Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
articles:guest_article_1 [2025/06/05 14:11] – ipek | articles:guest_article_1 [2025/06/05 14:19] (current) – ipek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | **Guest article: An Excerpt from 'How to Cypher Sex: A manual for collective digital self defense guides** | + | **Guest article |
Find the full text on [[https:// | Find the full text on [[https:// | ||
Line 7: | Line 7: | ||
In most resources, guides and trainings, the tips and strategies used to protect ourselves from harm when using online tools and digital devices are usually presented using the terms “digital security” or “cybersecurity.” In this manual (and our previous guides), we prefer to focus on “self-defense” from a more self-empowered position rather than on the term “security.” For example, when we think about security we tend to think about something monolithic like a nuclear fallout bunker. While these shelters are certainly considered relatively safe in one of the worst scenarios imaginable, finding security in such a place means there is very little else you can do apart from passively hiding underground until the end of time. Additionally, | In most resources, guides and trainings, the tips and strategies used to protect ourselves from harm when using online tools and digital devices are usually presented using the terms “digital security” or “cybersecurity.” In this manual (and our previous guides), we prefer to focus on “self-defense” from a more self-empowered position rather than on the term “security.” For example, when we think about security we tend to think about something monolithic like a nuclear fallout bunker. While these shelters are certainly considered relatively safe in one of the worst scenarios imaginable, finding security in such a place means there is very little else you can do apart from passively hiding underground until the end of time. Additionally, | ||
- | When used in the digital sphere, the term “security” additionally usually refers to a top-down vision of protection from digital threats that are often based on mainstream perceptions rather than on facts. For example, consider how the 1983 movie *WarGames* led then-US President Ronald Reagan to sign The Computer Fraud and Abuse Act of 1984 whose interpretation would become so broad and vague that it would eventually turn online activism into a serious felony comparable to an armed attack.[27] As already discussed in the preface, we have more recently seen fighting the “sexual exploitation of children or sex trafficking” used to undermine net neutrality with FOSTA/ | + | When used in the digital sphere, the term “security” additionally usually refers to a top-down vision of protection from digital threats that are often based on mainstream perceptions rather than on facts. For example, consider how [[https:// |
Without a deep reflection on these trends, often even technologists tend to apply the same top-down cybersecurity approach when using their skills to support grassroots movements and civil society. In the past few years, we have seen attempts at “teaching digital security” to activists and human rights defenders by training them on the use of “secure tools” without making sure that those tools actually matched their threat model with their needs and goals. In the end, this so-called “digital security” approach is counterproductive because tools that are secure but make life more difficult tend to be discarded in favor of less safe approaches that have proved to be good enough to reach a specific outcome. In other words, in emergency cases or when our stress level peaks, we tend to accept some risks as long as we can achieve what we need to overcome an acute crisis. | Without a deep reflection on these trends, often even technologists tend to apply the same top-down cybersecurity approach when using their skills to support grassroots movements and civil society. In the past few years, we have seen attempts at “teaching digital security” to activists and human rights defenders by training them on the use of “secure tools” without making sure that those tools actually matched their threat model with their needs and goals. In the end, this so-called “digital security” approach is counterproductive because tools that are secure but make life more difficult tend to be discarded in favor of less safe approaches that have proved to be good enough to reach a specific outcome. In other words, in emergency cases or when our stress level peaks, we tend to accept some risks as long as we can achieve what we need to overcome an acute crisis. |