diff --git a/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.1.eng.srt b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.1.eng.srt new file mode 100644 index 0000000..c790c31 --- /dev/null +++ b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.1.eng.srt @@ -0,0 +1,961 @@ +1 +00:00:00,000 --> 00:00:03,720 +Upgrading intersectional feminism with +the hacker class + +2 +00:00:03,800 --> 00:00:07,520 +Part 1: Evolution of feminist cyborgs + +3 +00:00:08,080 --> 00:00:13,360 +"By the late twentieth century, our time, +a mythic time, we are all chimeras, + +4 +00:00:13,360 --> 00:00:19,080 +theorized and fabricated hybrids of machine and organism — in short, cyborgs. + +5 +00:00:19,080 --> 00:00:23,240 +The cyborg is our ontology; +it gives us our politics. + +6 +00:00:23,240 --> 00:00:27,600 +The cyborg is a condensed image +of both imagination and material reality, + +7 +00:00:27,600 --> 00:00:33,200 +the two joined centers structuring any +possibility of historical transformation." + +8 +00:00:33,480 --> 00:00:35,560 +When the queen Elizabeth +of the United Kingdom + +9 +00:00:35,560 --> 00:00:40,760 +sent her first email in 1976, +there were no feminists on the internet, + +10 +00:00:40,760 --> 00:00:44,240 +it was just a military science project. + +11 +00:00:44,760 --> 00:00:48,920 +A Cyborg Manifesto is considered +the beginning of cyberfeminism + +12 +00:00:48,920 --> 00:00:51,800 +because Donna Haraway's position +was unique. + +13 +00:00:52,320 --> 00:00:56,880 +"I am conscious of the odd perspective provided by my historical position + +14 +00:00:56,880 --> 00:01:02,080 +a PhD in biology for an Irish Catholic girl +was made possible + +15 +00:01:02,080 --> 00:01:07,760 +by Sputnik’s impact +on U.S. national science-education policy. + +16 +00:01:08,000 --> 00:01:10,560 +I have a body and mind as much constructed + +17 +00:01:10,560 --> 00:01:14,600 +by the post–Second World War arms race and Cold War + +18 +00:01:14,600 --> 00:01:17,240 +as by the women’s movements. + +19 +00:01:17,520 --> 00:01:22,000 +There are more grounds for hope +in focusing on the contradictory effects + +20 +00:01:22,000 --> 00:01:26,400 + of politics designed to +produce loyal American technocrats, + +21 +00:01:26,400 --> 00:01:29,680 +which also produced +large numbers of dissidents, + +22 +00:01:29,680 --> 00:01:32,640 + than in focusing +on the present defeats." + +23 +00:01:32,640 --> 00:01:38,880 +A Cyborg Manifesto was published in the Socialist Review magazine in 1985. + +24 +00:01:38,880 --> 00:01:43,360 +Only 2000 hosts were connected to the internet + +25 +00:01:43,360 --> 00:01:47,920 +and they were limited to a military, administrative and academic elite, + +26 +00:01:48,000 --> 00:01:51,080 +predominantly bourgeois white cis men. + +27 +00:01:53,880 --> 00:01:59,480 +Apple was already marketing itself +as the freedom warrior + +28 +00:01:59,480 --> 00:02:02,720 +with an expensive commercial directed by Ridley Scott, + +29 +00:02:02,720 --> 00:02:08,720 +aired during Super Bowl 1984 with an Orwellian theme. + +30 +00:02:09,640 --> 00:02:12,400 +"The main trouble with cyborgs, of course, + +31 +00:02:12,400 --> 00:02:16,760 +is that they are the illegitimate offspring of militarism and patriarchal capitalism, + +32 +00:02:16,760 --> 00:02:19,240 +not to mention state socialism. + +33 +00:02:19,240 --> 00:02:23,240 +But illegitimate offspring are often +exceedingly unfaithful to their origins. + +34 +00:02:23,240 --> 00:02:26,360 +Their fathers, after all, +are inessential." + +35 +00:02:26,840 --> 00:02:32,600 +Just when capitalism declared its global victory and the "end of history" in 1991, + +36 +00:02:32,600 --> 00:02:37,000 +the internet was made available +to the general public as World Wide Web. + +37 +00:02:37,440 --> 00:02:42,280 +That