Post-Platform Digital Publishing Toolkit

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
articles:guest_article_1 [2025/06/10 18:59] wgparticles:guest_article_1 [2025/06/10 20:02] (current) wgp
Line 17: Line 17:
 Digital self-defense can only be effective if it has a holistic approach. Even when a threat is based exclusively in the physical or in the digital sphere, its ramifications always encompass all the contexts of our life; physical, psychosocial, digital and political. For example, intimate partner violence can extend from the physical to the digital level through spying apps or through surveillance over social media accounts while attacks started by mobs at the digital level can expand to the physical level through doxing and physical threats. Of course, violence of any kind always exposes survivors to trauma which can lead to further harm at the social and physical level; for example, due to bias against psychological issues or because of psychosomatic disorders. Digital self-defense can only be effective if it has a holistic approach. Even when a threat is based exclusively in the physical or in the digital sphere, its ramifications always encompass all the contexts of our life; physical, psychosocial, digital and political. For example, intimate partner violence can extend from the physical to the digital level through spying apps or through surveillance over social media accounts while attacks started by mobs at the digital level can expand to the physical level through doxing and physical threats. Of course, violence of any kind always exposes survivors to trauma which can lead to further harm at the social and physical level; for example, due to bias against psychological issues or because of psychosomatic disorders.
  
-A more empowering approach to protection starts with participatory threat modeling; a collective reflection of our fears including what is more or less likely to happen to us, who our adversaries and allies are, as well as how we can improve our practices to better protect ourselves, our activities and our peers. Fundamentally, we consider how to reach our practical goals and even to make some dreams come true. In this manual, we call this overall participatory approach “digital self-defense” and we use this term to talk about the practices of digital protection with the hope to encourage those interested in writing a digital self-defense guide to take control of their own digital safety. Through techniques aimed at assessing risks in online practices, the users of this manual will be able to reflect on their own needs and goals and thus be empowered to choose specific solutions for their own guides that can help them secure their current practices – instead of adapting their existing practices to new tools for the sake of a higher “security.”+A more empowering approach to protection starts with participatory threat modeling; a collective reflection of our fears including what is more or less likely to happen to us, who our adversaries and allies are, as well as how we can improve our practices to better protect ourselves, our activities and our peers. Fundamentally, we consider how to reach our practical goals and even to make some dreams come true. In this manual, we call this overall participatory approach “digital self-defense” and we use this term to talk about the practices of digital protection with the hope to encourage those interested in writing a digital self-defense guide to take control of their own digital safety. Through techniques aimed at assessing risks in online practices, the users of this manual will be able to reflect on their own needs and goals and thus be empowered to choose specific solutions for their own guides that can help them secure their current practicesinstead of adapting their existing practices to new tools for the sake of a higher “security.”
  
 We also see the word “self-defense” as fundamentally linked to feminist collective organizing; particularly in regards to sharing knowledge, skills and best practices. Feminists have historically used this term to talk about women’s right to protect themselves and to assert their rights and boundaries. However, in order to consider all the possible levels where harm can happen, self-defense also needs to adopt an intersectional approach that includes queer people, sex workers and other marginalized groups. In order to correctly assess and address the threats for a specific group or individual, we need to consider their social and political context and take into account the multiple systems of oppression and domination they are exposed to. Let’s not forget that online violence is just an extension of physical violence and can sadly amplify it even more. In short, we believe knowledge on how to protect ourselves from digital threats should be shared among the most vulnerable groups. We also see the word “self-defense” as fundamentally linked to feminist collective organizing; particularly in regards to sharing knowledge, skills and best practices. Feminists have historically used this term to talk about women’s right to protect themselves and to assert their rights and boundaries. However, in order to consider all the possible levels where harm can happen, self-defense also needs to adopt an intersectional approach that includes queer people, sex workers and other marginalized groups. In order to correctly assess and address the threats for a specific group or individual, we need to consider their social and political context and take into account the multiple systems of oppression and domination they are exposed to. Let’s not forget that online violence is just an extension of physical violence and can sadly amplify it even more. In short, we believe knowledge on how to protect ourselves from digital threats should be shared among the most vulnerable groups.
Line 27: Line 27:
 ---- ----
  
-Find the manual in its entirety on [[https://cyphersex.org]].  --- //[[[email protected]|Well Gedacht Publishing]] 2025/06/10 09:46//+Find the manual in its entirety on [[https://cyphersex.org]].
articles/guest_article_1.1749581954.txt.gz · Last modified: by wgp
  • Show page
  • Old revisions
  • Back to top
  • Recent Changes
  • Media Manager
  • Sitemap
  • Log In