Search by property
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Digital Security in Abya Yala, the land of vital blood. + (For a long time with our partners of the c … For a long time with our partners of the communityhackmitin (http://hackmitin.espora.org), we discuss the role we had and wanted to play in this context. Then I joined some friends who were already working around digital security and I begun to provide workshops. At that time acknowledgement and understanding on the surveillance and monitoring of people through social medias did not have the media coverage and relevance it has nowadays and we had almost to beg people to enroll in our workshops, we were trying to contact and generate strategies for groups that were at risk and we felt very frustrated by our inability to show the relevance of those issues and to encourage the use of privacy and digital security tools. We talked many times about it, what we were missing?, why people end up not using the tools? We thought it was education, that it was a cultural thing, that it was due to the perception of uselessness in such a gore country where your life means nothing and is all the time hanging by a thread. After a while some colleagues were more inclined to address the issue from a purely technical level, in my case I was increasingly thinking that it was relevant to adopt a feminist approach even though I did not really know what it could mean. For me, attending the Gender and Technology Institute turned to be a very intense experience and I have to admit that it was not until the Circumvention Tech Festival that I could begin to put a name and give voice to the range of emotions the GTI had caused in me. To be nourished with reflections from such a broad diversity and understanding the holistic security approach served me a lot. Back to Mexico, a couple of weeks ago, a unique opportunity came along as I was contacted to give a workshop to a group of journalists who were in trouble. This was the first time I had all the conditions to prepare the workshop with a good combination of all these reflections: Proper time, interests and economic resources. As I was planning and designing the workshop, the aims and purposes become more clear: * to generate a safe and intimate environment in which we can expose what we feel, fear, anxiety, and uncertainty. * to create the conditions in which we knowledge the need for every participant to advance at her own rhythm, integrating the dimension of the differential ways of accessing to technology driven by characteristics such as gender, and then strengthen the conditions that people could develop their autonomy independently but in a collective context. * Stop seeing the technology as a black box in order to be able to understand the strengths and limitations of the tools that we have at disposition in relation to the temporality they are embedded in. * Use tools for data encryption and anonymity. * Understand digital security from a holistic perspective. To achieve this I also talked to my fellow theater collective that works with popular education, in order to prepare and adapt some games. I prepared the materials and resources to be screened during the workshop. I made a list of materials we could use such as leaves and feathers. The workshop lasted 16 hours and was developed in two days, it was attended by 6 people and at the end they could encrypt their mails, use TAILS and erased metadata. We are now in the process of monitoring and follow up and the integration of other tools such as using IM clients that can support encryption.ng IM clients that can support encryption.)