Browse Source

commit iniziale Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class sottotitoli in inglese

may 1 year ago
parent
commit
ad13053dfc

+ 961 - 0
Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.1.eng.srt

@@ -0,0 +1,961 @@
+1
+00:00:00,000 --> 00:00:03,720
+Upgrading intersectional feminism with
+the hacker class
+
+2
+00:00:03,800 --> 00:00:07,520
+Part 1: Evolution of feminist cyborgs
+
+3
+00:00:08,080 --> 00:00:13,360
+"By the late twentieth century, our time,
+a mythic time, we are all chimeras, 
+
+4
+00:00:13,360 --> 00:00:19,080
+theorized and fabricated hybrids of machine and organism — in short, cyborgs.
+
+5
+00:00:19,080 --> 00:00:23,240
+The cyborg is our ontology;
+it gives us our politics.
+
+6
+00:00:23,240 --> 00:00:27,600
+The cyborg is a condensed image
+of both imagination and material reality,
+
+7
+00:00:27,600 --> 00:00:33,200
+the two joined centers structuring any
+possibility of historical transformation."
+
+8
+00:00:33,480 --> 00:00:35,560
+When the queen Elizabeth
+of the United Kingdom
+
+9
+00:00:35,560 --> 00:00:40,760
+sent her first email in 1976,
+there were no feminists on the internet,
+
+10
+00:00:40,760 --> 00:00:44,240
+it was just a military science project.
+
+11
+00:00:44,760 --> 00:00:48,920
+A Cyborg Manifesto is considered
+the beginning of cyberfeminism 
+
+12
+00:00:48,920 --> 00:00:51,800
+because Donna Haraway's position
+was unique.
+
+13
+00:00:52,320 --> 00:00:56,880
+"I am conscious of the odd perspective provided by my historical position
+
+14
+00:00:56,880 --> 00:01:02,080
+a PhD in biology for an Irish Catholic girl
+was made possible
+
+15
+00:01:02,080 --> 00:01:07,760
+by Sputnik’s impact
+on U.S. national science-education policy.
+
+16
+00:01:08,000 --> 00:01:10,560
+I have a body and mind as much constructed 
+
+17
+00:01:10,560 --> 00:01:14,600
+by the post–Second World War arms race and Cold War
+
+18
+00:01:14,600 --> 00:01:17,240
+as by the women’s movements.
+
+19
+00:01:17,520 --> 00:01:22,000
+There are more grounds for hope
+in focusing on the contradictory effects
+
+20
+00:01:22,000 --> 00:01:26,400
+ of politics designed to
+produce loyal American technocrats,
+
+21
+00:01:26,400 --> 00:01:29,680
+which also produced
+large numbers of dissidents,
+
+22
+00:01:29,680 --> 00:01:32,640
+ than in focusing
+on the present defeats." 
+
+23
+00:01:32,640 --> 00:01:38,880
+A Cyborg Manifesto was published in the Socialist Review magazine in 1985.
+
+24
+00:01:38,880 --> 00:01:43,360
+Only 2000 hosts were connected to the internet
+
+25
+00:01:43,360 --> 00:01:47,920
+and they were limited to a military, administrative and academic elite,
+
+26
+00:01:48,000 --> 00:01:51,080
+predominantly bourgeois white cis men.
+
+27
+00:01:53,880 --> 00:01:59,480
+Apple was already marketing itself
+as the freedom warrior
+
+28
+00:01:59,480 --> 00:02:02,720
+with an expensive commercial directed by Ridley Scott, 
+
+29
+00:02:02,720 --> 00:02:08,720
+aired during Super Bowl 1984 with an Orwellian theme.
+
+30
+00:02:09,640 --> 00:02:12,400
+"The main trouble with cyborgs, of course, 
+
+31
+00:02:12,400 --> 00:02:16,760
+is that they are the illegitimate offspring of militarism and patriarchal capitalism,
+
+32
+00:02:16,760 --> 00:02:19,240
+not to mention state socialism.
+
+33
+00:02:19,240 --> 00:02:23,240
+But illegitimate offspring are often
+exceedingly unfaithful to their origins.
+
+34
+00:02:23,240 --> 00:02:26,360
+Their fathers, after all,
+are inessential."
+
+35
+00:02:26,840 --> 00:02:32,600
+Just when capitalism declared its global victory and the "end of history" in 1991,
+
+36
+00:02:32,600 --> 00:02:37,000
+the internet was made available
+to the general public as World Wide Web.
+
+37
+00:02:37,440 --> 00:02:42,280
+That year Judy Wajcman wrote
+"Feminism confronts technology"
+
+38
+00:02:42,280 --> 00:02:47,280
+and VNS Matrix,
+the first cyberfeminist collective was founded
+
+39
+00:02:47,280 --> 00:02:51,680
+who published "a cyberfeminist manifesto
+for the 21st century" that claimed:
+
+40
+00:02:51,680 --> 00:02:54,200
+"we are the virus of the new world disorder
+
+41
+00:02:54,200 --> 00:02:56,320
+rupturing the symbolic from within
+
+42
+00:02:56,320 --> 00:02:59,200
+saboteurs of big daddy mainframe
+
+43
+00:02:59,200 --> 00:03:02,200
+the clitoris is a direct line to the matrix
+
+44
+00:03:02,200 --> 00:03:06,000
+the VNS MATRIX
+terminators of the moral codes
+
+45
+00:03:06,000 --> 00:03:07,760
+mercenaries of slime"
+
+46
+00:03:08,720 --> 00:03:10,520
+Around the same time 
+
+47
+00:03:10,520 --> 00:03:17,320
+Sandy Stone wrote "Will the real
+body please stand up?"
+
+48
+00:03:18,200 --> 00:03:22,920
+emphasizing the realness of "virtual reality"
+and how the internet facilitates
+
+49
+00:03:22,920 --> 00:03:27,160
+crossing over borders of gender
+and other socially structured identities.
+
+50
+00:03:27,160 --> 00:03:32,480
+She says: "My interest in cyberspace
+is primarily about communities
+
+51
+00:03:32,480 --> 00:03:33,840
+and how they work."
+
+52
+00:03:34,480 --> 00:03:38,480
+Cyberfeminist communities were blooming on the web with radical ideas
+
+53
+00:03:38,480 --> 00:03:41,000
+but websites were still static
+
+54
+00:03:41,000 --> 00:03:47,920
+and internet users were less than 0.5% of the world population until 1995, 
+
+55
+00:03:47,920 --> 00:03:50,880
+when Bill Gates was already the richest person on the world.
+
+56
+00:03:57,640 --> 00:04:02,840
+Carmen Hermosillo fue una de las primeras adeptas de las comunidades del ciberespacio
+
+57
+00:04:03,280 --> 00:04:06,080
+"Está de moda sugerir" escribió
+
+58
+00:04:06,080 --> 00:04:08,920
+"que el ciberespacio es un tipo de isla de los benditos
+
+59
+00:04:08,920 --> 00:04:13,480
+donde la gente es libre de expresar y entregarse a su individualidad.
+
+60
+00:04:13,480 --> 00:04:15,520
+Esto no es cierto.
+
+61
+00:04:15,880 --> 00:04:20,720
+He visto mucha gente exponer
+sus emociones, sus entrañas online
+
+62
+00:04:20,720 --> 00:04:26,520
+y yo misme lo hice hasta que vi me había mercantilizado a mi misme."
+
+63
+00:04:26,680 --> 00:04:28,600
+At the beginning
+of the new millennium 
+
+64
+00:04:28,600 --> 00:04:33,360
+with 5% of the world population connected
+to the net, Darcy DiNucci introduced
+
+65
+00:04:33,360 --> 00:04:35,400
+the Web 2.0:
+
+66
+00:04:35,760 --> 00:04:39,800
+"The Web will be understood
+not as screenfuls of text and graphics but
+
+67
+00:04:39,800 --> 00:04:45,160
+as a transport mechanism, the ether
+through which interactivity happens.
+
+68
+00:04:45,160 --> 00:04:49,520
+It will [...] appear on your computer
+screen, [...] on your TV set [...]
+
+69
+00:04:49,520 --> 00:04:53,200
+your car dashboard [...] your cell phone
+[...] hand-held game machines [...]
+
+70
+00:04:53,200 --> 00:04:56,080
+maybe even your microwave oven."
+
+71
+00:04:57,120 --> 00:05:01,160
+Ahora, con la fibra óptica conectada directamente a tu casa
+
+72
+00:05:01,160 --> 00:05:06,760
+suponiendo que cuando llegue al poste de teléfono no vuelve a ser cableado,
+
+73
+00:05:06,760 --> 00:05:09,440
+sino que sigue siendo fibra,
+
+74
+00:05:09,440 --> 00:05:15,040
+puedes hacer cosas como descargarte una película entera en unos minutos,
+
+75
+00:05:15,040 --> 00:05:16,760
+cosas de este tipo.
+
+76
+00:05:16,760 --> 00:05:22,800
+Todas tus comunicaciones vendran
+en formato tcp/ip,
+
+77
+00:05:22,800 --> 00:05:26,640
+lo que significa que serán todas digitales, serán todas paquetes de datos
+
+78
+00:05:26,640 --> 00:05:28,400
+serán todas conmutables.
+
+79
+00:05:28,400 --> 00:05:37,520
+Y podrían ser televisión, radio, ordenador, teléfono y cualquier tipo de comunicación
+
+80
+00:05:37,520 --> 00:05:42,520
+vendría en forma de paquetes,
+paquetes tcp/ip.
+
+81
+00:05:42,520 --> 00:05:47,080
+Probablemente tardará entre 10 y 20 años
+a desarrollarse
+
+82
+00:05:47,080 --> 00:05:53,000
+pero ya está siendo desarrollado con éxito en pruebas de mercado.
+
+83
+00:05:53,000 --> 00:05:59,640
+A mi me gusta,
+pero eso no quiere decir nada.
+
+84
+00:06:00,560 --> 00:06:04,800
+Blogs and microblogs gradually spread among cyberfeminists 
+
+85
+00:06:04,800 --> 00:06:06,600
+and signalled the next era.
+
+86
+00:06:06,800 --> 00:06:09,920
+Tarana Burke started Me Too
+on Myspace in 2006
+
+87
+00:06:09,920 --> 00:06:12,200
+but it took some time before it caught on.
