Tools
Why / Find / Add / How to guide/ Tools
tools for suggested for daily life use:
To Employ Strategies of Care and Consent We Need to Develop Our Understanding of the Online Spaces We Participate In
Browsers:
https://duckduckgo.com
https://www.torproject.org
Messaging: Signal or telegram
Coding Rights https://www.codingrights.org https://codingrights.org/docs/ConsentToOurDataBodies.pdf
Do.doc collaborative tool
https://latelier-des-chercheurs.fr/en/tools/dodoc
References & Ethics:
Ethics of care by Joan Tronto
"On the most general level, we suggest that caring be viewed as a species activity that includes everything that we do to maintain, continue, and repair our 'world' so that we can live in it as well as possible. That world includes our bodies, our selves, and our environment, all of which we seek to interweave in a complex, life-sustaining web"
The Soup’s On Us: Introducing the Information Maintainers
http://themaintainers.org/blog/2019/6/18/the-soups-on-us-introducing-the-information-maintainers
Obfuscation: A User's Guide for Privacy and Protest
http://93.174.95.29/_ads/A12390BC1AE72C7F762559CCB4266D93\
General Privacy Tips for All
☺ Use password protection on all your devices ☺ Use HTTPS:// instead of HTTP:// this
adds a layer of security by encrypting your
traffic to that page
☺ It is recommended to use Mozilla Firefox and
Tor browsers
18
19 Not Found On on networking and programming @ https:// wizardzines.com Questioning Your Tools ‘Gender and Technology Institute
(GTI) events, and the accompanying curricula, look at feminist critiques and perspectives of technology, how women and LGBTIQ people are disproportionately targeted by hate speech and gender based violence online and offline, and the initiatives and practices enabling women and LGBTIQ to include themselves in privacy and security.’ — gendersec.tacticaltech.org
In order to assist in questioning your online practices, here are highlights from a resource created as part GTI’s Gendersec Curricula. Feminist Queer and Creative Uses of Social Media What should feminist queer collectives pay attention to when using social media to campaign, raise awareness and strengthen their voices? How do we balance the benefit of using social media against the possible trade-offs for privacy and security? What terms and conditions are we accepting when we make that call? ☺ Use the private/incognito mode on your browser when you don’t want to leave traces of the pages you visit on your computer ☺ Try to use free, ‘Open-Source’ software and operating systems over closed-source and corporate options ☺ Try and avoid centralised and corporate providers and support autonomous and distributed media and networks Autonomous Alternatives to Use in Daily Life Searchengine:https://www.duckduckgo.com Video chat: https://jitsi.org Mail: https://riseup.net https://autistici.org Messaging:https://www.signal.org https://telegram.org https://joinmastodon.org Social network: https://we.riseup.net https://joindiaspora.com Maps: https://www.openstreetmap.org http://openrouteservice.org Documents: https://framasoft.org/en/
This information is collated from a Not Found On workshop held in June 2019, from Know Your Tools resource created by LAG, Amsterdam and https://www.robotstxt.org. To go more in depth check out Julia Evans’ awesome zines
What data might you want to protect? Things such as personally identifiable and sensitive personal information, your location (geolocation or IP adress), your social networks and contacts and/or the contents of your communication are all important to consider. It is not possible to protect all these assets at the same time, and protecting one might expose another. Ask yourself: What social media platforms do you use the most and what for? What personal data does the platform collect? Who do they share this data with? Is it clear who the third parties are? What do they use it for? How long do they keep this data? Where are the servers hosting this data? What privacy laws protect your information? There are four necessary types of identities we can use or display when we are online: Real/legal Collective Anonymous Pseudonymous We can use these in combination with the ‘four guardian angels of social media’ that are included in the strategies of resistance framework: 21 Not Found On Reduction: Less is more! Data that is not created can’t be collected, analysed, stored or sold. This strategy is based on the premise that the less data we produce, the better. Obfuscation: Hide in the crowd! This strategy involves creating a lot of fake information so that companies, governments or other individuals do not understand which data is true and which is false. Compartmentalisation: Manage multiple personas online by separating different social networks, interests, behaviour, information and identities into different ‘compartments’. Fortification: My devices, my rules! Create barriers, restrict access and visibility. This strategy is to keep your data safe from prying eyes. Practical Tips Pictures: Make sure that you don’t tag people and double-check with people before sharing personally identifiable photos of them (especially at political events). Location: Ensure that geolocation services are off. Webcam: Simple but effective: cover your webcam when it’s not in use. Mobile phone: When using social media on your mobile phone, opt for the browser version, as the app collects much more data. Diversify uses: ☺ Do not centralise everything on one platform. If a centralised account gets suspended, the group or the individual might be completely cut off. This situation can be avoided by maintaining various channels and practices of compartmentalisation. ☺ For example, a Facebook profile or Twitter account can be used by various people sharing the same profile. This creates confusion with trackers and minimises the amount of data we all share individually. ☺ Social media platforms are not safe for documentation and archiving. Many groups have had their pages suspended either for violating platform policies or through coordinated attacks by adversaries that reported the page or profile. ☺ Direct messages on Twitter and Facebook, closed groups and any other Facebook services are not safe tools for internal communication and political organisation. They can pose a threat to the privacy and security of participants from both the platforms and possible infiltrators / hate groups. Full version of workshop can be found @ gendersec.train.tacticaltech.org