php/Diagnósticos_en_seguridad_digital_para_organizaciones_defensoras_de_derechos_humanos_y_del_territorio:_un_manual_para_facilitadores

Licenseː CC BY SA NC

Languageː English, Spanish

This guide is directed primarily at the digital security training community, but may also prove useful for an organization that chooses to initiate a digital security process on its own. The activities and structure proposed herein can and should be adapted to the specific circumstances and needs of the organization. The guide can also be a useful reference for facilitators throughout the implementation of the diagnostic. The methodology can also be applied to individual assessments with minimal adjustments.

  • The Engine room - 'DATNAV: NEW GUIDE TO NAVIGATE AND INTEGRATE DIGITAL DATA IN HUMAN RIGHTS RESEARCH'

Linkː https://www.theengineroom.org/datnav-digital-data-in-human-rights-research/

Licenseː Commons Attribution-ShareAlike 4.0 International

Languageː English, Spanish, Arabic

Launching DatNav: a guide designed to help you navigate and integrate digital data into your human rights research. DatNav is the result of a collaboration between Amnesty International, Benetech, and The Engine Room which began in late 2015 culminating in an intense four day writing sprint facilitated by Chris Michael and Collaborations for Change in May 2016. Security relates to physical safety, health, finances, discrimination, privacy, etc. Security threats vary from person to person and group to group. For some their religion or sexual orientation may pose the greatest safety risk. Understanding these concerns from the perspective of everyone involved in your work is the first step in fostering a productive and safe environment.

  • Trollbusters - 'Digital Hygiene Course'

Linkː https://yoursosteam.wordpress.com/digital-hygiene-course/

Licenseː ?

Languageː English

Prevent online harassment before it starts. Each lesson takes 5-10 minutes to complete. Start now by keeping harassment from migrating offline.

  • Web we wantː Recipes for a Digital Revolution

Linkː http://www.scribd.com/doc/283942238/Recipes-for-a-Digital-Revolution

Licenseː Copyright

Languageː English

10 delicious recipes for digital rights activism from Latin America that will make you want to stir up your own ideas and serve them to your friends.

  • Without My Consent: Tools to fight online harassment'

Linkː https://withoutmyconsent.org/resources

Licenseː Copyright.

Languageː English

If you’re reading this because someone has distributed nude photos or videos of you online, without your consent or in breach of your trust, there’s good news: you have many tools available to get control back. These resources are part of WMC’s Something Can Be Done! guide, and have been developed by the country’s top digital abuse lawyers. However, lawyers do not make decisions in a vacuum. Every case is different and the preferred strategy for your case should be tailored to the behavior of the particular people involved and the circumstances of each case. We are not your attorneys and the information presented here is not legal advice. However, if you follow these directions and take this information to your legal counsel, police precinct, domestic violence clinic, or family court self-help center, the answer will no longer be “nothing can be done.” WMC wants victims and their supporters to know everything that can be done on every level to combat nonconsensual porn.

  • Women Human Rights Defenders International Coalition (WHRD IC)ː Gendering Documentation : A Manual for and about Women Human Rights Defenders

Linkː http://www.defendingwomen-defendingrights.org/wp-content/uploads/2015/12/WHRD-IC-Gendering-Documentation-Manual-1.pdf

Licenseː Creative Commons BY (Creative Commons Attribution 4.0 International Licence)

Languageː English

Gendering Documentation: A Manual For and About Women Human Rights Defenders goes beyond traditional human rights documentation guides to provide a unique tool for capturing the specific nature of contexts facing, advocacy of and violations against WHRDs. It explores abuses related to gender, their gendered consequences, the many purposes of documenting WHRDs’ lives, various forms of WHRD advocacy with documentation, and steps to take to create documentation processes and products that are both gender-sensitive and gender-responsive.

  • Women's Media Center - 'Speech project'

Linkː http://wmcspeechproject.com/online-abuse-101/

Licenseː Copyright

Languageː English

The WMC Speech Project is dedicated to raising public and media awareness about online harassment. The past several years have seen an increase in news, as well as a growing understanding that online harassment is a social, civil rights and workplace issue. However, many people, and institutions, think of harassment as “bullying,” instead of its much more complex and dynamic reality. While online abuse can and does happen to anyone, the focus of this project is on the ways in which women’s rights and expression are affected by intersectional harassment related to their gender, class, race, sexuality and more.

Manuals produced by individuals

  • How to Survive the Internet: Strategies for Staying Safer Online by Yael Grauer'

Linkː https://yaelwrites.com/wp-content/uploads/2014/11/saferonline.pdf

Licenseː ?

Languageː English

Being subjected to threats, unwanted contact, compromised accounts, hacked websites, or having sensitive information shared online is an awful experience. In the midst of this, it can be confusing to know how to react and which steps to take to protect yourself. You’re likely to get conflicting advice on whether to take incidents seriously or ignore them, and trying to get up to speed on online security strategies with limited technical knowledge can make an already stressful situation more overwhelming. It’s not always obvious who’s responsible for ongoing harassment or how many people are involved, and trying to address a threat with limited information can be difficult. Please remember that you are not alone. If you were, this guide wouldn't be here. You will get through this.

