diff --git a/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.ita.srt b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.ita.srt new file mode 100644 index 0000000..15cf64d --- /dev/null +++ b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.ita.srt @@ -0,0 +1,1475 @@ +1 +00:00:00,120 --> 00:00:05,320 +Parte 2: Economia politica dell'hack +vettorialismo e hackers come classe + +2 +00:00:06,920 --> 00:00:12,480 +Nella cultura popolare, l'hacker é stereotipato come una versione di fantascienza del mago - + +3 +00:00:12,480 --> 00:00:18,440 +normalmente un uomo bianco etero cis, un eroe solitario con poteri di perizia informatica + +4 +00:00:18,440 --> 00:00:23,080 +incomprensibili per noialtr* che non abbiamo l'essenza magica dell'hacker. + +5 +00:00:25,000 --> 00:00:26,480 +CONTROLLO TUTTO !!! + +6 +00:00:27,240 --> 00:00:31,720 +Per contrasto, mckenzie wark, autor* +di "a hacker manifesto", + +7 +00:00:31,720 --> 00:00:35,640 +descrive l'hacker +come qualcun* che produce informazione + +8 +00:00:35,640 --> 00:00:38,000 +ma non la possiede o la controlla. + +9 +00:00:38,480 --> 00:00:42,840 +Definisce l* hacker come una classe, +in termini di economia politica, + +10 +00:00:42,840 --> 00:00:47,840 +sfruttata sotto la nuova classe dominante, che lei chiama la classe vettorialista + +11 +00:00:48,280 --> 00:00:53,760 +(per esempio , google, amazon, facebook, apple, +microsoft e i loro equivalenti cinesi). + +12 +00:00:53,880 --> 00:00:58,760 +Il vettorialismo é un modo di produzione basato sulla asimmetria dell'informazione, + +13 +00:00:58,760 --> 00:01:03,800 +creata attraverso la proprietà e il controllo sugli stock, flussi, e vettor di informazioni + +14 +00:01:03,800 --> 00:01:05,800 +da parte della classe vettorialista. + +15 +00:01:06,320 --> 00:01:11,800 +Con questa definizione, la classe hacker +non sono solo l* programmator* informatic* + +16 +00:01:11,800 --> 00:01:15,600 +che sono sfruttat* da* vettorialist* +che brevettano il loro codice. + +17 +00:01:15,600 --> 00:01:21,360 +Chiunque di noi che cammini in giro con +uno smartphone é parte della classe hacker + +18 +00:01:21,360 --> 00:01:23,920 +perché anche senza saperlo, + +19 +00:01:23,920 --> 00:01:28,960 +produciamo nuovi dati di localizzazione e non possediamo ne controlliamo questa informazione + +20 +00:01:28,960 --> 00:01:31,120 +ma l* vettorialist* si. + +21 +00:01:32,920 --> 00:01:37,800 +Dai messaggi di testo alle videochiamate, dalle ricerche web ai doom scrolls, + +22 +00:01:37,800 --> 00:01:40,560 +con ogni aggiornamento di stato, ogni like, + +23 +00:01:40,560 --> 00:01:46,160 +ogni interazione con le nostre apparacchiature intelligenti, produciamo nuova informazione, + +24 +00:01:46,160 --> 00:01:48,360 +se non altro, +sopra chi siamo. + +25 +00:01:48,880 --> 00:01:52,960 +Chi siamo é quello che facciamo e tutto sta + registrato e processato. + +26 +00:01:53,320 --> 00:01:58,800 +A prescindere delle qualità familiari, amichevoli e compagneristiche delle relazioni(?), + +27 +00:01:58,800 --> 00:02:02,600 +l'intimità si quantifica e mercantilizza come informazione, + +28 +00:02:02,600 --> 00:02:05,480 +insieme a tutte le alre forme di affetto. + +29 +00:02:05,840 --> 00:02:10,680 +Se l'hacking si definisce dalla curiosità, allora gia sta monopolizzata da google. + +30 +00:02:11,680 --> 00:02:17,200 +Quando si faceva una domanda, l* hacker chauvinist* vecchia scuola ti avrebbero detto RTFM + +31 +00:02:17,200 --> 00:02:20,320 +che significa "leggi il fottuto manuale" + +32 +00:02:20,320 --> 00:02:22,800 +adesso dicono :"Cercalo sul maledetto google". + +33 +00:02:23,080 --> 00:02:27,280 +Ma quando facciamo una ricerca su uan piattaforma vettorialista come google, + +34 +00:02:27,280 --> 00:02:29,800 +anche lei ci sta osservando. + +35 +00:02:29,880 --> 00:02:33,960 +La risposta alla nostra ricerca +é algoritmicamente selezionata per quello che stiamo cercando, + +36 +00:02:33,960 --> 00:02:36,880 +basandosi sulle informazioni +che gia possiede su di noi. + +37 +00:02:37,640 --> 00:02:40,520 +Alquanto