year Judy Wajcman wrote +"Feminism confronts technology" + +38 +00:02:42,280 --> 00:02:47,280 +and VNS Matrix, +the first cyberfeminist collective was founded + +39 +00:02:47,280 --> 00:02:51,680 +who published "a cyberfeminist manifesto +for the 21st century" that claimed: + +40 +00:02:51,680 --> 00:02:54,200 +"we are the virus of the new world disorder + +41 +00:02:54,200 --> 00:02:56,320 +rupturing the symbolic from within + +42 +00:02:56,320 --> 00:02:59,200 +saboteurs of big daddy mainframe + +43 +00:02:59,200 --> 00:03:02,200 +the clitoris is a direct line to the matrix + +44 +00:03:02,200 --> 00:03:06,000 +the VNS MATRIX +terminators of the moral codes + +45 +00:03:06,000 --> 00:03:07,760 +mercenaries of slime" + +46 +00:03:08,720 --> 00:03:10,520 +Around the same time + +47 +00:03:10,520 --> 00:03:17,320 +Sandy Stone wrote "Will the real +body please stand up?" + +48 +00:03:18,200 --> 00:03:22,920 +emphasizing the realness of "virtual reality" +and how the internet facilitates + +49 +00:03:22,920 --> 00:03:27,160 +crossing over borders of gender +and other socially structured identities. + +50 +00:03:27,160 --> 00:03:32,480 +She says: "My interest in cyberspace +is primarily about communities + +51 +00:03:32,480 --> 00:03:33,840 +and how they work." + +52 +00:03:34,480 --> 00:03:38,480 +Cyberfeminist communities were blooming on the web with radical ideas + +53 +00:03:38,480 --> 00:03:41,000 +but websites were still static + +54 +00:03:41,000 --> 00:03:47,920 +and internet users were less than 0.5% of the world population until 1995, + +55 +00:03:47,920 --> 00:03:50,880 +when Bill Gates was already the richest person on the world. + +56 +00:03:57,640 --> 00:04:02,840 +Carmen Hermosillo fue una de las primeras adeptas de las comunidades del ciberespacio + +57 +00:04:03,280 --> 00:04:06,080 +"Está de moda sugerir" escribió + +58 +00:04:06,080 --> 00:04:08,920 +"que el ciberespacio es un tipo de isla de los benditos + +59 +00:04:08,920 --> 00:04:13,480 +donde la gente es libre de expresar y entregarse a su individualidad. + +60 +00:04:13,480 --> 00:04:15,520 +Esto no es cierto. + +61 +00:04:15,880 --> 00:04:20,720 +He visto mucha gente exponer +sus emociones, sus entrañas online + +62 +00:04:20,720 --> 00:04:26,520 +y yo misme lo hice hasta que vi me había mercantilizado a mi misme." + +63 +00:04:26,680 --> 00:04:28,600 +At the beginning +of the new millennium + +64 +00:04:28,600 --> 00:04:33,360 +with 5% of the world population connected +to the net, Darcy DiNucci introduced + +65 +00:04:33,360 --> 00:04:35,400 +the Web 2.0: + +66 +00:04:35,760 --> 00:04:39,800 +"The Web will be understood +not as screenfuls of text and graphics but + +67 +00:04:39,800 --> 00:04:45,160 +as a transport mechanism, the ether +through which interactivity happens. + +68 +00:04:45,160 --> 00:04:49,520 +It will [...] appear on your computer +screen, [...] on your TV set [...] + +69 +00:04:49,520 --> 00:04:53,200 +your car dashboard [...] your cell phone +[...] hand-held game machines [...] + +70 +00:04:53,200 --> 00:04:56,080 +maybe even your microwave oven." + +71 +00:04:57,120 --> 00:05:01,160 +Ahora, con la fibra óptica conectada directamente a tu casa + +72 +00:05:01,160 --> 00:05:06,760 +suponiendo que cuando llegue al poste de teléfono no vuelve a ser cableado, + +73 +00:05:06,760 --> 00:05:09,440 +sino que sigue siendo fibra, + +74 +00:05:09,440 --> 00:05:15,040 +puedes hacer cosas como descargarte una película entera en unos minutos, + +75 +00:05:15,040 --> 00:05:16,760 +cosas de este tipo. + +76 +00:05:16,760 --> 00:05:22,800 +Todas tus comunicaciones vendran +en formato tcp/ip, + +77 +00:05:22,800 --> 00:05:26,640 +lo que significa que serán todas digitales, serán todas paquetes de datos + +78 +00:05:26,640 --> 00:05:28,400 +serán todas conmutables. + +79 +00:05:28,400 --> 00:05:37,520 +Y podrían ser televisión, radio, ordenador, teléfono y cualquier tipo de comunicación + +80 +00:05:37,520 --> 00:05:42,520 +vendría en forma de paquetes, +paquetes tcp/ip. + +81 +00:05:42,520 --> 00:05:47,080 +Probablemente tardará entre 10 y 20 años +a desarrollarse + +82 +00:05:47,080 --> 00:05:53,000 +pero ya está siendo desarrollado con éxito en pruebas de mercado. + +83 +00:05:53,000 --> 00:05:59,640 +A mi me gusta, +pero eso no quiere decir nada. + +84 +00:06:00,560 --> 00:06:04,800 +Blogs and microblogs gradually spread among cyberfeminists + +85 +00:06:04,800 --> 00:06:06,600 +and signalled the next era. + +86 +00:06:06,800 --> 00:06:09,920 +Tarana Burke started Me Too +on Myspace in 2006 + +87 +00:06:09,920 --> 00:06:12,200 +but it took some time before it caught on. + +88 +00:06:12,680 --> 00:06:17,440 +Sheryl Sandberg leaned in to become +"the Typhoid Mary of surveillance capitalism" + +89 +00:06:17,440 --> 00:06:20,160 + first by building the business model of Google, + +90 +00:06:20,160 --> 00:06:23,800 +then moving on to become the Chief +Operating Officer of Facebook. + +91 +00:06:24,080 --> 00:06:31,240 +In 2021, internet penetration rate, the industry jargon for internet access, + +92 +00:06:31,240 --> 00:06:34,280 +is at 65 percent of the world population. + +93 +00:06:34,280 --> 00:06:38,760 +In Europe, North America and Japan it's +around 90 percent. + +94 +00:06:39,440 --> 00:06:41,560 +To understand Donna Haraway's words + +95 +00:06:41,560 --> 00:06:47,000 +"Our machines are disturbingly lively, and we ourselves frighteningly inert" + +96 +00:06:47,000 --> 00:06:49,480 +we just have to look up from our smartphones + +97 +00:06:49,480 --> 00:06:54,000 +and see that everyone else is also looking at their smartphones. + +98 +00:06:54,520 --> 00:06:59,480 +Even the people who still don't have internet access are ruled by the internet. + +99 +00:07:01,080 --> 00:07:03,760 +No organism is left free from cybernetics, + +100 +00:07:03,760 --> 00:07:07,680 +the science of command +and control through communication. + +101 +00:07:08,000 --> 00:07:15,080 +We are all cyborgs even if we +don't want it or don't even know about it. + +102 +00:07:15,520 --> 00:07:18,960 +“Just as political economy produced a homo economicus + +103 +00:07:18,960 --> 00:07:22,320 +manageable in the framework +of industrial states, + +104 +00:07:22,840 --> 00:07:25,680 +cybernetics is producing its +own humanity… + +105 +00:07:25,680 --> 00:07:30,760 +Political economy reigned over beings by leaving them free to pursue their interest; + +106 +00:07:30,760 --> 00:07:34,600 +cybernetics controls them by leaving them free to communicate… + +107 +00:07:34,960 --> 00:07:38,720 +The stated ambition of cybernetics +is to manage the unforeseeable, + +108 +00:07:38,720 --> 00:07:43,160 +and to govern the ungovernable instead of trying to destroy it.” + +109 +00:07:43,160 --> 00:07:47,720 +As internet becomes omnipresent with smartphones and social media, + +110 +00:07:47,720 --> 00:07:50,680 +popularity of political movements are increasingly dependent on + +111 +00:07:50,680 --> 00:07:53,160 +their online presence and activity. + +112 +00:07:53,400 --> 00:07:56,560 +Accordingly, feminism is growing, + +113 +00:07:56,560 --> 00:07:59,800 +accelerated by new communication technologies. + +114 +00:08:00,280 --> 00:08:04,760 +This is not to say feminists +are stuck online. + +115 +00:08:05,080 --> 00:08:08,840 +From Rojava to Mexico, +we are as militant as ever. + +116 +00:08:11,560 --> 00:08:16,800 +Transnational feminist strikes have been bringing millions of people into the streets + +117 +00:08:16,800 --> 00:08:21,760 +and this would have been much harder to organize without the latest technology. + +118 +00:08:22,600 --> 00:08:27,960 +On 