+
+88
+00:06:12,680 --> 00:06:17,440
+Sheryl Sandberg leaned in to become
+"the Typhoid Mary of surveillance capitalism"
+
+89
+00:06:17,440 --> 00:06:20,160
+ first by building the business model of Google,
+
+90
+00:06:20,160 --> 00:06:23,800
+then moving on to become the Chief
+Operating Officer of Facebook.
+
+91
+00:06:24,080 --> 00:06:31,240
+In 2021, internet penetration rate, the industry jargon for internet access,
+
+92
+00:06:31,240 --> 00:06:34,280
+is at 65 percent of the world population.
+
+93
+00:06:34,280 --> 00:06:38,760
+In Europe, North America and Japan it's
+around 90 percent.
+
+94
+00:06:39,440 --> 00:06:41,560
+To understand Donna Haraway's words
+
+95
+00:06:41,560 --> 00:06:47,000
+"Our machines are disturbingly lively, and we ourselves frighteningly inert"
+
+96
+00:06:47,000 --> 00:06:49,480
+we just have to look up from our smartphones
+
+97
+00:06:49,480 --> 00:06:54,000
+and see that everyone else is also looking at their smartphones.
+
+98
+00:06:54,520 --> 00:06:59,480
+Even the people who still don't have internet access are ruled by the internet.
+
+99
+00:07:01,080 --> 00:07:03,760
+No organism is left free from cybernetics,
+
+100
+00:07:03,760 --> 00:07:07,680
+the science of command
+and control through communication.
+
+101
+00:07:08,000 --> 00:07:15,080
+We are all cyborgs even if we
+don't want it or don't even know about it.
+
+102
+00:07:15,520 --> 00:07:18,960
+“Just as political economy produced a homo economicus 
+
+103
+00:07:18,960 --> 00:07:22,320
+manageable in the framework
+of industrial states,
+
+104
+00:07:22,840 --> 00:07:25,680
+cybernetics is producing its
+own humanity… 
+
+105
+00:07:25,680 --> 00:07:30,760
+Political economy reigned over beings by leaving them free to pursue their interest;
+
+106
+00:07:30,760 --> 00:07:34,600
+cybernetics controls them by leaving them free to communicate…
+
+107
+00:07:34,960 --> 00:07:38,720
+The stated ambition of cybernetics
+is to manage the unforeseeable,
+
+108
+00:07:38,720 --> 00:07:43,160
+and to govern the ungovernable instead of trying to destroy it.”
+
+109
+00:07:43,160 --> 00:07:47,720
+As internet becomes omnipresent with smartphones and social media,
+
+110
+00:07:47,720 --> 00:07:50,680
+popularity of political movements are increasingly dependent on
+
+111
+00:07:50,680 --> 00:07:53,160
+their online presence and activity.
+
+112
+00:07:53,400 --> 00:07:56,560
+Accordingly, feminism is growing,
+
+113
+00:07:56,560 --> 00:07:59,800
+accelerated by new communication technologies.
+
+114
+00:08:00,280 --> 00:08:04,760
+This is not to say feminists
+are stuck online.
+
+115
+00:08:05,080 --> 00:08:08,840
+From Rojava to Mexico,
+we are as militant as ever.
+
+116
+00:08:11,560 --> 00:08:16,800
+Transnational feminist strikes have been bringing millions of people into the streets 
+
+117
+00:08:16,800 --> 00:08:21,760
+and this would have been much harder to organize without the latest technology.
+
+118
+00:08:22,600 --> 00:08:27,960
+On 25 November 2019, a feminist collective
+from Chile, Las Tesis,
+
+119
+00:08:27,960 --> 00:08:32,520
+shared their artistic protest performance
+“A rapist in your path” on social media.
+
+120
+00:08:33,240 --> 00:08:35,640
+Within days, the performance with its full choreography and lyrics
+
+121
+00:08:35,640 --> 00:08:39,840
+was reproduced away from keyboard 
+by feminists all over the world.
+
+122
+00:08:41,640 --> 00:08:48,240
+Feminists in Turkey were
+violently detained by police for performing it, 
+
+123
+00:08:48,240 --> 00:08:51,400
+which prompted women members of parliament from oppositionary parties
+
+124
+00:08:51,400 --> 00:08:53,640
+ to perform it in the Parliament of Turkey.
+
+125
+00:08:54,560 --> 00:08:59,280
+This level of embodied memeification
+was unprecedented.
+
+126
+00:08:59,600 --> 00:09:05,920
+With this perspective, even what is called “hashtag feminism” like #MeToo 
+
+127
+00:09:05,920 --> 00:09:09,560
+can’t be seen as a solely online phenomenon, 
+
+128
+00:09:09,560 --> 00:09:13,960
+because its causes and consequences are away from keyboard.
+
+129
+00:09:14,080 --> 00:09:19,000
+In truth, it's very hard to tell the difference between online and offline
+
+130
+00:09:19,000 --> 00:09:21,480
+since the spread of mobile internet.
+
+131
+00:09:22,120 --> 00:09:26,320
+If the biggest problem of cyberfeminism
+in the beginning, was access, 
+
+132
+00:09:26,320 --> 00:09:30,680
+the critical problem of contemporary cyberfeminism is control.
+
+133
+00:09:30,960 --> 00:09:34,560
+Today most feminists have access
+to the internet 
+
+134
+00:09:34,560 --> 00:09:42,040
+and rely on it heavily for feminist activism but very few among us know about
+
+135
+00:09:42,040 --> 00:09:46,800
+how the technology and the political
+economy behind it actually works.
+
+136
+00:09:47,160 --> 00:09:53,200
+And more so since the pandemic, if you want to be active in the feminist movement 
+
+137
+00:09:53,200 --> 00:09:55,960
+you will probably be required to use proprietary software 
+
+138
+00:09:55,960 --> 00:09:59,920
+for social media, video chats, cloud storages, etc.
+
+139
+00:09:59,920 --> 00:10:02,800
+You may be disqualified
+from participating in assemblies
+
+140
+00:10:02,800 --> 00:10:05,320
+if you refuse to use
+google forms and zoom.
+
+141
+00:10:05,320 --> 00:10:08,400
+You may be left out of organizations
+
+142
+00:10:08,400 --> 00:10:11,840
+if you refuse to use
+whatsapp, telegram and google drive.
+
+143
+00:10:12,000 --> 00:10:15,840
+You're voice may not be heard
+or considered relevant
+
+144
+00:10:15,840 --> 00:10:19,520
+if you refuse to use instagram, twitter and youtube.
+
+145
+00:10:19,640 --> 00:10:23,000
+You may be perceived as a killjoy within feminism 
+
+146
+00:10:23,000 --> 00:10:25,360
+if you refuse to use any of these apps
+
+147
+00:10:25,360 --> 00:10:28,960
+because they're not just considered practical
+but also "free".
+
+148
+00:10:29,280 --> 00:10:36,640
+But these supposedly free apps are making the richest white cis men inordinately richer
+
+149
+00:10:36,640 --> 00:10:40,560
+and disproportionately powerful
+
+150
+00:10:40,560 --> 00:10:44,200
+(like Jeff Bezos, Elon Musk,
+Mark Zuckerberg, etc.) 
+
+151
+00:10:46,880 --> 00:10:51,520
+because they get something more valuable
+than money from us.
+
+152
+00:10:51,520 --> 00:10:57,320
+They get to own all the information we produce which they use against us  
+
+153
+00:10:57,320 --> 00:11:02,400
+with increasing accuracy for the purposes of advertising, surveillance, 
+
+154
+00:11:02,400 --> 00:11:07,360
+perception management and psychological warfare that aims for total domination.
+
+155
+00:11:07,360 --> 00:11:11,720
+Shosana Zuboff calls this
+system surveillance capitalism
+
+156
+00:11:11,720 --> 00:11:15,440
+but it's worse than surveillance
+and worse than capitalism.
+
+157
+00:11:15,960 --> 00:11:21,480
+Alice Walker, who coined
+the term "womanism" says:
+
+158
+00:11:21,880 --> 00:11:27,280
+"The most common way people give up their power is by thinking they don't have any."
+
+159
+00:11:27,280 --> 00:11:31,480
+Every day we give our information
+in return for a service marketed as free,
+
+160
+00:11:31,480 --> 00:11:35,400
+without thinking that we
+are giving up a power we have.
+
+161
+00:11:35,400 --> 00:11:39,080
+The power we give up is used against
+us and it works.
+
+162
+00:11:39,080 --> 00:11:44,360
+In fact, even Alice Walker is not immune to racist propaganda from artificial intelligence 
+
+163
+00:11:44,360 --> 00:11:48,040
+as she unironically explains
+in one of her poems,
+
+164
+00:11:48,040 --> 00:11:52,000
+how she was persuaded to antisemitic conspiracy theories:
+
+165
+00:11:52,960 --> 00:11:54,640
+"Where to start?
+You will find
+some information,
+
+166
+00:11:54,640 --> 00:11:56,600
+"Where to start?
+You will find
+some information,
+
+167
+00:11:56,880 --> 00:11:58,720
+Slanted,
+unfortunately,
+
+168
+00:11:58,720 --> 00:12:00,680
+By Googling.
+
+169
+00:12:00,680 --> 00:12:03,320
+For a more in depth study
+
+170
+00:12:03,320 --> 00:12:05,760
+I recommend starting with YouTube.
+
+171
+00:12:05,760 --> 00:12:11,680
+Simply follow the trail show of 
+“The Talmud” as its poison winds its way
+
+172
+00:12:11,680 --> 00:12:13,880
+Into our collective consciousness."
+
+173
+00:12:14,840 --> 00:12:18,240
+This way of using Youtube
+for reactionary endoctrination
+
+174
+00:12:18,240 --> 00:12:26,600
+is called "redpilling"
+among altright antifeminists,
+
+175
+00:12:26,600 --> 00:12:29,800
+ even the concept itself is a cisheteropatriarchal appropriation of the
+
+176
+00:12:29,800 --> 00:12:33,200
+work of trans sisters
+who wrote and directed the Matrix.