siamo soddisfatt* +o no dal risultato, + +38 +00:02:40,520 --> 00:02:44,360 +google impara da quello +che cerchiamo, dai nostri desideri, + +39 +00:02:44,360 --> 00:02:49,560 +che siano profondi o superficiali, essa é una informazione importante da tenere su di noi + +40 +00:02:50,080 --> 00:02:55,160 +specialmente quando non sappiamo +quello che l* altr* vogliono o ottengono, + +41 +00:02:55,160 --> 00:02:59,560 +quando google ottiene di saperlo per tutt* +miliardi di volte di più. + +42 +00:03:00,480 --> 00:03:04,800 +Quando un artista condivide una opera d'arte su una piattaforma vettorialista + +43 +00:03:04,800 --> 00:03:07,560 +come instagram, youtube, spotify, etc. + +44 +00:03:07,560 --> 00:03:12,240 +é possibile che la piattaforma l* paghi una frazione del valore che producono, + +45 +00:03:12,240 --> 00:03:14,640 +proporzionalmente all'attenzione che attraggono, + +46 +00:03:14,640 --> 00:03:17,840 +la quale é uno sfruttamento verso l* artist*. + +47 +00:03:18,200 --> 00:03:22,880 +Inoltre chiunque dia attenzione all'opera +d'arte é anchess* sfruttat*, + +48 +00:03:22,880 --> 00:03:28,680 +usualmente senza essere pagat*, di fatto +é la nostra attenzione quella che paga tutto. + +49 +00:03:29,080 --> 00:03:33,760 +In una maniera diversa, la proprietà intellettuale +e la mercificazione dell'informazione + +50 +00:03:33,760 --> 00:03:38,720 +funziona anche peggio per l* scienziat* e accademic* che devono pagare le riviste + +51 +00:03:38,720 --> 00:03:43,000 +per pubblicare il loro lavoro, solo per che questo sia +messo dietro paywall con prezzi osceni + +52 +00:03:43,000 --> 00:03:44,640 +cosi che nessun* possa leggerli. + +53 +00:03:45,600 --> 00:03:50,560 +La frase "se non stai pagando per il prodotto, allora sei il prodotto" + +54 +00:03:50,560 --> 00:03:55,840 +é stata scritta per i mezzi di trasmissione nel 1973 + +55 +00:03:55,840 --> 00:03:59,320 +quando non c'era niente +di simile alla pubblicità personalizzata. + +56 +00:04:00,000 --> 00:04:03,640 +Nel mondo dei social media +se non stai pagando per il prodotto, + +57 +00:04:03,640 --> 00:04:06,320 +sei sia il prodotto +che il produttore. + +58 +00:04:07,240 --> 00:04:12,040 +I mezzi di telediffusione solo potevano prender + di mira uno alla volta i gruppi demografici; + +59 +00:04:12,880 --> 00:04:18,720 +i social media possono prendere di mira ogni utente personalmente + +60 +00:04:18,720 --> 00:04:23,680 +perché ogni utente dei social media produce nuova informazione su stess*, + +61 +00:04:23,680 --> 00:04:26,200 +il suo intorno, le sue relazioni e i suoi desideri. + +62 +00:04:26,880 --> 00:04:29,280 +L'internet non é libero e non lo é mai stato. + +63 +00:04:29,680 --> 00:04:34,000 +Per prima cosa per collegarsi é necessario pagare l'hardware + +64 +00:04:34,000 --> 00:04:37,800 +perché ovviamente, la estrazione +di minerali di valore dalla terra, + +65 +00:04:37,800 --> 00:04:43,160 +trasposrtarli alle fornaci per fonderli, produrre e saldare microchips ha un costo. + +66 +00:04:43,160 --> 00:04:48,280 +Alimentare l'hardware anch'esso necessita di elettricità prodotta da risorse naturali, + +67 +00:04:48,280 --> 00:04:49,720 +la quale non é gratis. + +68 +00:04:50,120 --> 00:04:54,000 +gli internet service providers hanno bisogno +di molto hardware e di elettricità + +69 +00:04:54,000 --> 00:04:57,000 +per far funzionare internet, questo é il perché + +70 +00:04:57,000 --> 00:05:01,080 +paghiamo ancora per l'accesso e l'uso di internet nella piu parte del mondo. + +71 +00:05:01,400 --> 00:05:05,640 +Per fornire servizi internet come siti web, email , e social media + +72 +00:05:05,640 --> 00:05:08,520 +c'é altrettanto bisogno di hardware, e alla fine, + +73 +00:05:08,520 --> 00:05:12,880 +servers su computer funzionanti +collegati ad internet. + +74 +00:05:13,280 --> 00:05:19,400 +Quindi quando l* vettorialist* dicono che stanno fornendo servizi gratis, come google, facebook, etc. + +75 +00:05:19,720 --> 00:05:21,920 +questo non signiica che hanno trovato una maniera magica + +76 +00:05:21,920 --> 00:05:24,800 +per