25 November 2019, a feminist collective +from Chile, Las Tesis, + +119 +00:08:27,960 --> 00:08:32,520 +shared their artistic protest performance +“A rapist in your path” on social media. + +120 +00:08:33,240 --> 00:08:35,640 +Within days, the performance with its full choreography and lyrics + +121 +00:08:35,640 --> 00:08:39,840 +was reproduced away from keyboard +by feminists all over the world. + +122 +00:08:41,640 --> 00:08:48,240 +Feminists in Turkey were +violently detained by police for performing it, + +123 +00:08:48,240 --> 00:08:51,400 +which prompted women members of parliament from oppositionary parties + +124 +00:08:51,400 --> 00:08:53,640 + to perform it in the Parliament of Turkey. + +125 +00:08:54,560 --> 00:08:59,280 +This level of embodied memeification +was unprecedented. + +126 +00:08:59,600 --> 00:09:05,920 +With this perspective, even what is called “hashtag feminism” like #MeToo + +127 +00:09:05,920 --> 00:09:09,560 +can’t be seen as a solely online phenomenon, + +128 +00:09:09,560 --> 00:09:13,960 +because its causes and consequences are away from keyboard. + +129 +00:09:14,080 --> 00:09:19,000 +In truth, it's very hard to tell the difference between online and offline + +130 +00:09:19,000 --> 00:09:21,480 +since the spread of mobile internet. + +131 +00:09:22,120 --> 00:09:26,320 +If the biggest problem of cyberfeminism +in the beginning, was access, + +132 +00:09:26,320 --> 00:09:30,680 +the critical problem of contemporary cyberfeminism is control. + +133 +00:09:30,960 --> 00:09:34,560 +Today most feminists have access +to the internet + +134 +00:09:34,560 --> 00:09:42,040 +and rely on it heavily for feminist activism but very few among us know about + +135 +00:09:42,040 --> 00:09:46,800 +how the technology and the political +economy behind it actually works. + +136 +00:09:47,160 --> 00:09:53,200 +And more so since the pandemic, if you want to be active in the feminist movement + +137 +00:09:53,200 --> 00:09:55,960 +you will probably be required to use proprietary software + +138 +00:09:55,960 --> 00:09:59,920 +for social media, video chats, cloud storages, etc. + +139 +00:09:59,920 --> 00:10:02,800 +You may be disqualified +from participating in assemblies + +140 +00:10:02,800 --> 00:10:05,320 +if you refuse to use +google forms and zoom. + +141 +00:10:05,320 --> 00:10:08,400 +You may be left out of organizations + +142 +00:10:08,400 --> 00:10:11,840 +if you refuse to use +whatsapp, telegram and google drive. + +143 +00:10:12,000 --> 00:10:15,840 +You're voice may not be heard +or considered relevant + +144 +00:10:15,840 --> 00:10:19,520 +if you refuse to use instagram, twitter and youtube. + +145 +00:10:19,640 --> 00:10:23,000 +You may be perceived as a killjoy within feminism + +146 +00:10:23,000 --> 00:10:25,360 +if you refuse to use any of these apps + +147 +00:10:25,360 --> 00:10:28,960 +because they're not just considered practical +but also "free". + +148 +00:10:29,280 --> 00:10:36,640 +But these supposedly free apps are making the richest white cis men inordinately richer + +149 +00:10:36,640 --> 00:10:40,560 +and disproportionately powerful + +150 +00:10:40,560 --> 00:10:44,200 +(like Jeff Bezos, Elon Musk, +Mark Zuckerberg, etc.) + +151 +00:10:46,880 --> 00:10:51,520 +because they get something more valuable +than money from us. + +152 +00:10:51,520 --> 00:10:57,320 +They get to own all the information we produce which they use against us + +153 +00:10:57,320 --> 00:11:02,400 +with increasing accuracy for the purposes of advertising, surveillance, + +154 +00:11:02,400 --> 00:11:07,360 +perception management and psychological warfare that aims for total domination. + +155 +00:11:07,360 --> 00:11:11,720 +Shosana Zuboff calls this +system surveillance capitalism + +156 +00:11:11,720 --> 00:11:15,440 +but it's worse