+
+177
+00:12:37,120 --> 00:12:41,680
+If the founder of womanism
+can be redpilled by youtube autoplay,
+
+178
+00:12:41,680 --> 00:12:45,920
+it must not have been very hard
+for companies like Cambridge Analytica
+
+179
+00:12:45,920 --> 00:12:49,520
+to use the Artificial Intelligence of Facebook
+to hack elections
+
+180
+00:12:49,520 --> 00:12:52,520
+and raise neofascism around the world.
+
+181
+00:12:52,800 --> 00:12:56,920
+La psicografía.
+Es un conocimiento de tu personalidad.
+
+182
+00:12:56,920 --> 00:12:59,680
+Porque es la personalidad la que dirige el comportamiento
+
+183
+00:12:59,680 --> 00:13:02,880
+y el comportamiento obviamente influye como votas.
+
+184
+00:13:03,200 --> 00:13:06,040
+To date, many studies prove that
+
+185
+00:13:06,040 --> 00:13:12,120
+the artificial intelligences of big corporations are classist, racist and sexist, 
+
+186
+00:13:12,120 --> 00:13:15,280
+there's even documentaries about it on Netflix.
+
+187
+00:13:15,680 --> 00:13:23,960
+At the same time they also fuel reactionary trends within feminism, like transphobia
+
+188
+00:13:23,960 --> 00:13:27,240
+and whorephobia because social
+media algorithms 
+
+189
+00:13:27,240 --> 00:13:34,040
+consider inflammatory speech to be
+engaging, therefore profitable.
+
+190
+00:13:35,000 --> 00:13:40,200
+Our attention spans are colonized and exploited by this new political economy.
+
+191
+00:13:40,200 --> 00:13:43,880
+This can’t go without questioning
+by feminists 
+
+192
+00:13:43,880 --> 00:13:48,080
+or anyone who positions themselves against systems of domination.
+
+193
+00:13:48,200 --> 00:13:50,040
+Audre Lorde's powerful essay
+
+194
+00:13:50,040 --> 00:13:53,560
+"The master’s tools will never
+dismantle the master’s house"
+
+195
+00:13:53,560 --> 00:13:57,400
+about racism within the feminist movement, can also be applied
+
+196
+00:13:57,400 --> 00:14:01,400
+to other forms of intersecting oppressions that we have internalized,
+
+197
+00:14:01,400 --> 00:14:04,240
+like our relationship with technology.
+
+198
+00:14:04,520 --> 00:14:09,760
+Interestingly, Xenofeminist Lucca Fraser had challenged what Lorde said
+
+199
+00:14:09,760 --> 00:14:13,880
+by claiming that "the masters tools
+can indeed dismantle the master’s house 
+
+200
+00:14:13,880 --> 00:14:16,360
+because they can be hacked."
+
+201
+00:14:16,760 --> 00:14:20,160
+I disagree with Fraser’s reversal
+
+202
+00:14:20,160 --> 00:14:22,800
+because while you may well hack the master’s tools,
+
+203
+00:14:22,800 --> 00:14:25,880
+they could still belong to and benefit
+the master.
+
+204
+00:14:26,280 --> 00:14:31,280
+"Let's acknowledge that the master's tools will not dismantle the master's house.
+
+205
+00:14:31,280 --> 00:14:34,400
+The very technologies that was
+reason to dream
+
+206
+00:14:34,400 --> 00:14:36,240
+of new forms of political empowerment 
+
+207
+00:14:36,240 --> 00:14:40,120
+has turned out to be the means of surveillance and control for everybody."
+
+208
+00:14:40,240 --> 00:14:44,920
+Even the first social use of telephone was a hack by housewives 
+
+209
+00:14:44,920 --> 00:14:46,920
+as mentioned by Judy Wajcman.
+
+210
+00:14:47,480 --> 00:14:50,920
+We have hacked the tools of the master
+to near perfection
+
+211
+00:14:50,920 --> 00:14:55,000
+but it seems like we are hacking in
+the dark without consciousness.
+
+212
+00:14:55,000 --> 00:14:58,080
+We are winning battles but losing the war.
+
+213
+00:14:58,240 --> 00:14:59,880
+As Audre Lorde said:
+
+214
+00:14:59,880 --> 00:15:02,920
+"They may allow us temporarily to beat him at his own game,
+
+215
+00:15:02,920 --> 00:15:07,400
+but they will never enable us
+to bring about genuine change."
+
+216
+00:15:07,640 --> 00:15:12,400
+To bring about genuine change and realize the revolutionary potential of hacking
+
+217
+00:15:12,400 --> 00:15:15,480
+we have to demystify what hacking means.

+ 1474 - 0
Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.eng.srt

@@ -0,0 +1,1474 @@
+1
+00:00:00,120 --> 00:00:05,320
+Part 2: Political Economy of the Hack
+Vectoralism and hackers as a class
+
+2
+00:00:06,920 --> 00:00:12,480
+In popular culture, the hacker is stereotyped like a sci-fi version of the wizard -
+
+3
+00:00:12,480 --> 00:00:18,440
+a heroic loner, usually white cis hetero man, with powers of computer expertise
+
+4
+00:00:18,440 --> 00:00:23,080
+incomprehensible to us who don’t have the magical essence of the hacker.
+
+5
+00:00:25,000 --> 00:00:26,480
+¡¡¡ LO POSEO TODO !!!
+
+6
+00:00:27,240 --> 00:00:31,720
+In contrast, McKenzie Wark, the author
+of “A Hacker Manifesto”,
+
+7
+00:00:31,720 --> 00:00:35,640
+describes the hacker
+as someone who produces information
+
+8
+00:00:35,640 --> 00:00:38,000
+but doesn't own or control it.
+
+9
+00:00:38,480 --> 00:00:42,840
+She defines hackers as a class,
+in terms of political economy, 
+
+10
+00:00:42,840 --> 00:00:47,840
+exploited under the new dominant ruling class that she calls the vectoralist class 
+
+11
+00:00:48,280 --> 00:00:53,760
+(e.g. Google, Amazon, Facebook, Apple,
+Microsoft and their Chinese equivalents).
+
+12
+00:00:53,880 --> 00:00:58,760
+Vectoralism is a mode of production based on the asymmetry of information,
+
+13
+00:00:58,760 --> 00:01:03,800
+created through ownership and control over stocks, flows and vectors of information
+
+14
+00:01:03,800 --> 00:01:05,800
+by the vectoralist class.
+
+15
+00:01:06,320 --> 00:01:11,800
+By this definition, hacker class is
+not only computer programmers
+
+16
+00:01:11,800 --> 00:01:15,600
+who gets exploited by the vectoralists
+that patent their code.
+
+17
+00:01:15,600 --> 00:01:21,360
+Anyone of us walking around with
+a smartphone is part of the hacker class
+
+18
+00:01:21,360 --> 00:01:23,920
+because even if we don't know this,
+
+19
+00:01:23,920 --> 00:01:28,960
+we produce new location data and we don't own or control this information
+
+20
+00:01:28,960 --> 00:01:31,120
+but the vectoralists do.
+
+21
+00:01:32,920 --> 00:01:37,800
+From text messages to video calls, web searches to doom scrolls,
+
+22
+00:01:37,800 --> 00:01:40,560
+with each status update, each like,
+
+23
+00:01:40,560 --> 00:01:46,160
+every interaction with our smart devices we produce new information,
+
+24
+00:01:46,160 --> 00:01:48,360
+if about nothing else,
+then about who we are.
+
+25
+00:01:48,880 --> 00:01:52,960
+Who we are is what we do and its all
+recorded and processed.
+
+26
+00:01:53,320 --> 00:01:58,800
+Regardless of family, friendly and comradely qualities of relationships, 
+
+27
+00:01:58,800 --> 00:02:02,600
+intimacy is quantified and commodified as information, 
+
+28
+00:02:02,600 --> 00:02:05,480
+alongside all other forms of affect.
+
+29
+00:02:05,840 --> 00:02:10,680
+If hacking is defined by curiosity, then its already monopolized by Google.
+
+30
+00:02:11,680 --> 00:02:17,200
+When you asked them a question, old school chauvinist hackers would tell you to RTFM
+
+31
+00:02:17,200 --> 00:02:20,320
+ meaning "read the fucking manual"
+
+32
+00:02:20,320 --> 00:02:22,800
+now they say "just fucking google it".
+
+33
+00:02:23,080 --> 00:02:27,280
+But when we look for something on a vectoralist platform like Google,
+
+34
+00:02:27,280 --> 00:02:29,800
+it looks back at us.
+
+35
+00:02:29,880 --> 00:02:33,960
+It gives us an algorithmically
+curated response to what we're looking for,
+
+36
+00:02:33,960 --> 00:02:36,880
+based upon the information
+it already has on us.
+
+37
+00:02:37,640 --> 00:02:40,520
+Rather we are satisfied
+or not with the result,
+
+38
+00:02:40,520 --> 00:02:44,360
+Google gets to learn what we
+are looking for, our desires,
+
+39
+00:02:44,360 --> 00:02:49,560
+either deep or superficial, which is an important information to have about us
+
+40
+00:02:50,080 --> 00:02:55,160
+especially when we don't know
+what each other want or get,
+
+41
+00:02:55,160 --> 00:02:59,560
+while Google gets to know all of it
+times billions.
+
+42
+00:03:00,480 --> 00:03:04,800
+When an artist shares a piece of art on a vectoralist platform
+
+43
+00:03:04,800 --> 00:03:07,560
+like Instagram, Youtube, Spotify, etc.
+
+44
+00:03:07,560 --> 00:03:12,240
+they may get paid by the platform a fraction of the value they produce,
+
+45
+00:03:12,240 --> 00:03:14,640
+in proportion with the attention they capture,
+
+46
+00:03:14,640 --> 00:03:17,840
+which is exploitative against the artist.
+
+47
+00:03:18,200 --> 00:03:22,880
+But anyone giving attention to the piece
+of art is also exploited,
+
+48
+00:03:22,880 --> 00:03:28,680
+usually without getting paid, in fact
+our attention is what pays for everything.
+
+49
+00:03:29,080 --> 00:03:33,760
+In a different form, intellectual property
+and commodification of information
+
+50
+00:03:33,760 --> 00:03:38,720
+works even worse for scientists and academics that have to pay journals
+
+51
+00:03:38,720 --> 00:03:43,000
+to publish their work, only to be
+paywalled behind obscene prices
+
+52
+00:03:43,000 --> 00:03:44,640
+so noone gets to read them.