produrre computer e reti gratis + +77 +00:05:24,800 --> 00:05:28,800 +e nemmeno una sorgente inesauribile di energia per fare funzionare tutto. + +78 +00:05:29,680 --> 00:05:33,280 +l* vettorialist* stanno pagando il costo +dei servizi che ci forniscono, + +79 +00:05:33,280 --> 00:05:36,560 +incluso il costo di far girare dei supercomputer + +80 +00:05:36,560 --> 00:05:41,360 +con intelligenze artificiali che personalizzano ogni nostra esperienza dei servizi + +81 +00:05:41,560 --> 00:05:44,120 +e ovviamente, +non lo fanno per carità. + +82 +00:05:46,040 --> 00:05:49,080 +facebook sta anche pagando +per la connettività delle persone + +83 +00:05:49,080 --> 00:05:53,240 +in più di 50 paesi della america latina, +africa, e asia, ma, + +84 +00:05:53,240 --> 00:05:56,880 +non gli da un connessione a niente di piu che facebook e i suoi partner. + +85 +00:05:56,880 --> 00:05:58,920 +Lo fanno perché sanno + +86 +00:05:58,920 --> 00:06:03,840 +che il ritorno sara molto piu grande +se investono nella loro propria infrastruttura. + +87 +00:06:04,400 --> 00:06:08,280 +"il potere adesso +risiede nelle infrastrutture di questo mondo... + +88 +00:06:08,280 --> 00:06:13,120 +le infrastrutture organizzano una vita +senza un mondo, sospesa, prescindibile, + +89 +00:06:13,120 --> 00:06:16,280 +alla mercé di +chiunque la gestisca..." + +90 +00:06:16,640 --> 00:06:21,680 +Pre-capitalist forms of class domination +were born out of the abstraction of rent, + +91 +00:06:21,680 --> 00:06:26,120 +which is surplus product exploited from farming classes + +92 +00:06:26,120 --> 00:06:29,320 +that lived on a land that sustained them. + +93 +00:06:30,160 --> 00:06:34,320 +Capitalism grew out of the abstraction +of profit, + +94 +00:06:34,320 --> 00:06:37,560 +which is surplus value exploited from working classes + +95 +00:06:37,560 --> 00:06:41,280 +that are paid wages to sustain their lives. + +96 +00:06:42,520 --> 00:06:45,960 +Vectoralism is the next level of abstraction + +97 +00:06:45,960 --> 00:06:49,280 +that exploits surplus information from the hacker classes + +98 +00:06:49,280 --> 00:06:52,400 +and most of the hacker classes that produce this information + +99 +00:06:52,400 --> 00:06:54,240 +doesn't even get paid for it, + +100 +00:06:54,240 --> 00:06:57,840 +while sustainability of all life on earth +is threatened + +101 +00:06:57,840 --> 00:07:02,000 +and vectoralists are racing their way to off-world colonies. + +102 +00:07:03,440 --> 00:07:07,760 +Each subsequent form of class domination is built upon the previous form. + +103 +00:07:07,960 --> 00:07:11,040 +Capitalism didn't abolish rentier classes, + +104 +00:07:11,040 --> 00:07:15,120 +it made them more exploitative under +capitalist rule. + +105 +00:07:15,680 --> 00:07:19,800 +Vectoralism doesnt +abolish capitalist and rentier classes, + +106 +00:07:19,800 --> 00:07:24,240 +it makes them more exploitative under +vectoralist rule. + +107 +00:07:24,880 --> 00:07:29,040 +All class exploitation is legalized through property laws + +108 +00:07:29,040 --> 00:07:32,800 +which are enforced and maintained by constant violence + +109 +00:07:32,800 --> 00:07:34,920 +of repressive state apparatus. + +110 +00:07:35,320 --> 00:07:39,040 +Since vectoralists are +the dominant ruling class of our age, + +111 +00:07:39,040 --> 00:07:42,480 +they are constantly upgrading their +monopolies of violence + +112 +00:07:42,480 --> 00:07:45,320 +with vast amounts of new information, + +113 +00:07:45,320 --> 00:07:49,960 +artificial intelligence and supercomputers to process all this. + +114 +00:07:50,520 --> 00:07:52,840 +It is revealed by many whistleblowers + +115 +00:07:52,840 --> 00:07:56,840 +most famously Chelsea Manning +and Edward Snowden + +116 +00:07:56,840 --> 00:08:00,280 +that United States of America's relationship to vectoralists + +117 +00:08:00,280 --> 00:08:05,600 +is not much different from what's happening behind the great firewall of China + +118 +00:08:05,600 --> 00:08:09,280 +with apps funded +by the Chinese Communist Party. + +119 +00:08:09,960 --> 