Difference between revisions of "Main Page"

From Weaponized Social
Jump to navigation Jump to search
Line 21: Line 21:
  
 
==Patterns==
 
==Patterns==
 +
Patterns are meant to be used both in building a topological structure that can be used to identify surface area in a person's online, written, and verbal communications (focused on public exchanges); as well as to determine possible responses and mitigations. We are seeking (and in lieu of finding one --building) an authoritative lisk of risk factors.
 +
: Matt says: "Can we build an analog to a Common vulnerability database for our public persona? Can we analyze our communications and identify those issues and mitigate the risk from them?  Can this be automated in a way that reduces risk without increasingly complexity in this area?"
 +
: "Being able to reduce exposure to these sort of attacks, and strengthen the ability for a message to maintain a coherent and uncorrupted signal would be an ideal end goal.  The secondary and yet still required goal is to ensure that any such approach is not complex for the person performing the act of communication.  Unbalancing the capacity for discourse is a risk all its own."
 +
 
===Prevention===
 
===Prevention===
 
====Community Guidelines====
 
====Community Guidelines====
Line 65: Line 69:
  
 
'''[https://cyber.law.harvard.edu/events/2014/10/thecomingswarm Distributed Denial of Service]''' : DDoS'ing is the use of many machines to constantly ping one server (or a set of servers), in order to bring down that site or network. Used both in activism and in general attacks.
 
'''[https://cyber.law.harvard.edu/events/2014/10/thecomingswarm Distributed Denial of Service]''' : DDoS'ing is the use of many machines to constantly ping one server (or a set of servers), in order to bring down that site or network. Used both in activism and in general attacks.
 +
: Matt says: "Russia is not the first to use flame wars and public shaming as a tool to silence critics. And in their attacks and others I see similarities to DDOS style attacks in the internet. Reflector attacks in networks make use of loud commonly accessible services such as dns to overload communications with noise. Tying issues into other issues through fallacy or other exploitative means as a way to force bipartisanship and offence works similarly as a tactic."
  
 
====Societal Critique====
 
====Societal Critique====

Revision as of 15:20, 13 April 2015

The existing harms of social scripts we ran while in smaller, geographically-constrained groups are being amplified due to network effect. Tiny unchecked errors, scaled, become large harms as people find ways to exploit them, in life just as in software. - Meredith

Weaponized Social is a series of events, discussion, action, and surrounding community to examine the network effects of human interaction, to encourage the healthy and to deweaponize the powerful tools at our fingertips. We welcome you to join us at an event, on our mailing list, or to hold space as well.

ALERT: Due to ongoing spam problems, we have had to disable anonymous editing and self-service account creation. 
We ABSOLUTELY welcome contributions to this wiki; please contact info@aspirationtech.org to request an account. 
We apologize for the hassle!

Events

Past

Upcoming

Tentative

Patterns

Patterns are meant to be used both in building a topological structure that can be used to identify surface area in a person's online, written, and verbal communications (focused on public exchanges); as well as to determine possible responses and mitigations. We are seeking (and in lieu of finding one --building) an authoritative lisk of risk factors.

Matt says: "Can we build an analog to a Common vulnerability database for our public persona? Can we analyze our communications and identify those issues and mitigate the risk from them? Can this be automated in a way that reduces risk without increasingly complexity in this area?"
"Being able to reduce exposure to these sort of attacks, and strengthen the ability for a message to maintain a coherent and uncorrupted signal would be an ideal end goal. The secondary and yet still required goal is to ensure that any such approach is not complex for the person performing the act of communication. Unbalancing the capacity for discourse is a risk all its own."

Prevention

Community Guidelines

Guide for Supporting Activism

Anti-Harassment Policies, such as those from the Ada Initiative

For Responding

Opting Out / Third Path

Facing History : Facing History and Ourselves provides ideas, methods, and tools that support the practical needs, and the spirits, of educators worldwide who share the goal of creating a better, more informed, and more thoughtful society.

Nonviolent Communication / Self Efficacy

Self-Awareness Checklist

How to Critique Me

Defense

The Online Abuse Prevention Initiative : OAPI is a nonprofit organization dedicated to reducing and mitigating online abuse through:

  • the study and analysis of abuse patterns
  • the creation of anti-harassment tools and resources
  • collaboration with key tech companies seeking to better support their communities

Countering Online Harassment Support Guide COHSG is everything we collectively know about how to protect yourself from online attacks, in one handy guide.

  • Looking for: Testers (practical implementation)

Security Lockdown: A Lay Person's Guide to Baseline Privacy : This episode led me to ruminate on how dehumanizing the Internet can be, how deeply socialized gender is, and how elusive privacy has become. This write-up also includes a fantastic list of online safety resources.

What to do if Trolls have doxx'd you : if trolls have doxx'd you, let your friends and family on Facebook know there may be fake accounts impersonating you for information

Blocking

Block Together A web app intended to help cope with harassment and abuse on Twitter.

For Attacking

For Both

Activiating Bystanders

Wielding the Privilege Sword

Counter Speech : Panzagar began by creating a meme. A person (usually a cute young woman, as drawn by the team’s animé-loving volunteer illustrators) holds a flower in her mouth. Taking a cue from this symbolic commitment not to use or tolerate speech that can “spread hate among people,” as Nay Phone Latt puts it, thousands of people ‘liked’ Panzagar’s Facebook page within days of its creation, and many have posted photographs of themselves holding flowers in their mouths.

Distributed Denial of Service : DDoS'ing is the use of many machines to constantly ping one server (or a set of servers), in order to bring down that site or network. Used both in activism and in general attacks.

Matt says: "Russia is not the first to use flame wars and public shaming as a tool to silence critics. And in their attacks and others I see similarities to DDOS style attacks in the internet. Reflector attacks in networks make use of loud commonly accessible services such as dns to overload communications with noise. Tying issues into other issues through fallacy or other exploitative means as a way to force bipartisanship and offence works similarly as a tactic."

Societal Critique

Women, Action, and the Media : WAM! is a people-powered independent nonprofit dedicated to building a robust, effective, inclusive movement for gender justice in media.

Shaming

Shaming on Twitter

Should Mom-and-Pops That Forgo Gay Weddings Be Destroyed?

If their Yelp rating goes down by a star does the punishment fit the "crime"? Is there a financial loss at which social pressure goes from appropriate to too much? How about putting them out of business? Digital mobs insulting them and their children? Email and phone threats from anonymous Internet users? If you think that any of those go too far have you spoken up against the people using those tactics?

Doxxing : used both for attacking prominent women in gaming, but also for things like #hoodsoff