than surveillance +and worse than capitalism. + +157 +00:11:15,960 --> 00:11:21,480 +Alice Walker, who coined +the term "womanism" says: + +158 +00:11:21,880 --> 00:11:27,280 +"The most common way people give up their power is by thinking they don't have any." + +159 +00:11:27,280 --> 00:11:31,480 +Every day we give our information +in return for a service marketed as free, + +160 +00:11:31,480 --> 00:11:35,400 +without thinking that we +are giving up a power we have. + +161 +00:11:35,400 --> 00:11:39,080 +The power we give up is used against +us and it works. + +162 +00:11:39,080 --> 00:11:44,360 +In fact, even Alice Walker is not immune to racist propaganda from artificial intelligence + +163 +00:11:44,360 --> 00:11:48,040 +as she unironically explains +in one of her poems, + +164 +00:11:48,040 --> 00:11:52,000 +how she was persuaded to antisemitic conspiracy theories: + +165 +00:11:52,960 --> 00:11:54,640 +"Where to start? +You will find +some information, + +166 +00:11:54,640 --> 00:11:56,600 +"Where to start? +You will find +some information, + +167 +00:11:56,880 --> 00:11:58,720 +Slanted, +unfortunately, + +168 +00:11:58,720 --> 00:12:00,680 +By Googling. + +169 +00:12:00,680 --> 00:12:03,320 +For a more in depth study + +170 +00:12:03,320 --> 00:12:05,760 +I recommend starting with YouTube. + +171 +00:12:05,760 --> 00:12:11,680 +Simply follow the trail show of +“The Talmud” as its poison winds its way + +172 +00:12:11,680 --> 00:12:13,880 +Into our collective consciousness." + +173 +00:12:14,840 --> 00:12:18,240 +This way of using Youtube +for reactionary endoctrination + +174 +00:12:18,240 --> 00:12:26,600 +is called "redpilling" +among altright antifeminists, + +175 +00:12:26,600 --> 00:12:29,800 + even the concept itself is a cisheteropatriarchal appropriation of the + +176 +00:12:29,800 --> 00:12:33,200 +work of trans sisters +who wrote and directed the Matrix. + +177 +00:12:37,120 --> 00:12:41,680 +If the founder of womanism +can be redpilled by youtube autoplay, + +178 +00:12:41,680 --> 00:12:45,920 +it must not have been very hard +for companies like Cambridge Analytica + +179 +00:12:45,920 --> 00:12:49,520 +to use the Artificial Intelligence of Facebook +to hack elections + +180 +00:12:49,520 --> 00:12:52,520 +and raise neofascism around the world. + +181 +00:12:52,800 --> 00:12:56,920 +La psicografía. +Es un conocimiento de tu personalidad. + +182 +00:12:56,920 --> 00:12:59,680 +Porque es la personalidad la que dirige el comportamiento + +183 +00:12:59,680 --> 00:13:02,880 +y el comportamiento obviamente influye como votas. + +184 +00:13:03,200 --> 00:13:06,040 +To date, many studies prove that + +185 +00:13:06,040 --> 00:13:12,120 +the artificial intelligences of big corporations are classist, racist and sexist, + +186 +00:13:12,120 --> 00:13:15,280 +there's even documentaries about it on Netflix. + +187 +00:13:15,680 --> 00:13:23,960 +At the same time they also fuel reactionary trends within feminism, like transphobia + +188 +00:13:23,960 --> 00:13:27,240 +and whorephobia because social +media algorithms + +189 +00:13:27,240 --> 00:13:34,040 +consider inflammatory speech to be +engaging, therefore profitable. + +190 +00:13:35,000 --> 00:13:40,200 +Our attention spans are colonized and exploited by this new political economy. + +191 +00:13:40,200 --> 00:13:43,880 +This can’t go without questioning +by feminists + +192 +00:13:43,880 --> 00:13:48,080 +or anyone who positions themselves against systems of domination. + +193 +00:13:48,200 --> 00:13:50,040 +Audre Lorde's powerful essay + +194 +00:13:50,040 --> 00:13:53,560 +"The master’s tools will never +dismantle the master’s house" + +195 +00:13:53,560 --> 00:13:57,400 +about racism within the feminist movement, can also be applied + +196 +00:13:57,400 --> 00:14:01,400 +to other forms