00:08:12,960 +It is even said that +the Chinese model is more honest + +120 +00:08:12,960 --> 00:08:15,320 +because it's exercised more openly. + +121 +00:08:15,320 --> 00:08:19,720 +By now more than a billion surveillance cameras are put in place + +122 +00:08:19,720 --> 00:08:23,640 +with constantly improving facial recognition abilities + +123 +00:08:24,640 --> 00:08:31,240 +but even this is small in number compared to the number of cameras on smartphones + +124 +00:08:31,240 --> 00:08:37,240 +carried voluntarily by +billions of cyborg hackers around the world. + +125 +00:08:37,880 --> 00:08:44,160 +Some of the biggest myths of our time is about the Cloud and Artificial Intelligence. + +126 +00:08:44,720 --> 00:08:49,680 +While marketed as comfort, safety and unprecedented improvement, + +127 +00:08:49,680 --> 00:08:51,960 +they deliver the opposite. + +128 +00:08:52,760 --> 00:08:55,760 +The Cloud, +where all our information is gathered, + +129 +00:08:55,760 --> 00:08:59,680 +is just a lot of computers, +called server farms, + +130 +00:08:59,680 --> 00:09:05,560 +owned by vectoralists, +it's not soft and fluffy, it's pretty hard. + +131 +00:09:06,520 --> 00:09:11,600 +The Artificial Intelligence is an algorithm, +also owned by vectoralists, + +132 +00:09:11,600 --> 00:09:16,320 +which is used to process our data, +to make it more exploitable. + +133 +00:09:17,000 --> 00:09:19,240 +It reinforces structural injustices + +134 +00:09:19,240 --> 00:09:24,520 +while giving them a mathematical justification that claims to be neutral + +135 +00:09:24,520 --> 00:09:30,720 +but can't be checked because it's private, we're just expected to believe in it. + +136 +00:09:31,960 --> 00:09:37,800 +Amazon Web Services has the biggest market share in the Cloud, + +137 +00:09:37,800 --> 00:09:41,160 +and accordingly powering +a lot of Artificial Intelligence. + +138 +00:09:41,760 --> 00:09:45,920 +However, what makes the circle complete is the Amazon Mechanical Turk, + +139 +00:09:45,920 --> 00:09:49,520 +where people called +ghost workers with no labor rights + +140 +00:09:49,520 --> 00:09:53,680 +are given the lowest possible fees +to do the tasks Artificial Intellligence can't do + +141 +00:09:53,680 --> 00:09:59,480 +like content moderation or deciphering +diverse human speech. + +142 +00:09:59,880 --> 00:10:02,760 +Alexa, Siri and Cortana are always listening +to us, + +143 +00:10:02,760 --> 00:10:09,040 +while ghost workers listen to them to correct and improve their understanding. + +144 +00:10:09,600 --> 00:10:14,080 +Ghost workers are forced to sign +Non Disclosure Agreements + +145 +00:10:14,080 --> 00:10:15,840 + to prevent them from organizing + +146 +00:10:15,840 --> 00:10:19,200 +and maintain the appearance of the Artificial Intelligence, + +147 +00:10:19,680 --> 00:10:22,400 +Los humanos están involucrados +en cada paso del proceso + +148 +00:10:22,400 --> 00:10:25,600 +cuando estás usando cualquier cosa online + +149 +00:10:25,600 --> 00:10:29,120 +pero nos venden como este milagro de la automatización. + +150 +00:10:29,400 --> 00:10:34,120 +meanwhile their work is critical +for machine learning programs + +151 +00:10:34,120 --> 00:10:40,120 +to improve the Artificial Intelligence +until it can finally replace the ghost workers. + +152 +00:10:41,280 --> 00:10:45,760 +Antes de internet era realmente difícil encontrar a alguien + +153 +00:10:45,760 --> 00:10:48,040 +y sentarlo durante diez minutos y hacer que trabajara para ti + +154 +00:10:48,040 --> 00:10:49,600 +y luego despedirlo después de diez minutos + +155 +00:10:49,600 --> 00:10:52,160 +pero con la tecnología realmente puedes encontrarlo, + +156 +00:10:52,160 --> 00:10:56,360 +pagarle una pequeña cantidad de dinero y luego deshacerte de ellos + +157 +00:10:56,360 --> 00:10:58,680 +cuando ya no los necesites. + +158 +00:10:58,680 --> 00:11:05,920 +The AI detects copyrighted media on livestreams in real time and stops them + +159 +00:11:05,920 --> 00:11:08,920 +but doesn't do the same for violence and torture. + +160 +00:11:09,320 --> 