  • Necesito Privacidad para la autonomia de mi deseo by Lucía Egaña y Julieta Rodríguez (Platohedro)'

Linkː http://lucysombra.org/TXT/Fanzine_necesito_privacidad.pdf https://archive.org/details/FanzineNecesitoPrivacidad

Licenseː CC Attribution-Noncommercial-Share Alike 3.0

Languageː Spanish

Nos planteamos pensar la seguridad feminista de forma expandida hacia diversas áreas de nuestra vida aprendiendo herramientas concretas para fortalecer la seguridad y privacidad digital. A través de estas herramientas y sus funcionalidades buscamos pensar en las vulnerabilidades cotidianas y cómo éstas se comportan atravesadas por el género.

  • Smart Girl's Guide to Privacy by Violet Blue'

Linkː https://www.nostarch.com/smartgirlsguide

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Copyright

Languageː English

In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: Delete personal content from websites; Use website and browser privacy controls effectively; Recover from and prevent identity theft; Figure out where the law protects you—and where it doesn’t; Set up safe online profiles; Remove yourself from people-finder websites.

  • Twenty ways to help someone who's being bullied online..... by Laurie Penny'

Linkː https://www.patreon.com/posts/12240673

Licenseː Copyright

Languageː English

Online abuse is real, and it sucks, and facing it down has nothing to do with 'strength.' If someone you know is experiencing online harassment, it can be very hard to know what to do or say. Here's a working list of suggestions for how to behave and how not to behave, based on extensive personal experience - mine and other people's. Mainly it boils down to everyone being a bit bloody braver. I hope this helps. 

  • So, you’re getting harassed on the Internet. What do you do now? by Deanna Zandt'

Linkː https://medium.com/@deanna/so-you-re-getting-harassed-on-the-internet-what-do-you-do-now-c30207cae0c

Licenseː Copyright

Languageː English

The past year or so has seen an incredible intense ramp-up around online harassment and abuse. It’s as if everyone who ever had a sadistic digital thought ever looked at the #gamergate mess and said, “Yeah! That’s what I want to do!” Many people feel helpless in the face of such attacks. But there ARE things you can do, right now, to protect yourself. Read on.

  • Programas de radio El Desarmador por Imilla hacker'

Linkː https://archive.org/details/@imilla_hacker&tab=uploads and http://www.eldesarmador.org/

You can download chapter 2ː But this is just my phoneǃ (https://www.nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf)

Licenseː Creative Commons Attribution-NonCommercial 4.0 International

Languageː Spanish

El Desarmador es una iniciativa de La Imilla Hacker (https://imillahacker.sdf.org). Imilla es la voz quechua/aymara que quiere decir niña o mujer joven. Somos un colectivo enfocado en la producción de contenidos alternativos sobre tecnopolítica y sociedad; con la intención de abrir las puertas al análisis de varios temas como la privacidad, el anonimato, la vigilancia, la gobernanza de internet, la violencia en línea contra las mujeres, y la apropiación de la infraestructura de las telecomunicaciones.

  • Podcasts Señoras de internet'

Linkː https://soundcloud.com/tristanaproducciones/sets/senoras-de-internet

Licenseː ?

Languageː Spanish

Señoras de internet es un podcast ciberfeminista acerca de los futuros porvenires tecnológicos. Es, también, una invitación en formato de podcast a un té radial en el que se degustan las agridulces contradicciones del presente tecnopolítico.

Ladies of the Internet is a cyberfeminist podcast about future technological achievements. It is also an invitation in podcast format to a radio tea in which the bittersweet contradictions of the technopolitical present are tasted.

Before producing a manual

Before producing a new manual some questions we should askː

  • Don't reinvent the wheelǃ Are you duplicating upstream work?
  • If a similar manual is already available Who's behind it? Is it a long-term project or a one shot one? Can you continue or complement their work?
  • Who's the public and what are the objectives ? What are their security & technical levels? What are their comprehension about feminism?
  • Who will produce/develop it and for whom (generational gap, geographical location, socio-demographic dimension)?
  • Will your manual will be more about tools and how to configure those, or will it be more about threat modelling and/or behavioural processes?
  • Under which license will you distribute it and which rights will you grant third parties (access, use, copy, remix, etc)?
  • Credits your reviewers and experts that have provided you with feed back!!
  • How will you maintain it? This encompass questions about frequency of updates needs depending of the tools and processes you will detail, and about processes you will run to engage your community in updating contents with you.
  • How will you get feedback and peer review from readers? Will you be able to include all the feed back? (Some criteria will deal with correctness, completeness, up to date). Remember to always indicate the last date the manual has been updated/released.
  • How will you achieve or not translation & translatability of your manual? Which type of platforms will you use for achieving the translation? Will you achieve also cultural translation for instance?
  • Accessible for disable people
  • Will you provide further support to the readers such as a contact mail or a hotline?
  • How will you ensure that your contents are ethical, inclusive and trans-queer-feminist "approved"?
  • How will we monitor the impact of our self learning resources/Impact Assessment methodologies?
  • How the distribution will be done? What is the target public?
  • Think about potential partnerships (researchers, academia, volunteer translators etc)