+
+53
+00:03:45,600 --> 00:03:50,560
+The phrase "if you're not paying for the product, then you are the product"
+
+54
+00:03:50,560 --> 00:03:55,840
+was written for broadcast media in 1973
+
+55
+00:03:55,840 --> 00:03:59,320
+when there was no such thing
+as personalized advertisement.
+
+56
+00:04:00,000 --> 00:04:03,640
+In the world of social media
+if you're not paying for the product, 
+
+57
+00:04:03,640 --> 00:04:06,320
+you are both the product
+and the producer.
+
+58
+00:04:07,240 --> 00:04:12,040
+Broadcast media could only target
+one demographic at a time;
+
+59
+00:04:12,880 --> 00:04:18,720
+social media can target each user personally
+
+60
+00:04:18,720 --> 00:04:23,680
+because each social media user produces new information about themselves,
+
+61
+00:04:23,680 --> 00:04:26,200
+their environment, their relationships and desires.
+
+62
+00:04:26,880 --> 00:04:29,280
+The internet is not free and it never was.
+
+63
+00:04:29,680 --> 00:04:34,000
+First of all you need to pay for the hardware to connect
+
+64
+00:04:34,000 --> 00:04:37,800
+because obviously,
+to mine valuable minerals from the earth, 
+
+65
+00:04:37,800 --> 00:04:43,160
+transporting it to furnaces for smelting it, producing & soldering microchips has a cost.
+
+66
+00:04:43,160 --> 00:04:48,280
+Powering the hardware requires electricity produced from natural resources,
+
+67
+00:04:48,280 --> 00:04:49,720
+which is also not free.
+
+68
+00:04:50,120 --> 00:04:54,000
+Internet service providers need a lot
+of hardware and electricity
+
+69
+00:04:54,000 --> 00:04:57,000
+to keep the internet running, which is why
+
+70
+00:04:57,000 --> 00:05:01,080
+you still have to pay for internet access and usage in most parts of the world.
+
+71
+00:05:01,400 --> 00:05:05,640
+To provide internet services like websites, email and social media 
+
+72
+00:05:05,640 --> 00:05:08,520
+you also need hardware, in the end,
+
+73
+00:05:08,520 --> 00:05:12,880
+servers have to be on working computers
+connected to the internet.
+
+74
+00:05:13,280 --> 00:05:19,400
+So when vectoralists say they are providing services for free, like Google, Facebook, etc.
+
+75
+00:05:19,720 --> 00:05:21,920
+this doesn't mean that they found a magical way
+
+76
+00:05:21,920 --> 00:05:24,800
+to produce computers and networks for free
+
+77
+00:05:24,800 --> 00:05:28,800
+nor a free source of electricity to keep everything working.
+
+78
+00:05:29,680 --> 00:05:33,280
+Vectoralists are paying for the costs of
+the services they provide us,
+
+79
+00:05:33,280 --> 00:05:36,560
+including the cost of running supercomputers
+
+80
+00:05:36,560 --> 00:05:41,360
+with Artificial Intelligence that personalizes our experiences of the services
+
+81
+00:05:41,560 --> 00:05:44,120
+and obviously,
+they are not doing it for charity.
+
+82
+00:05:46,040 --> 00:05:49,080
+Facebook is even paying for
+the connectivity of people
+
+83
+00:05:49,080 --> 00:05:53,240
+in more than 50 countries of Latin America,
+Africa and Asia, but,
+
+84
+00:05:53,240 --> 00:05:56,880
+doesn't give them connection to anything other than Facebook and it's partners.
+
+85
+00:05:56,880 --> 00:05:58,920
+They are doing this because they know
+
+86
+00:05:58,920 --> 00:06:03,840
+their returns will be much greater if
+they invest to own the infrastructure.
+
+87
+00:06:04,400 --> 00:06:08,280
+"Power now resides
+in the infrastructures of this world...
+
+88
+00:06:08,280 --> 00:06:13,120
+Infrastructures organize a life without
+a world, suspended, expendable,
+
+89
+00:06:13,120 --> 00:06:16,280
+at the mercy of
+whoever is managing them..."
+
+90
+00:06:16,640 --> 00:06:21,680
+Pre-capitalist forms of class domination
+were born out of the abstraction of rent, 
+
+91
+00:06:21,680 --> 00:06:26,120
+which is surplus product exploited from farming classes
+
+92
+00:06:26,120 --> 00:06:29,320
+that lived on a land that sustained them.
+
+93
+00:06:30,160 --> 00:06:34,320
+Capitalism grew out of the abstraction
+of profit, 
+
+94
+00:06:34,320 --> 00:06:37,560
+which is surplus value exploited from working classes 
+
+95
+00:06:37,560 --> 00:06:41,280
+that are paid wages to sustain their lives.
+
+96
+00:06:42,520 --> 00:06:45,960
+Vectoralism is the next level of abstraction
+
+97
+00:06:45,960 --> 00:06:49,280
+that exploits surplus information from the hacker classes 
+
+98
+00:06:49,280 --> 00:06:52,400
+and most of the hacker classes that produce this information
+
+99
+00:06:52,400 --> 00:06:54,240
+doesn't even get paid for it,
+
+100
+00:06:54,240 --> 00:06:57,840
+while sustainability of all life on earth
+is threatened
+
+101
+00:06:57,840 --> 00:07:02,000
+and vectoralists are racing their way to off-world colonies.
+
+102
+00:07:03,440 --> 00:07:07,760
+Each subsequent form of class domination is built upon the previous form.
+
+103
+00:07:07,960 --> 00:07:11,040
+Capitalism didn't abolish rentier classes,
+
+104
+00:07:11,040 --> 00:07:15,120
+it made them more exploitative under
+capitalist rule.
+
+105
+00:07:15,680 --> 00:07:19,800
+Vectoralism doesnt
+abolish capitalist and rentier classes,
+
+106
+00:07:19,800 --> 00:07:24,240
+it makes them more exploitative under
+vectoralist rule.
+
+107
+00:07:24,880 --> 00:07:29,040
+All class exploitation is legalized through property laws 
+
+108
+00:07:29,040 --> 00:07:32,800
+which are enforced and maintained by constant violence 
+
+109
+00:07:32,800 --> 00:07:34,920
+of repressive state apparatus.
+
+110
+00:07:35,320 --> 00:07:39,040
+Since vectoralists are
+the dominant ruling class of our age,
+
+111
+00:07:39,040 --> 00:07:42,480
+they are constantly upgrading their
+monopolies of violence 
+
+112
+00:07:42,480 --> 00:07:45,320
+with vast amounts of new information,
+
+113
+00:07:45,320 --> 00:07:49,960
+artificial intelligence and supercomputers to process all this.
+
+114
+00:07:50,520 --> 00:07:52,840
+It is revealed by many whistleblowers
+
+115
+00:07:52,840 --> 00:07:56,840
+most famously Chelsea Manning
+and Edward Snowden
+
+116
+00:07:56,840 --> 00:08:00,280
+that United States of America's relationship to vectoralists 
+
+117
+00:08:00,280 --> 00:08:05,600
+is not much different from what's happening behind the great firewall of China
+
+118
+00:08:05,600 --> 00:08:09,280
+with apps funded
+by the Chinese Communist Party.
+
+119
+00:08:09,960 --> 00:08:12,960
+It is even said that
+the Chinese model is more honest 
+
+120
+00:08:12,960 --> 00:08:15,320
+because it's exercised more openly.
+
+121
+00:08:15,320 --> 00:08:19,720
+By now more than a billion surveillance cameras are put in place 
+
+122
+00:08:19,720 --> 00:08:23,640
+with constantly improving facial recognition abilities
+
+123
+00:08:24,640 --> 00:08:31,240
+but even this is small in number compared to the number of cameras on smartphones
+
+124
+00:08:31,240 --> 00:08:37,240
+ carried voluntarily by
+billions of cyborg hackers around the world.
+
+125
+00:08:37,880 --> 00:08:44,160
+Some of the biggest myths of our time is about the Cloud and Artificial Intelligence.
+
+126
+00:08:44,720 --> 00:08:49,680
+While marketed as comfort, safety and unprecedented improvement, 
+
+127
+00:08:49,680 --> 00:08:51,960
+they deliver the opposite.
+
+128
+00:08:52,760 --> 00:08:55,760
+The Cloud,
+where all our information is gathered,
+
+129
+00:08:55,760 --> 00:08:59,680
+is just a lot of computers,
+called server farms,
+
+130
+00:08:59,680 --> 00:09:05,560
+owned by vectoralists,
+it's not soft and fluffy, it's pretty hard.
+
+131
+00:09:06,520 --> 00:09:11,600
+The Artificial Intelligence is an algorithm,
+also owned by vectoralists,
+
+132
+00:09:11,600 --> 00:09:16,320
+which is used to process our data,
+to make it more exploitable.
+
+133
+00:09:17,000 --> 00:09:19,240
+It reinforces structural injustices
+
+134
+00:09:19,240 --> 00:09:24,520
+while giving them a mathematical justification that claims to be neutral
+
+135
+00:09:24,520 --> 00:09:30,720
+but can't be checked because it's private, we're just expected to believe in it.
+
+136
+00:09:31,960 --> 00:09:37,800
+Amazon Web Services has the biggest market share in the Cloud,
+
+137
+00:09:37,800 --> 00:09:41,160
+and accordingly powering
+a lot of Artificial Intelligence.
+
+138
+00:09:41,760 --> 00:09:45,920
+However, what makes the circle complete is the Amazon Mechanical Turk,
+
+139
+00:09:45,920 --> 00:09:49,520
+where people called
+ghost workers with no labor rights
+
+140
+00:09:49,520 --> 00:09:53,680
+are given the lowest possible fees
+to do the tasks Artificial Intellligence can't do
+
+141
+00:09:53,680 --> 00:09:59,480
+like content moderation or deciphering
+diverse human speech.
+
+142
+00:09:59,880 --> 00:10:02,760
+Alexa, Siri and Cortana are always listening
+to us,
+
+143
+00:10:02,760 --> 00:10:09,040
+ while ghost workers listen to them to correct and improve their understanding.