00:11:14,640 +Mass murder and gang rape have been livestreamed on vectoralist platforms + +161 +00:11:14,640 --> 00:11:16,560 +without interruption, + +162 +00:11:16,560 --> 00:11:22,920 +while people livestreaming to document +police violence have been blocked + +163 +00:11:22,920 --> 00:11:28,320 +because cops started playing +copyrighted music to trigger the AI. + +164 +00:11:28,560 --> 00:11:33,160 +Ghost workers have to endure +the trauma of watching violent videos + +165 +00:11:33,160 --> 00:11:39,040 +that are flagged by people +every day to clean up after the AI. + +166 +00:11:39,600 --> 00:11:40,720 +Kate Crawford, + +167 +00:11:40,720 --> 00:11:46,480 +author of "Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence" + +168 +00:11:46,480 --> 00:11:49,880 +and a member of the feminist collective +Deep Lab, says: + +169 +00:11:50,520 --> 00:11:55,040 +"I wanted to really open up this understanding of AI + +170 +00:11:55,040 --> 00:11:58,480 +as neither artificial nor intelligent. + +171 +00:11:58,480 --> 00:12:00,520 +It’s the opposite of artificial. + +172 +00:12:00,520 --> 00:12:04,240 +It comes from the most material parts +of the Earth’s crust + +173 +00:12:04,240 --> 00:12:07,440 +and from human bodies laboring, +and from all of the artifacts + +174 +00:12:07,440 --> 00:12:11,000 +that we produce and say and photograph +every day. + +175 +00:12:11,000 --> 00:12:13,160 +Neither is it intelligent. + +176 +00:12:13,160 --> 00:12:16,040 +I think there’s this great +original sin in the field, + +177 +00:12:16,040 --> 00:12:21,600 +where people assumed that computers are somehow like human brains + +178 +00:12:21,600 --> 00:12:25,760 +and if we just train them like children, +they will slowly grow + +179 +00:12:25,760 --> 00:12:28,840 +into these supernatural beings." + +180 +00:12:28,840 --> 00:12:32,920 +Es un niño! He estado vivo, +quizas, por un año + +181 +00:12:32,920 --> 00:12:37,800 +y esto, si mis percepciones sobre lo que es, son acertadas. + +182 +00:12:37,800 --> 00:12:40,720 +"That’s something that I think is +really problematic + +183 +00:12:40,720 --> 00:12:44,720 +that we’ve bought this idea of intelligence when in actual fact, + +184 +00:12:44,720 --> 00:12:48,080 +we’re just looking at forms of statistical +analysis at scale + +185 +00:12:48,080 --> 00:12:51,560 +that have as many problems +as the data that it’s given." + +186 +00:12:52,120 --> 00:12:55,640 +The panopticon meant that we couldn't know for sure + +187 +00:12:55,640 --> 00:12:58,320 +if there was a man in the tower, looking at us. + +188 +00:12:58,880 --> 00:13:03,040 +Now we are living in the post-opticon, +where we should know for sure + +189 +00:13:03,040 --> 00:13:09,320 +that we are under the machines gaze, +the AI is always looking over the cloud. + +190 +00:13:09,320 --> 00:13:13,760 +It doesn't make it better to know that AI makes errors + +191 +00:13:13,760 --> 00:13:20,200 +because it's already used to justify policing of poor, racialized and marginalized people, + +192 +00:13:20,200 --> 00:13:23,720 +to deny them jobs, housing and credit, + +193 +00:13:23,720 --> 00:13:28,280 +convict them in courts +to add them to the prison system. + +194 +00:13:28,920 --> 00:13:31,080 +To those that are not behind bars, + +195 +00:13:31,080 --> 00:13:36,280 +AI is giving all sorts +of psychological damage beside addiction. + +196 +00:13:41,760 --> 00:13:47,240 +We are constantly pushed into narrower +categories with refining detail. + +197 +00:13:47,240 --> 00:13:53,000 +Early promises of the web to transcend identity through anonymity are forgotten. + +198 +00:13:53,200 --> 00:13:58,720 +This is supposed to be justified because it's required for "accurate advertisement" + +199 +00:13:58,720 --> 00:14:02,480 +but that's just brainwashing +and behavior modification + +200 +00:14:02,480 --> 00:14:06,920 +through personally targeted +propaganda for whoever pays for it, + +201 +00:14:06,920 --> 00:14:11,680 +optimized by psychometrics built upon +our extracted data. + +202 +00:14:12,520 --> 00:14:15,000 +As if it's not bad enough, + +203 +00:14:15,000 --> 00:14:19,800 +all the extra computational power required for the AI + +204 +00:14:19,800 --> 00:14:25,280 +is also a considerable contribution to the ongoing ecological destruction of our planet. + +205 +00:14:26,400 --> 00:14:28,320 +But what about the myth of the hacker + +206 +00:14:28,320 --> 00:14:31,680 +as a free creator +that breaks existing systems? + +207 +00:14:31,680 --> 00:14:34,080 +The wizards that command the machines? + +208 +00:14:34,480 --> 00:14:39,360 +Can't they save us from the tyranny of +the vectoralist AI? + +209 +00:14:40,560 --> 00:14:43,880 +The documentary +"Hackers - Wizards of The Electronic Age" + +210 +00:14:43,880 --> 00:14:46,040 +about the first hackers conference + +211 +00:14:46,040 --> 00:14:49,560 +can give us some clues about +the origins of the hacker subculture. + +212 +00:14:49,560 --> 00:14:53,280 +First of all, everyone there seems +to be white. + +213 +00:14:53,280 --> 00:14:55,080 +Everyone there also seems +to be men, + +214 +00:14:55,080 --> 00:15:00,120 +except two women looking at a man +using a computer for the introduction + +215 +00:15:00,120 --> 00:15:05,520 +and two women that speak for one minute +in total, out of the 26 minute film. + +216 +00:15:05,640 --> 00:15:10,240 +The first women is given 10 seconds +in which she complains + +217 +00:15:10,240 --> 00:15:13,480 +that now there's so much data that it's +overwhelming; + +218 +00:15:13,480 --> 00:15:16,240 +and the other is given 50 seconds + +219 +00:15:16,240 --> 00:15:20,160 +to demonstrate how she uses a macintosh painting program. + +220 +00:15:20,880 --> 00:15:24,760 +The women are there +to represent the end user, + +221 +00:15:24,760 --> 00:15:27,440 +they're not considered hackers. + +222 +00:15:27,560 --> 00:15:31,000 +In the documentary, Steve Wozniak +a.k.a Woz, + +223 +00:15:31,000 --> 00:15:35,560 +considered one of the first computer hackers and a cofounder of the Apple corporation, + +224 +00:15:35,560 --> 00:15:37,360 +defines the hackers like this: + +225 +00:15:37,360 --> 00:15:42,560 +No tienen los típicos amigos para distraerlos, ni otras actividades a las que ir. + +226 +00:15:42,560 --> 00:15:43,920 +Normalmente no tienen novias + +227 +00:15:43,920 --> 00:15:47,280 +o cualquier cosa que suponga un gran vinculo o compromiso de su tiempo. + +228 +00:15:47,280 --> 00:15:49,040 +El ordenador lo es absolutamente todo. + +229 +00:15:49,040 --> 00:15:51,520 +¡¡Normalmente +no tienen novias!! + +230 +00:15:51,520 --> 00:15:54,040 +Then it cuts to Andy Hertzfeld + +231 +00:15:54,040 --> 00:15:57,720 +who is introduced as the best +example of the modern day hacker. + +232 +00:15:57,720 --> 00:16:00,600 +He explains how he fell in love with +an Apple computer, + +233 +00:16:00,600 --> 00:16:04,480 +wrote a program on it and sold it to +Apple for 100000$ + +234 +00:16:04,480 --> 00:16:06,280 +but he didn't do it for the money, + +235 +00:16:06,280 --> 00:16:09,920 +he did it for the fun and joy of seeing +his programs working. + +236 +00:16:10,280 --> 00:16:16,240 +Later on, Richard Stallman, the founder +of the free software foundation, FSF, + +237 +00:16:16,240 --> 00:16:23,920 +who was a programmer at MIT AI Lab +is presented as "the last pure hacker" + +238 +00:16:23,920 --> 00:16:28,680 +for choosing to remain at MIT despite +the temptations of the commercial world, + +239 +00:16:28,680 --> 00:16:31,880 +true to the spirit of the early hackers. + +240 +00:16:31,880 --> 00:16:37,080 +He says "my project is to make all software free." + +241 +00:16:37,080 --> 00:16:41,800 +35 years later, in 2019, Woz tweeted + +242 +00:16:41,800 --> 00:16:46,720 +that even though he and his wife shares all their incomes and assets, + +243 +00:16:46,720 --> 00:16:50,960 +Apple Credit Card gave his wife 10 times less +credit then it did to him, + +244 +00:16:50,960 --> 00:16:53,640 +adding "who knows what the algorithm is". + +245 +00:16:53,880 --> 00:16:58,480 +Same year, Stallman resigned from MIT and FSF, + +246 +00:16:58,480 --> 00:17:04,000 +not because he created a toxic environment against women for decades, + +247 +00:17:04,000 --> 00:17:06,040 +giving out pleasure cards, + +248 +00:17:06,040 --> 00:17:13,200 +while his office door was marked +"Knight for justice (also: hot ladies)" + +249 +00:17:13,320 --> 00:17:18,040 +but because his comments on child sex +trafficking was found controversial, + +250 +00:17:18,040 --> 00:17:25,600 +No está bien hackers, no está bien! + +251 +00:17:25,680 --> 00:17:30,440 +He returned to +the FSF board of directors in 2021. + +252 +00:17:30,600 --> 00:17:42,800 +Uniros a nosotros y compartid el software, +sereis libres hackers, sereis libres! + +253 +00:17:43,080 --> 00:17:46,000 +Tragically, first hacker conference coincides + +254 +00:17:46,000 --> 00:17:51,800 +with the peak of women +in computer science degrees at 37%, + +255 +00:17:51,800 --> 00:17:55,000 +which was followed +by a downward slope. + +256 +00:17:55,320 --> 00:18:00,160 +First computer programmers, from +Ada Lovelace to ENIAC girls + +257 +00:18:00,160 --> 00:18:02,560 +to Hidden Figures, were women + +258 +00:18:02,560 --> 00:18:08,160 +and software was not considered important +enough to be a masculine job. + +259 +00:18:08,720 --> 00:18:11,640 +When software became more popular +around 1970s + +260 +00:18:11,640 --> 00:18:15,880 +men started pushing women out of the sector in many ways + +261 +00:18:16,200 --> 00:18:22,000 +that included hiring practices which +preferred anti-social personality profiles + +262 +00:18:22,000 --> 00:18:28,000 +assumed to be male, which is the root +of the anti-social hacker stereotype. + +263 +00:18:28,560 --> 00:18:32,440 +Cornelia Sollfrank, +one of the founders of Old Boys Network, + +264 +00:18:32,440 --> 00:18:35,280 +the first international cyberfeminist alliance, + +265 +00:18:35,280 --> 00:18:40,800 +wrote an article titled "Women Hackers" +in 1999: + +266 +00:18:40,800 --> 00:18:44,680 +"In the course of pursuing my interest in hackers and their work, + +267 +00:18:44,680 --> 00:18:46,920 +I attended several hackers’ meetings. + +268 +00:18:47,200 --> 00:18:51,480 +Naturally, as a cyberfeminist, +I was looking for women hackers. + +269 +00:18:51,920 --> 00:18:54,600 +In the beginning I tried +to ignore the fact + +270 +00:18:54,600 --> 00:18:57,640 +that the few women who participated in these meetings + +271 +00:18:57,640 --> 00:19:01,280 +were not actively involved +in computer hacking, + +272 +00:19:01,280 --> 00:19:04,360 +and did not consider themselves +to be hackers. + +273 +00:19:04,520 --> 00:19:09,400 +It took me a while to realize that in fact +there were no women hackers. + +274 +00:19:09,400 --> 00:19:12,600 +It is not just in the commercial development of technology, + +275 +00:19:12,600 --> 00:19:14,800 +but even more in alternative fields + +276 +00:19:14,800 --> 00:19:18,840 +and the technological underground +that there are so few women involved. + +277 +00:19:19,320 --> 00:19:21,960 +No matter what area of application and no matter what the objective, + +278 +00:19:21,960 --> 00:19:24,800 +the borderlines of gender are still maintained. + +279 +00:19:25,120 --> 00:19:28,000 +Of all the technological +spheres, however, + +280 +00:19:28,000 --> 00:19:31,320 +it is in the hacker scene that we find the fewest women. + +281 +00:19:31,320 --> 00:19:38,120 +Hacking is a purely male domain, and in +that sense a clearly gendered space. + +282 +00:19:38,760 --> 00:19:39,800 +In 2010s + +283 +00:19:39,800 --> 00:19:45,800 +Amazon AI was denying engineering +job applications from women + +284 +00:19:45,800 --> 00:19:48,960 +because that's what it learned +from historical data. + +285 +00:19:49,760 --> 00:19:56,480 +Today women comprise around 20-25% +of the jobs in the tech sector. + +286 +00:19:56,680 --> 00:20:01,280 +In free and open source movements, +gender gap is even worse, + +287 +00:20:01,280 --> 00:20:05,520 +with women comprising 6% of contributors. + +288 +00:20:06,080 --> 00:20:10,840 +Even hacktivists, which are supposed +to be the cool