Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
articles:guest_article_1 [2025/06/05 14:16] – ipek | articles:guest_article_1 [2025/06/05 14:19] (current) – ipek | ||
---|---|---|---|
Line 7: | Line 7: | ||
In most resources, guides and trainings, the tips and strategies used to protect ourselves from harm when using online tools and digital devices are usually presented using the terms “digital security” or “cybersecurity.” In this manual (and our previous guides), we prefer to focus on “self-defense” from a more self-empowered position rather than on the term “security.” For example, when we think about security we tend to think about something monolithic like a nuclear fallout bunker. While these shelters are certainly considered relatively safe in one of the worst scenarios imaginable, finding security in such a place means there is very little else you can do apart from passively hiding underground until the end of time. Additionally, | In most resources, guides and trainings, the tips and strategies used to protect ourselves from harm when using online tools and digital devices are usually presented using the terms “digital security” or “cybersecurity.” In this manual (and our previous guides), we prefer to focus on “self-defense” from a more self-empowered position rather than on the term “security.” For example, when we think about security we tend to think about something monolithic like a nuclear fallout bunker. While these shelters are certainly considered relatively safe in one of the worst scenarios imaginable, finding security in such a place means there is very little else you can do apart from passively hiding underground until the end of time. Additionally, | ||
- | When used in the digital sphere, the term “security” additionally usually refers to a top-down vision of protection from digital threats that are often based on mainstream perceptions rather than on facts. For example, consider how [[https:// | + | When used in the digital sphere, the term “security” additionally usually refers to a top-down vision of protection from digital threats that are often based on mainstream perceptions rather than on facts. For example, consider how [[https:// |
Without a deep reflection on these trends, often even technologists tend to apply the same top-down cybersecurity approach when using their skills to support grassroots movements and civil society. In the past few years, we have seen attempts at “teaching digital security” to activists and human rights defenders by training them on the use of “secure tools” without making sure that those tools actually matched their threat model with their needs and goals. In the end, this so-called “digital security” approach is counterproductive because tools that are secure but make life more difficult tend to be discarded in favor of less safe approaches that have proved to be good enough to reach a specific outcome. In other words, in emergency cases or when our stress level peaks, we tend to accept some risks as long as we can achieve what we need to overcome an acute crisis. | Without a deep reflection on these trends, often even technologists tend to apply the same top-down cybersecurity approach when using their skills to support grassroots movements and civil society. In the past few years, we have seen attempts at “teaching digital security” to activists and human rights defenders by training them on the use of “secure tools” without making sure that those tools actually matched their threat model with their needs and goals. In the end, this so-called “digital security” approach is counterproductive because tools that are secure but make life more difficult tend to be discarded in favor of less safe approaches that have proved to be good enough to reach a specific outcome. In other words, in emergency cases or when our stress level peaks, we tend to accept some risks as long as we can achieve what we need to overcome an acute crisis. |