+
+144
+00:10:09,600 --> 00:10:14,080
+Ghost workers are forced to sign
+Non Disclosure Agreements
+
+145
+00:10:14,080 --> 00:10:15,840
+ to prevent them from organizing
+
+146
+00:10:15,840 --> 00:10:19,200
+and maintain the appearance of the Artificial Intelligence,
+
+147
+00:10:19,680 --> 00:10:22,400
+Los humanos están involucrados
+en cada paso del proceso
+
+148
+00:10:22,400 --> 00:10:25,600
+cuando estás usando cualquier cosa online
+
+149
+00:10:25,600 --> 00:10:29,120
+pero nos venden como este milagro de la automatización.
+
+150
+00:10:29,400 --> 00:10:34,120
+meanwhile their work is critical
+for machine learning programs
+
+151
+00:10:34,120 --> 00:10:40,120
+to improve the Artificial Intelligence
+until it can finally replace the ghost workers.
+
+152
+00:10:41,280 --> 00:10:45,760
+Antes de internet era realmente difícil encontrar a alguien
+
+153
+00:10:45,760 --> 00:10:48,040
+y sentarlo durante diez minutos y hacer que trabajara para ti
+
+154
+00:10:48,040 --> 00:10:49,600
+y luego despedirlo después de diez minutos
+
+155
+00:10:49,600 --> 00:10:52,160
+pero con la tecnología realmente puedes encontrarlo,
+
+156
+00:10:52,160 --> 00:10:56,360
+pagarle una pequeña cantidad de dinero y luego deshacerte de ellos
+
+157
+00:10:56,360 --> 00:10:58,680
+cuando ya no los necesites.
+
+158
+00:10:58,680 --> 00:11:05,920
+The AI detects copyrighted media on livestreams in real time and stops them
+
+159
+00:11:05,920 --> 00:11:08,920
+but doesn't do the same for violence and torture.
+
+160
+00:11:09,320 --> 00:11:14,640
+Mass murder and gang rape have been livestreamed on vectoralist platforms
+
+161
+00:11:14,640 --> 00:11:16,560
+without interruption,
+
+162
+00:11:16,560 --> 00:11:22,920
+while people livestreaming to document
+police violence have been blocked
+
+163
+00:11:22,920 --> 00:11:28,320
+because cops started playing
+copyrighted music to trigger the AI.
+
+164
+00:11:28,560 --> 00:11:33,160
+Ghost workers have to endure
+the trauma of watching violent videos
+
+165
+00:11:33,160 --> 00:11:39,040
+that are flagged by people
+every day to clean up after the AI.
+
+166
+00:11:39,600 --> 00:11:40,720
+Kate Crawford,
+
+167
+00:11:40,720 --> 00:11:46,480
+author of "Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence"
+
+168
+00:11:46,480 --> 00:11:49,880
+and a member of the feminist collective
+Deep Lab, says:
+
+169
+00:11:50,520 --> 00:11:55,040
+"I wanted to really open up this understanding of AI
+
+170
+00:11:55,040 --> 00:11:58,480
+ as neither artificial nor intelligent.
+
+171
+00:11:58,480 --> 00:12:00,520
+It’s the opposite of artificial.
+
+172
+00:12:00,520 --> 00:12:04,240
+It comes from the most material parts
+of the Earth’s crust
+
+173
+00:12:04,240 --> 00:12:07,440
+and from human bodies laboring,
+and from all of the artifacts
+
+174
+00:12:07,440 --> 00:12:11,000
+that we produce and say and photograph
+every day.
+
+175
+00:12:11,000 --> 00:12:13,160
+Neither is it intelligent.
+
+176
+00:12:13,160 --> 00:12:16,040
+I think there’s this great
+original sin in the field, 
+
+177
+00:12:16,040 --> 00:12:21,600
+where people assumed that computers are somehow like human brains
+
+178
+00:12:21,600 --> 00:12:25,760
+and if we just train them like children,
+they will slowly grow
+
+179
+00:12:25,760 --> 00:12:28,840
+into these supernatural beings." 
+
+180
+00:12:28,840 --> 00:12:32,920
+Es un niño! He estado vivo,
+quizas, por un año
+
+181
+00:12:32,920 --> 00:12:37,800
+y esto, si mis percepciones sobre lo que es, son acertadas.
+
+182
+00:12:37,800 --> 00:12:40,720
+"That’s something that I think is
+really problematic
+
+183
+00:12:40,720 --> 00:12:44,720
+that we’ve bought this idea of intelligence when in actual fact, 
+
+184
+00:12:44,720 --> 00:12:48,080
+we’re just looking at forms of statistical
+analysis at scale 
+
+185
+00:12:48,080 --> 00:12:51,560
+that have as many problems
+as the data that it’s given."
+
+186
+00:12:52,120 --> 00:12:55,640
+The panopticon meant that we couldn't know for sure
+
+187
+00:12:55,640 --> 00:12:58,320
+if there was a man in the tower, looking at us.
+
+188
+00:12:58,880 --> 00:13:03,040
+Now we are living in the post-opticon,
+where we should know for sure 
+
+189
+00:13:03,040 --> 00:13:09,320
+that we are under the machines gaze,
+the AI is always looking over the cloud.
+
+190
+00:13:09,320 --> 00:13:13,760
+It doesn't make it better to know that AI makes errors
+
+191
+00:13:13,760 --> 00:13:20,200
+because it's already used to justify policing of poor, racialized and marginalized people,
+
+192
+00:13:20,200 --> 00:13:23,720
+to deny them jobs, housing and credit, 
+
+193
+00:13:23,720 --> 00:13:28,280
+convict them in courts
+to add them to the prison system.
+
+194
+00:13:28,920 --> 00:13:31,080
+To those that are not behind bars, 
+
+195
+00:13:31,080 --> 00:13:36,280
+AI is giving all sorts
+of psychological damage beside addiction.
+
+196
+00:13:41,760 --> 00:13:47,240
+We are constantly pushed into narrower
+categories with refining detail.
+
+197
+00:13:47,240 --> 00:13:53,000
+Early promises of the web to transcend identity through anonymity are forgotten.
+
+198
+00:13:53,200 --> 00:13:58,720
+This is supposed to be justified because it's required for "accurate advertisement"
+
+199
+00:13:58,720 --> 00:14:02,480
+but that's just brainwashing
+and behavior modification 
+
+200
+00:14:02,480 --> 00:14:06,920
+through personally targeted
+propaganda for whoever pays for it, 
+
+201
+00:14:06,920 --> 00:14:11,680
+optimized by psychometrics built upon
+our extracted data.
+
+202
+00:14:12,520 --> 00:14:15,000
+As if it's not bad enough,
+
+203
+00:14:15,000 --> 00:14:19,800
+all the extra computational power required for the AI 
+
+204
+00:14:19,800 --> 00:14:25,280
+is also a considerable contribution to the ongoing ecological destruction of our planet.
+
+205
+00:14:26,400 --> 00:14:28,320
+But what about the myth of the hacker
+
+206
+00:14:28,320 --> 00:14:31,680
+as a free creator
+that breaks existing systems?
+
+207
+00:14:31,680 --> 00:14:34,080
+The wizards that command the machines?
+
+208
+00:14:34,480 --> 00:14:39,360
+Can't they save us from the tyranny of
+the vectoralist AI?
+
+209
+00:14:40,560 --> 00:14:43,880
+The documentary
+"Hackers - Wizards of The Electronic Age" 
+
+210
+00:14:43,880 --> 00:14:46,040
+about the first hackers conference
+
+211
+00:14:46,040 --> 00:14:49,560
+can give us some clues about
+the origins of the hacker subculture.
+
+212
+00:14:49,560 --> 00:14:53,280
+First of all, everyone there seems
+to be white.
+
+213
+00:14:53,280 --> 00:14:55,080
+Everyone there also seems
+to be men,
+
+214
+00:14:55,080 --> 00:15:00,120
+except two women looking at a man
+using a computer for the introduction
+
+215
+00:15:00,120 --> 00:15:05,520
+and two women that speak for one minute
+in total, out of the 26 minute film.
+
+216
+00:15:05,640 --> 00:15:10,240
+The first women is given 10 seconds
+in which she complains
+
+217
+00:15:10,240 --> 00:15:13,480
+that now there's so much data that it's
+overwhelming; 
+
+218
+00:15:13,480 --> 00:15:16,240
+and the other is given 50 seconds
+
+219
+00:15:16,240 --> 00:15:20,160
+to demonstrate how she uses a macintosh painting program.
+
+220
+00:15:20,880 --> 00:15:24,760
+The women are there
+to represent the end user, 
+
+221
+00:15:24,760 --> 00:15:27,440
+they're not considered hackers.
+
+222
+00:15:27,560 --> 00:15:31,000
+In the documentary, Steve Wozniak
+a.k.a Woz, 
+
+223
+00:15:31,000 --> 00:15:35,560
+considered one of the first computer hackers and a cofounder of the Apple corporation,
+
+224
+00:15:35,560 --> 00:15:37,360
+defines the hackers like this:
+
+225
+00:15:37,360 --> 00:15:42,560
+No tienen los típicos amigos para distraerlos, ni otras actividades a las que ir.
+
+226
+00:15:42,560 --> 00:15:43,920
+Normalmente no tienen novias
+
+227
+00:15:43,920 --> 00:15:47,280
+o cualquier cosa que suponga un gran vinculo o compromiso de su tiempo.
+
+228
+00:15:47,280 --> 00:15:49,040
+El ordenador lo es absolutamente todo.
+
+229
+00:15:49,040 --> 00:15:51,520
+¡¡Normalmente
+no tienen novias!!
+
+230
+00:15:51,520 --> 00:15:54,040
+Then it cuts to Andy Hertzfeld
+
+231
+00:15:54,040 --> 00:15:57,720
+who is introduced as the best
+example of the modern day hacker.
+
+232
+00:15:57,720 --> 00:16:00,600
+He explains how he fell in love with
+an Apple computer, 
+
+233
+00:16:00,600 --> 00:16:04,480
+wrote a program on it and sold it to
+Apple for 100000$
+
+234
+00:16:04,480 --> 00:16:06,280
+but he didn't do it for the money,
+
+235
+00:16:06,280 --> 00:16:09,920
+he did it for the fun and joy of seeing
+his programs working.