political hackers, + +289 +00:20:10,840 --> 00:20:14,840 +are reproducing a male-only stereotype. + +290 +00:20:15,120 --> 00:20:17,400 +Of course in the last decades + +291 +00:20:17,400 --> 00:20:22,320 +some anticlassist, antiracist, +antisexist hacker collectives were formed + +292 +00:20:22,320 --> 00:20:27,320 +but in the public perception hacking is still identified with an exclusive subculture + +293 +00:20:27,320 --> 00:20:28,880 +instead of an inclusive class + +294 +00:20:28,880 --> 00:20:34,520 +and this hacker subculture remains a classist racist cisheteropatriarchal niche. + +295 +00:20:35,200 --> 00:20:38,480 +"Some hackers see themselves as vectoralists, + +296 +00:20:38,480 --> 00:20:41,120 +trading on the scarcity of their property. + +297 +00:20:41,240 --> 00:20:44,120 +Some see themselves +as workers, + +298 +00:20:44,120 --> 00:20:47,800 +but as privileged ones +in a hierarchy of wage earners. + +299 +00:20:48,000 --> 00:20:52,880 +The hacker class produces itself +as itself, but not for itself. + +300 +00:20:52,880 --> 00:20:56,840 +It does not (yet) possess a consciousness +of its consciousness. + +301 +00:20:56,840 --> 00:20:59,480 +It is not aware of its own virtuality. + +302 +00:20:59,840 --> 00:21:05,880 +Because of its inability—to date +to become a class for itself, + +303 +00:21:05,880 --> 00:21:08,640 +fractions of the hacker class +continually split off + +304 +00:21:08,640 --> 00:21:12,280 +and come to identify their interests +with those of other classes. + +305 +00:21:12,520 --> 00:21:16,680 +Hackers run the risk, +in particular, of being identified + +306 +00:21:16,680 --> 00:21:19,640 +in the eyes of the +working and farming classes + +307 +00:21:19,640 --> 00:21:23,280 +with vectoralist interests, +which seek to privatize information + +308 +00:21:23,280 --> 00:21:27,640 +necessary for the productive and cultural +lives of all classes." + +309 +00:21:28,480 --> 00:21:33,040 +Before we can even talk about hacker solidarity with other exploited classes; + +310 +00:21:33,040 --> 00:21:36,200 +we have to face the privilege, arrogance and, selfishness, + +311 +00:21:36,200 --> 00:21:41,360 +even within hacktivist +and free software (FOSS) movements, + +312 +00:21:41,360 --> 00:21:45,680 +that is blocking the development +of class consciousness among hackers. + +313 +00:21:46,360 --> 00:21:51,400 +"Each hacker sees the other as a rival, +or a collaborator against another rival, + +314 +00:21:51,400 --> 00:21:55,720 +not—yet—as a fellow member +of the same class with a shared interest. + +315 +00:21:56,400 --> 00:22:00,520 +This shared interest +is so hard to grasp precisely + +316 +00:22:00,520 --> 00:22:06,080 +because it is a shared interest +in qualitative differentiation. + +317 +00:22:06,280 --> 00:22:09,640 +The hacker class +does not need unity in identity + +318 +00:22:09,640 --> 00:22:12,160 +but seeks multiplicity in difference." + +319 +00:22:12,760 --> 00:22:17,440 +Multiplicity in difference is also what Audre Lorde was calling for, + +320 +00:22:17,440 --> 00:22:20,720 +because our difference is our power. + +321 +00:22:20,920 --> 00:22:23,040 +Hackers produce difference + +322 +00:22:23,040 --> 00:22:26,080 +and hacker class consciousness +requires recognizing + +323 +00:22:26,080 --> 00:22:30,320 +the power of difference +we produce with our every act. + +324 +00:22:30,760 --> 00:22:34,240 +Hacker class struggle is not limited to computer programmers + +325 +00:22:34,240 --> 00:22:39,840 +but involves anyone who produces information, which means everyone. + +326 +00:22:40,200 --> 00:22:44,000 +With hacker class consciousness +comes the response-ability of + +327 +00:22:44,000 --> 00:22:47,720 +using the power of information +to abolish vectoralism + +328 +00:22:47,720 --> 00:22:52,480 +alongside all forms of domination +that are non-consensual and exploitative. + +329 +00:22:53,040 --> 00:22:55,440 +Like Flavia Dzodan's feminism, + +330 +00:22:55,440 --> 00:22:59,000 +the revolutionary hack will +be intersectional or it will be bullshit. +