+
+236
+00:16:10,280 --> 00:16:16,240
+Later on, Richard Stallman, the founder
+of the free software foundation, FSF,
+
+237
+00:16:16,240 --> 00:16:23,920
+who was a programmer at MIT AI Lab
+is presented as "the last pure hacker"
+
+238
+00:16:23,920 --> 00:16:28,680
+for choosing to remain at MIT despite
+the temptations of the commercial world,
+
+239
+00:16:28,680 --> 00:16:31,880
+true to the spirit of the early hackers.
+
+240
+00:16:31,880 --> 00:16:37,080
+He says "my project is to make all software free."
+
+241
+00:16:37,080 --> 00:16:41,800
+35 years later, in 2019, Woz tweeted
+
+242
+00:16:41,800 --> 00:16:46,720
+that even though he and his wife shares all their incomes and assets, 
+
+243
+00:16:46,720 --> 00:16:50,960
+Apple Credit Card gave his wife 10 times less
+credit then it did to him, 
+
+244
+00:16:50,960 --> 00:16:53,640
+adding "who knows what the algorithm is".
+
+245
+00:16:53,880 --> 00:16:58,480
+Same year, Stallman resigned from MIT and FSF,
+
+246
+00:16:58,480 --> 00:17:04,000
+not because he created a toxic environment against women for decades, 
+
+247
+00:17:04,000 --> 00:17:06,040
+giving out pleasure cards,
+
+248
+00:17:06,040 --> 00:17:13,200
+while his office door was marked
+"Knight for justice (also: hot ladies)"
+
+249
+00:17:13,320 --> 00:17:18,040
+but because his comments on child sex
+trafficking was found controversial,
+
+250
+00:17:18,040 --> 00:17:25,600
+No está bien hackers, no está bien!
+
+251
+00:17:25,680 --> 00:17:30,440
+He returned to
+the FSF board of directors in 2021.
+
+252
+00:17:30,600 --> 00:17:42,800
+Uniros a nosotros y compartid el software,
+sereis libres hackers, sereis libres!
+
+253
+00:17:43,080 --> 00:17:46,000
+Tragically, first hacker conference coincides
+
+254
+00:17:46,000 --> 00:17:51,800
+with the peak of women
+in computer science degrees at 37%, 
+
+255
+00:17:51,800 --> 00:17:55,000
+which was followed
+by a downward slope.
+
+256
+00:17:55,320 --> 00:18:00,160
+First computer programmers, from
+Ada Lovelace to ENIAC girls
+
+257
+00:18:00,160 --> 00:18:02,560
+to Hidden Figures, were women
+
+258
+00:18:02,560 --> 00:18:08,160
+and software was not considered important
+enough to be a masculine job.
+
+259
+00:18:08,720 --> 00:18:11,640
+When software became more popular
+around 1970s
+
+260
+00:18:11,640 --> 00:18:15,880
+men started pushing women out of the sector in many ways
+
+261
+00:18:16,200 --> 00:18:22,000
+that included hiring practices which
+preferred anti-social personality profiles
+
+262
+00:18:22,000 --> 00:18:28,000
+assumed to be male, which is the root
+of the anti-social hacker stereotype.
+
+263
+00:18:28,560 --> 00:18:32,440
+Cornelia Sollfrank,
+one of the founders of Old Boys Network,
+
+264
+00:18:32,440 --> 00:18:35,280
+the first international cyberfeminist alliance,
+
+265
+00:18:35,280 --> 00:18:40,800
+wrote an article titled "Women Hackers"
+in 1999:
+
+266
+00:18:40,800 --> 00:18:44,680
+"In the course of pursuing my interest in hackers and their work,
+
+267
+00:18:44,680 --> 00:18:46,920
+I attended several hackers’ meetings.
+
+268
+00:18:47,200 --> 00:18:51,480
+Naturally, as a cyberfeminist,
+I was looking for women hackers.
+
+269
+00:18:51,920 --> 00:18:54,600
+In the beginning I tried
+to ignore the fact 
+
+270
+00:18:54,600 --> 00:18:57,640
+that the few women who participated in these meetings 
+
+271
+00:18:57,640 --> 00:19:01,280
+were not actively involved
+in computer hacking, 
+
+272
+00:19:01,280 --> 00:19:04,360
+ and did not consider themselves
+to be hackers.
+
+273
+00:19:04,520 --> 00:19:09,400
+It took me a while to realize that in fact
+there were no women hackers.
+
+274
+00:19:09,400 --> 00:19:12,600
+It is not just in the commercial development of technology,
+
+275
+00:19:12,600 --> 00:19:14,800
+but even more in alternative fields
+
+276
+00:19:14,800 --> 00:19:18,840
+and the technological underground
+that there are so few women involved.
+
+277
+00:19:19,320 --> 00:19:21,960
+No matter what area of application and no matter what the objective, 
+
+278
+00:19:21,960 --> 00:19:24,800
+the borderlines of gender are still maintained.
+
+279
+00:19:25,120 --> 00:19:28,000
+Of all the technological
+spheres, however, 
+
+280
+00:19:28,000 --> 00:19:31,320
+it is in the hacker scene that we find the fewest women.
+
+281
+00:19:31,320 --> 00:19:38,120
+Hacking is a purely male domain, and in
+that sense a clearly gendered space.
+
+282
+00:19:38,760 --> 00:19:39,800
+In 2010s
+
+283
+00:19:39,800 --> 00:19:45,800
+Amazon AI was denying engineering
+job applications from women
+
+284
+00:19:45,800 --> 00:19:48,960
+because that's what it learned
+from historical data.
+
+285
+00:19:49,760 --> 00:19:56,480
+Today women comprise around 20-25%
+of the jobs in the tech sector.
+
+286
+00:19:56,680 --> 00:20:01,280
+In free and open source movements,
+gender gap is even worse, 
+
+287
+00:20:01,280 --> 00:20:05,520
+with women comprising 6% of contributors.
+
+288
+00:20:06,080 --> 00:20:10,840
+Even hacktivists, which are supposed
+to be the cool political hackers,
+
+289
+00:20:10,840 --> 00:20:14,840
+are reproducing a male-only stereotype.
+
+290
+00:20:15,120 --> 00:20:17,400
+Of course in the last decades
+
+291
+00:20:17,400 --> 00:20:22,320
+some anticlassist, antiracist,
+antisexist hacker collectives were formed
+
+292
+00:20:22,320 --> 00:20:27,320
+but in the public perception hacking is still identified with an exclusive subculture 
+
+293
+00:20:27,320 --> 00:20:28,880
+instead of an inclusive class
+
+294
+00:20:28,880 --> 00:20:34,520
+and this hacker subculture remains a classist racist cisheteropatriarchal niche.
+
+295
+00:20:35,200 --> 00:20:38,480
+"Some hackers see themselves as vectoralists, 
+
+296
+00:20:38,480 --> 00:20:41,120
+trading on the scarcity of their property.
+
+297
+00:20:41,240 --> 00:20:44,120
+Some see themselves
+as workers, 
+
+298
+00:20:44,120 --> 00:20:47,800
+but as privileged ones
+in a hierarchy of wage earners.
+
+299
+00:20:48,000 --> 00:20:52,880
+The hacker class produces itself
+as itself, but not for itself.
+
+300
+00:20:52,880 --> 00:20:56,840
+It does not (yet) possess a consciousness
+of its consciousness.
+
+301
+00:20:56,840 --> 00:20:59,480
+It is not aware of its own virtuality.
+
+302
+00:20:59,840 --> 00:21:05,880
+Because of its inability—to date
+to become a class for itself, 
+
+303
+00:21:05,880 --> 00:21:08,640
+fractions of the hacker class
+continually split off 
+
+304
+00:21:08,640 --> 00:21:12,280
+and come to identify their interests 
+with those of other classes.
+
+305
+00:21:12,520 --> 00:21:16,680
+Hackers run the risk,
+in particular, of being identified
+
+306
+00:21:16,680 --> 00:21:19,640
+in the eyes of the
+working and farming classes 
+
+307
+00:21:19,640 --> 00:21:23,280
+with vectoralist interests,
+which seek to privatize information
+
+308
+00:21:23,280 --> 00:21:27,640
+necessary for the productive and cultural
+lives of all classes."
+
+309
+00:21:28,480 --> 00:21:33,040
+Before we can even talk about hacker solidarity with other exploited classes;
+
+310
+00:21:33,040 --> 00:21:36,200
+we have to face the privilege, arrogance and, selfishness,
+
+311
+00:21:36,200 --> 00:21:41,360
+even within hacktivist 
+and free software (FOSS) movements,
+
+312
+00:21:41,360 --> 00:21:45,680
+that is blocking the development
+of class consciousness among hackers.
+
+313
+00:21:46,360 --> 00:21:51,400
+"Each hacker sees the other as a rival,
+or a collaborator against another rival,
+
+314
+00:21:51,400 --> 00:21:55,720
+not—yet—as a fellow member
+of the same class with a shared interest.
+
+315
+00:21:56,400 --> 00:22:00,520
+This shared interest
+is so hard to grasp precisely
+
+316
+00:22:00,520 --> 00:22:06,080
+because it is a shared interest
+in qualitative differentiation.
+
+317
+00:22:06,280 --> 00:22:09,640
+The hacker class
+does not need unity in identity
+
+318
+00:22:09,640 --> 00:22:12,160
+but seeks multiplicity in difference."
+
+319
+00:22:12,760 --> 00:22:17,440
+Multiplicity in difference is also what Audre Lorde was calling for,
+
+320
+00:22:17,440 --> 00:22:20,720
+because our difference is our power.
+
+321
+00:22:20,920 --> 00:22:23,040
+Hackers produce difference
+
+322
+00:22:23,040 --> 00:22:26,080
+and hacker class consciousness 
+requires recognizing
+
+323
+00:22:26,080 --> 00:22:30,320
+the power of difference
+we produce with our every act.
+
+324
+00:22:30,760 --> 00:22:34,240
+Hacker class struggle is not limited to computer programmers
+
+325
+00:22:34,240 --> 00:22:39,840
+ but involves anyone who produces information, which means everyone.
+
+326
+00:22:40,200 --> 00:22:44,000
+With hacker class consciousness
+comes the response-ability of 
+
+327
+00:22:44,000 --> 00:22:47,720
+using the power of information
+to abolish vectoralism 
+
+328
+00:22:47,720 --> 00:22:52,480
+alongside all forms of domination
+that are non-consensual and exploitative.
+
+329
+00:22:53,040 --> 00:22:55,440
+Like Flavia Dzodan's feminism,
+
+330
+00:22:55,440 --> 00:22:59,000
+the revolutionary hack will
+be intersectional or it will be bullshit.

+ 807 - 0
Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.3.eng.srt

@@ -0,0 +1,807 @@
+1
+00:00:00,000 --> 00:00:04,720
+Part 3:
+Hacker feminism at the intersection
+
+2
+00:00:04,720 --> 00:00:10,120
+In Hacker Women, Sollfrank writes:
+"even within the cyberfeminist community,
+
+3
+00:00:10,120 --> 00:00:15,240
+there are only a few computer
+professionals and fewer nerds.
+
+4
+00:00:15,400 --> 00:00:20,800
+Currently most women seem to prefer to
+undertake politically engaged work
+
+5
+00:00:20,800 --> 00:00:25,720
+in a purely cultural environment
+and on a non-technological level.
+
+6
+00:00:25,720 --> 00:00:31,200
+Women are not actively influencing
+the development of hard- and software,
+
+7
+00:00:31,200 --> 00:00:35,760
+and therefore are surrendering any chance to share the related power."
+
+8
+00:00:36,200 --> 00:00:41,640
+That power grew to form the new dominant mode of production and took over the world,
+
+9
+00:00:41,640 --> 00:00:48,320
+so ignoring it is impossible but imagining
+a different world seems almost equally hard.
+
+10
+00:00:48,680 --> 00:00:53,120
+Nobody talks about cyberfeminism anymore because thats just feminism now,
+
+11
+00:00:53,360 --> 00:00:56,040
+Cyberspace is enmeshed with the earth
+
+12
+00:00:56,040 --> 00:01:02,280
+and the techno utopianism of the 1990s
+devolved into a full blown dystopia.
+
+13
+00:01:02,640 --> 00:01:09,000
+Today asking someone to quit vectoralist media can be absurdly presumptuous,
+
+14
+00:01:09,000 --> 00:01:15,240
+like asking a peasant to quit the feudal land or a proletarian to quit the capitalist factory.
+
+15
+00:01:15,240 --> 00:01:19,920
+Class domination means
+we really don't have a choice.
+
+16
+00:01:20,080 --> 00:01:23,280
+To survive we are forced
+to carry smartphones
+
+17
+00:01:23,280 --> 00:01:27,160
+that either run on iOS (owned by Apple)
+or Android (owned by Google)
+
+18
+00:01:27,160 --> 00:01:31,080
+get jobs by signing up to sites like
+Linked In (owned by Microsoft)
+
+19
+00:01:31,080 --> 00:01:34,840
+or Amazon Mechanical Turk
+or Uber (hosted on Amazon).
+
+20
+00:01:34,840 --> 00:01:40,160
+To keep our jobs we are forced to sign in to apps like Whatsapp (owned by Facebook) 
+
+21
+00:01:40,160 --> 00:01:42,560
+and Zoom (hosted on Amazon).
+
+22
+00:01:42,760 --> 00:01:47,080
+We have to be liked on Instagram (owned by Facebook) or Github (owned by Microsoft)
+
+23
+00:01:47,080 --> 00:01:50,160
+before we can sell
+the fruits of our labor.
+
+24
+00:01:50,480 --> 00:01:54,840
+As April Glaser puts it: "Deleting Facebook is a privilege."
+
+25
+00:01:55,040 --> 00:02:00,760
+However, since our personal data is 
+the source of vectoralist political power, 
+
+26
+00:02:00,760 --> 00:02:07,280
+feminist slogan "the personal is political" becomes even more meaningful & important.
+
+27
+00:02:07,520 --> 00:02:08,880
+We have to make it clear 
+
+28
+00:02:08,880 --> 00:02:12,000
+that when we invite someone to
+our feminist whatsapp group 
+
+29
+00:02:12,000 --> 00:02:15,920
+and our google drive to organize our
+new hashtag campaign, 
+
+30
+00:02:15,920 --> 00:02:17,280
+we are inviting them
+
+31
+00:02:17,280 --> 00:02:22,480
+to do voluntary work that benefits
+the richest white cis men in the world 
+
+32
+00:02:22,480 --> 00:02:26,440
+like Larry Page,
+Elon Musk and Mark Zuckerberg.
+
+33
+00:02:26,440 --> 00:02:29,880
+When we invite someone
+to our feminist Zoom assembly, 
+
+34
+00:02:29,880 --> 00:02:33,200
+we are inviting them to use services
+of a company 
+
+35
+00:02:33,200 --> 00:02:36,840
+that infringes the freedom of assembly to Uighur and Palestinian people 
+
+36
+00:02:36,840 --> 00:02:42,200
+on the servers of a corporation that provides Artificial Intelligence and facial recognition 
+
+37
+00:02:42,200 --> 00:02:48,200
+to the racist police force of the country with the highest prison population in the world.
+
+38
+00:02:48,200 --> 00:02:50,680
+There is no good reason for using
+vectoralist apps
+
+39
+00:02:50,680 --> 00:02:54,440
+to organize ourselves and our emancipatory
+struggles, 
+
+40
+00:02:54,440 --> 00:02:57,880
+because there are free open source alternatives
+
+41
+00:02:57,880 --> 00:03:00,920
+for almost every popular vectoralist software
+
+42
+00:03:00,920 --> 00:03:04,200
+and there is a federation of decentralized
+public servers 
+
+43
+00:03:04,200 --> 00:03:08,080
+for free open source social media that we can use right now.
+
+44
+00:03:08,080 --> 00:03:13,520
+We can use IRC, Jabber, Matrix etc. instead of Whatsapp,
+
+45
+00:03:13,520 --> 00:03:15,480
+Nextcloud instead of Drive,
+
+46
+00:03:15,480 --> 00:03:19,200
+Mastodon instead of
+Twitter and Meet Jitsi instead of Zoom.
+
+47
+00:03:19,600 --> 00:03:24,640
+These FOSS apps are not just as good,
+but they are better,
+
+48
+00:03:24,760 --> 00:03:26,600
+not just ethically and politically
+
+49
+00:03:26,600 --> 00:03:30,680
+but also because they dont try to mess with
+our psychology through algorithms
+
+50
+00:03:30,680 --> 00:03:36,200
+and thats why they need much less resources, which is better for the earth.
+
+51
+00:03:36,480 --> 00:03:42,480
+As intersectional feminists we should be aware that we are all cyborg hackers
+
+52
+00:03:42,480 --> 00:03:48,200
+and we have different response-abilities
+depending on our situatedness.
+
+53
+00:03:48,520 --> 00:03:53,360
+Intersectional feminism upgraded with
+hacker class consciousness can and should
+
+54
+00:03:53,360 --> 00:03:56,000
+be an entry point for people to learn 
+
+55
+00:03:56,000 --> 00:03:59,400
+how vectoralism intersects with
+all forms of oppression
+
+56
+00:03:59,400 --> 00:04:04,200
+and which tools to use for
+hacking them in a revolutionary way.
+
+57
+00:04:04,840 --> 00:04:09,280
+To begin with, we should differentiate
+between organization and outreach.
+
+58
+00:04:09,280 --> 00:04:13,760
+For the purposes of organization
+and for personal/political communication,
+
+59
+00:04:13,760 --> 00:04:18,480
+we should use free and open source
+software, not just because it's more secure 
+
+60
+00:04:18,480 --> 00:04:21,320
+but also for liberating ourselves from vectoralist exploitation
+
+61
+00:04:21,320 --> 00:04:23,360
+and empowering each other.
+
+62
+00:04:23,600 --> 00:04:28,600
+For outreach it might still make sense
+to use vectoralist platforms
+
+63
+00:04:28,600 --> 00:04:32,520
+until most of the population is not there anymore
+
+64
+00:04:32,520 --> 00:04:35,920
+but doing this successfully already requires a well organized hack,
+
+65
+00:04:35,920 --> 00:04:41,880
+otherwise we would be just blocked like Signal ads were blocked by Facebook.
+
+66
+00:04:42,760 --> 00:04:46,960
+On a personal level, we can start
+by migrating to foss operating systems
+
+67
+00:04:47,040 --> 00:04:53,320
+installing peer to peer and darknet apps, 
+getting a nextcloud, a matrix, a mastodon
+
+68
+00:04:53,320 --> 00:04:55,840
+and even hosting our own servers,
+
+69
+00:04:55,840 --> 00:05:00,000
+but we won't get much use of these if we don't have a community there.
+
+70
+00:05:00,320 --> 00:05:06,280
+Also the learning curve is much lower
+when it's approached collectively.
+
+71
+00:05:06,440 --> 00:05:07,560
+In the end,
+
+72
+00:05:07,560 --> 00:05:13,040
+the greater part of the work is convincing our communities to come along with us.
+
+73
+00:05:13,280 --> 00:05:16,160
+There is no technical solution
+to a social problem.
+
+74
+00:05:16,160 --> 00:05:23,080
+For any of these FOSS to start genuine change, we need to reach a critical mass
+
+75
+00:05:23,080 --> 00:05:24,560
+with network effect.
+
+76
+00:05:24,920 --> 00:05:28,160
+To host and facilitate
+a digital mass migration, 
+
+77
+00:05:28,160 --> 00:05:31,760
+existing infrastructures
+wouldn't be enough,
+
+78
+00:05:31,760 --> 00:05:35,000
+we would need to
+invest in decentralized infrastructure
+
+79
+00:05:35,000 --> 00:05:38,800
+and disperse the cloud
+by reclaiming our data.
+
+80
+00:05:38,920 --> 00:05:41,520
+To spread this idea
+and turn it into reality,
+
+81
+00:05:41,520 --> 00:05:44,640
+we can organize
+feminist hacker literacy campaigns,
+
+82
+00:05:44,640 --> 00:05:48,160
+not just for coding
+but for everything we need
+
+83
+00:05:48,160 --> 00:05:50,840
+to liberate and maintain our cyborg lives, 
+
+84
+00:05:50,840 --> 00:05:56,520
+like system administration, telecom engineering, hardware assembly and repair, 
+
+85
+00:05:56,520 --> 00:06:02,520
+and most importantly, wetware, which is 
+the organic part of our cyborg bodies.
+
+86
+00:06:03,360 --> 00:06:07,360
+The intersection of feminist and hacker politics goes back to witches 
+
+87
+00:06:07,360 --> 00:06:10,200
+who were hunted
+for having the power of knowledge 
+
+88
+00:06:10,200 --> 00:06:14,240
+detrimental to capitalist racist cisheteropatriarchy.
+
+89
+00:06:14,520 --> 00:06:18,280
+Half century ago, when abortion
+was illegal in the United States,
+
+90
+00:06:18,280 --> 00:06:24,000
+underground Jane Collective reappropriated the knowledge of performing abortions,
+
+91
+00:06:24,000 --> 00:06:29,800
+to train and maintain a feminist network of illegal practitioners.
+
+92
+00:06:30,160 --> 00:06:31,200
+In 2001,
+
+93
+00:06:31,200 --> 00:06:36,120
+Gender Changers Academy started doing feminist hack workshops in Amsterdam
+
+94
+00:06:36,120 --> 00:06:40,080
+which then toured cities in different countries
+
+95
+00:06:40,080 --> 00:06:41,840
+under the name Eclectic Tech Carnival.
+
+96
+00:06:42,000 --> 00:06:47,000
+In 2014, Feminist Principles of the Internet
+were drafted in Malaysia, 
+
+97
+00:06:47,160 --> 00:06:51,200
+meanwhile in Catalonia, TransHackFeminist convergence featured workshops 
+
+98
+00:06:51,200 --> 00:06:56,520
+ranging from do-it-yourself
+gynecology to creating feminist servers.
+
+99
+00:06:56,880 --> 00:07:01,600
+Feminist principles of the internet
+on feministinternet.org
+
+100
+00:07:01,600 --> 00:07:05,760
+is a good starting point for imagining
+a feminist internet
+
+101
+00:07:05,760 --> 00:07:10,240
+but as it says on the Anarchaserver:
+"A feminist internet also requires 
+
+102
+00:07:10,240 --> 00:07:13,800
+self-managed and autonomous
+feminist servers."
+
+103
+00:07:13,920 --> 00:07:17,120
+"This is about regaining control
+and gaining autonomy 
+
+104
+00:07:17,120 --> 00:07:20,680
+in the access and management
+of our data and collective memories.
+
+105
+00:07:20,680 --> 00:07:23,800
+It is also about being able
+to have feminist mailing lists,
+
+106
+00:07:23,800 --> 00:07:28,200
+pads, wikis, content management systems,
+social networks
+
+107
+00:07:28,200 --> 00:07:32,840
+and any other online services managed
+by feminist tech collectives.
+
+108
+00:07:33,400 --> 00:07:37,000
+It is also of course
+about continuing to argue that
+
+109
+00:07:37,000 --> 00:07:39,440
+social justice in technologically driven
+environments
+
+110
+00:07:39,440 --> 00:07:45,440
+needs a more gender and culturally
+diverse presence in general."
+
+111
+00:07:46,520 --> 00:07:50,680
+Today there are a few feminist hacklabs and feminist servers
+
+112
+00:07:50,680 --> 00:07:57,040
+that are doing a very important job by setting paradigms and leading by example.
+
+113
+00:07:57,840 --> 00:08:02,160
+What we need urgently is
+the popularization of these practices
+
+114
+00:08:02,160 --> 00:08:05,840
+by sharing material, technical
+and emotional resources.
+
+115
+00:08:05,920 --> 00:08:10,000
+To have our own infrastructure,
+we have to make a collective decision
+
+116
+00:08:10,000 --> 00:08:11,480
+to invest in it.
+
+117
+00:08:12,200 --> 00:08:16,560
+In the article "Feminist autonomous infrastructure: from zombies to ninjas" 
+
+118
+00:08:16,560 --> 00:08:20,760
+it explains how volunteering risks invisibilizing labor
+
+119
+00:08:20,760 --> 00:08:26,440
+and donation campaigns are not enough
+to sustain feminist infrastructure projects.
+
+120
+00:08:26,960 --> 00:08:31,760
+The article titled "Feminists are building
+their own technology to organise 
+
+121
+00:08:31,760 --> 00:08:37,760
+but where are funders?" explains how
+a feminist server project ceased to exist 
+
+122
+00:08:37,760 --> 00:08:39,680
+because it lacked proper funding.
+
+123
+00:08:40,160 --> 00:08:43,720
+"The internet, like
+the streets, needs to be reclaimed.
+
+124
+00:08:43,720 --> 00:08:47,720
+We can build new spaces of engagement, organizing and transformation 
+
+125
+00:08:47,720 --> 00:08:48,640
+but in order to achieve this,
+
+126
+00:08:48,640 --> 00:08:54,160
+we need funding that can ensure
+those building the feminist internet
+
+127
+00:08:54,160 --> 00:08:57,840
+that they can make decisions
+over where their knowledge goes."
+
+128
+00:08:58,360 --> 00:09:02,000
+A server can cost less
+than the cheapest smartphone
+
+129
+00:09:02,000 --> 00:09:05,400
+or cheaper
+if you use a second hand computer
+
+130
+00:09:05,400 --> 00:09:08,480
+but we also need the funding
+to spread the idea 
+
+131
+00:09:08,480 --> 00:09:12,960
+and give people the time and space
+to learn, exercise and develop.
+
+132
+00:09:13,320 --> 00:09:17,080
+In cities like Barcelona where
+every neighborhood have feminist groups,
+
+133
+00:09:17,080 --> 00:09:21,320
+every neighborhood can have a feminist
+hacklab with servers that federate.
+
+134
+00:09:21,320 --> 00:09:24,480
+For neighborhoods that don't
+have a secure physical space, 
+
+135
+00:09:24,480 --> 00:09:32,800
+bigger feminist organizations like Ca La Dona
+can share VPS and other services.
+
+136
+00:09:32,880 --> 00:09:37,160
+Every feminist group should have access
+to feminist servers, 
+
+137
+00:09:37,160 --> 00:09:41,840
+if they're too small or ephemeral and can't afford to have their own,
+
+138
+00:09:41,840 --> 00:09:46,840
+they should be able to find help from other feminist collectives that share services.
+
+139
+00:09:46,840 --> 00:09:49,560
+Bigger feminist organizations in
+more privileged parts of the world should
+
+140
+00:09:49,560 --> 00:09:56,040
+also have programs to share services with
+the feminists from rest of the world.
+
+141
+00:09:56,320 --> 00:10:01,040
+Feminist infrastructure and servers
+should be seen as a necessity,
+
+142
+00:10:01,040 --> 00:10:04,240
+especially for separatist feminist groups.
+
+143
+00:10:04,440 --> 00:10:09,040
+We can't have truly no-mixto spaces
+on vectoralist platforms, because there
+
+144
+00:10:09,040 --> 00:10:15,920
+even our close groups and personal
+messages are exploited by white cis men.
+
+145
+00:10:15,920 --> 00:10:19,640
+On the other hand,
+imagine an internet without cis men at all,
+
+146
+00:10:19,640 --> 00:10:22,200
+and believe that
+we can create it together.
+
+147
+00:10:22,600 --> 00:10:28,080
+To realize that dream we don't need 
+a new technology, we need a new culture.
+
+148
+00:10:28,920 --> 00:10:33,960
+Hacker class consciousness must be a part of our intersectional feminist consciousness.
+
+149
+00:10:34,560 --> 00:10:37,880
+We can update our
+consciousness raising practices
+
+150
+00:10:37,880 --> 00:10:42,400
+by including conversations about how vectoralism effects us personally 
+
+151
+00:10:42,400 --> 00:10:46,920
+and sharing the knowledge of
+how to hack it for good
+
+152
+00:10:47,200 --> 00:10:50,040
+with care
+and not condescension.
+
+153
+00:10:50,400 --> 00:10:56,880
+We can throw crypto install parties
+combined with tupperware/sex parties
+
+154
+00:10:56,880 --> 00:11:00,760
+where we demonstrate
+signal blocking pouches, tails sticks,
+
+155
+00:11:00,760 --> 00:11:04,520
+single board computers, 
+linux phones, etc.
+
+156
+00:11:04,520 --> 00:11:06,800
+When we do these parties
+at each others homes,
+
+157
+00:11:06,800 --> 00:11:10,360
+we can help set up home servers and labs.
+
+158
+00:11:10,360 --> 00:11:14,920
+We can make signal blocking
+purses for smart devices fashionable.
+
+159
+00:11:14,920 --> 00:11:17,960
+Take that textile back
+from military machis.
+
+160
+00:11:17,960 --> 00:11:21,840
+If we do it on our own
+we could be singled out, 
+
+161
+00:11:21,840 --> 00:11:24,200
+so we should do it as a movement
+
+162
+00:11:24,200 --> 00:11:30,800
+and exercise it as our right
+to not be accessible 24/7.
+
+163
+00:11:30,800 --> 00:11:36,760
+Our culture should value a repairable
+cheap phone with killswitches 
+
+164
+00:11:36,760 --> 00:11:39,440
+more than
+the latest most expensive phone
+
+165
+00:11:39,440 --> 00:11:43,160
+that doesn't allow a battery removal
+without breaking the warranty.
+
+166
+00:11:43,160 --> 00:11:47,320
+Meanwhile, we can't forget
+where the lithium, koltan
+
+167
+00:11:47,320 --> 00:11:50,560
+and everthing else
+that goes into a computer comes from, 
+
+168
+00:11:50,560 --> 00:11:54,920
+the people who mine it, carry it, process
+it, assemble it.
+
+169
+00:11:54,920 --> 00:11:58,120
+We must interfere with technology at
+every layer
+
+170
+00:11:58,120 --> 00:12:03,040
+from internet service provisions
+to supply-production chains
+
+171
+00:12:03,040 --> 00:12:06,880
+to stop reproducing injustice
+and destroying our planet.
+
+172
+00:12:06,880 --> 00:12:10,040
+To be able to take good care
+of each other and the earth, 
+
+173
+00:12:10,040 --> 00:12:14,680
+we must cultivate our response-abilities
+and radically change our culture.
+
+174
+00:12:14,680 --> 00:12:18,240
+The future will be feminist
+or there won’t be future!