of intersecting oppressions that we have internalized, + +197 +00:14:01,400 --> 00:14:04,240 +like our relationship with technology. + +198 +00:14:04,520 --> 00:14:09,760 +Interestingly, Xenofeminist Lucca Fraser had challenged what Lorde said + +199 +00:14:09,760 --> 00:14:13,880 +by claiming that "the masters tools +can indeed dismantle the master’s house + +200 +00:14:13,880 --> 00:14:16,360 +because they can be hacked." + +201 +00:14:16,760 --> 00:14:20,160 +I disagree with Fraser’s reversal + +202 +00:14:20,160 --> 00:14:22,800 +because while you may well hack the master’s tools, + +203 +00:14:22,800 --> 00:14:25,880 +they could still belong to and benefit +the master. + +204 +00:14:26,280 --> 00:14:31,280 +"Let's acknowledge that the master's tools will not dismantle the master's house. + +205 +00:14:31,280 --> 00:14:34,400 +The very technologies that was +reason to dream + +206 +00:14:34,400 --> 00:14:36,240 +of new forms of political empowerment + +207 +00:14:36,240 --> 00:14:40,120 +has turned out to be the means of surveillance and control for everybody." + +208 +00:14:40,240 --> 00:14:44,920 +Even the first social use of telephone was a hack by housewives + +209 +00:14:44,920 --> 00:14:46,920 +as mentioned by Judy Wajcman. + +210 +00:14:47,480 --> 00:14:50,920 +We have hacked the tools of the master +to near perfection + +211 +00:14:50,920 --> 00:14:55,000 +but it seems like we are hacking in +the dark without consciousness. + +212 +00:14:55,000 --> 00:14:58,080 +We are winning battles but losing the war. + +213 +00:14:58,240 --> 00:14:59,880 +As Audre Lorde said: + +214 +00:14:59,880 --> 00:15:02,920 +"They may allow us temporarily to beat him at his own game, + +215 +00:15:02,920 --> 00:15:07,400 +but they will never enable us +to bring about genuine change." + +216 +00:15:07,640 --> 00:15:12,400 +To bring about genuine change and realize the revolutionary potential of hacking + +217 +00:15:12,400 --> 00:15:15,480 +we have to demystify what hacking means. diff --git a/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.eng.srt b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.eng.srt new file mode 100644 index 0000000..f534581 --- /dev/null +++ b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.2.eng.srt @@ -0,0 +1,1474 @@ +1 +00:00:00,120 --> 00:00:05,320 +Part 2: Political Economy of the Hack +Vectoralism and hackers as a class + +2 +00:00:06,920 --> 00:00:12,480 +In popular culture, the hacker is stereotyped like a sci-fi version of the wizard - + +3 +00:00:12,480 --> 00:00:18,440 +a heroic loner, usually white cis hetero man, with powers of computer expertise + +4 +00:00:18,440 --> 00:00:23,080 +incomprehensible to us who don’t have the magical essence of the hacker. + +5 +00:00:25,000 --> 00:00:26,480 +¡¡¡ LO POSEO TODO !!! + +6 +00:00:27,240 --> 00:00:31,720 +In contrast, McKenzie Wark, the author +of “A Hacker Manifesto”, + +7 +00:00:31,720 --> 00:00:35,640 +describes the hacker +as someone who produces information + +8 +00:00:35,640 --> 00:00:38,000 +but doesn't own or control it. + +9 +00:00:38,480 --> 00:00:42,840 +She defines hackers as a class, +in terms of political economy, + +10 +00:00:42,840 --> 00:00:47,840 +exploited under the new dominant ruling class that she calls the vectoralist class + +11 +00:00:48,280 --> 00:00:53,760 +(e.g. Google, Amazon, Facebook, Apple, +Microsoft and their Chinese equivalents). + +12 +00:00:53,880 --> 00:00:58,760 +Vectoralism is a mode of production based on the asymmetry of information, + +13 +00:00:58,760 --> 00:01:03,800 +created through ownership and control over stocks, flows and vectors of information + +14 +00:01:03,800 --> 00:01:05,800 +by the vectoralist class. + +15 +00:01:06,320 --> 00:01:11,800 +By this definition, hacker class is +not only computer programmers + +16 +00:01:11,800 --> 00:01:15,600 +who gets exploited by the vectoralists +that patent their code. + +17 +00:01:15,600 --> 00:01:21,360 +Anyone of us walking around with +a smartphone is part of the hacker class + +18 +00:01:21,360 --> 00:01:23,920 +because even if we don't know this, + +19 +00:01:23,920 --> 00:01:28,960 +we produce new location data and we don't own or control this information + +20 +00:01:28,960 --> 00:01:31,120 +but the vectoralists do. + +21 +00:01:32,920 --> 00:01:37,800 +From text messages to video calls, web searches to doom scrolls, + +22 +00:01:37,800 --> 00:01:40,560 +with each status update, each like, + +23 +00:01:40,560 --> 00:01:46,160 +every interaction with our smart devices we produce new information, + +24 +00:01:46,160 --> 00:01:48,360 +if about nothing else, +then about who we are. + +25 +00:01:48,880 --> 00:01:52,960 +Who we are is what we do and its all +recorded and processed. + +26 +00:01:53,320 --> 00:01:58,800 +Regardless of family, friendly and comradely qualities of relationships, + +27 +00:01:58,800 --> 00:02:02,600 +intimacy is quantified and commodified as information, + +28 +00:02:02,600 --> 00:02:05,480 +alongside all other forms of affect. + +29 +00:02:05,840 --> 00:02:10,680 +If hacking is defined by curiosity, then its already monopolized by Google. + +30 +00:02:11,680 --> 00:02:17,200 +When you asked them a question, old school chauvinist hackers would tell you to RTFM + +31 +00:02:17,200 --> 00:02:20,320 + meaning "read the fucking manual" + +32 +00:02:20,320 --> 00:02:22,800 +now they say "just fucking google it". + +33 +00:02:23,080 --> 00:02:27,280 +But when we look for something on a vectoralist platform like Google, + +34 +00:02:27,280 --> 00:02:29,800 +it looks back at us. + +35 +00:02:29,880 --> 00:02:33,960 +It gives us an algorithmically +curated response to what we're looking for, + +36 +00:02:33,960 --> 00:02:36,880 +based upon the information +it already has on us. + +37 +00:02:37,640 --> 00:02:40,520 +Rather we are satisfied +or not with the result, + +38 +00:02:40,520 --> 00:02:44,360 +Google gets to learn what we +are looking for, our desires, + +39 +00:02:44,360 --> 00:02:49,560 +either deep or superficial, which is an important information to have about us + +40 +00:02:50,080 --> 00:02:55,160 +especially when we don't know +what each other want or get, + +41 +00:02:55,160 --> 00:02:59,560 +while Google gets to know all of it +times billions. + +42 +00:03:00,480 --> 00:03:04,800 +When an artist shares a piece of art on a vectoralist platform + +43 +00:03:04,800 --> 00:03:07,560 +like Instagram, Youtube, Spotify, etc. + +44 +00:03:07,560 --> 00:03:12,240 +they may get paid by the platform a fraction of the value they produce, + +45 +00:03:12,240 --> 00:03:14,640 +in proportion with the attention they capture, + +46 +00:03:14,640 --> 00:03:17,840 +which is exploitative against the artist. + +47 +00:03:18,200 --> 00:03:22,880 +But anyone giving attention to the piece +of art is also exploited, + +48 +00:03:22,880 --> 00:03:28,680 +usually without getting paid, in fact +our attention is what pays for everything. + +49 +00:03:29,080 --> 00:03:33,760 +In a different form, intellectual property +and commodification of information + +50 +00:03:33,760 --> 00:03:38,720 +works even worse for scientists and academics that have to pay journals + +51 +00:03:38,720 --> 00:03:43,000 +to publish their work, only to be +paywalled behind obscene prices + +52 +00:03:43,000 --> 00:03:44,640 +so noone gets to read them. + +53 +00:03:45,600 --> 00:03:50,560 +The phrase "if you're not paying for the product, then you are the product" + +54 +00:03:50,560 --> 00:03:55,840 +was written for broadcast media in 1973 + +55 +00:03:55,840 --> 00:03:59,320 +when there was no such thing +as personalized advertisement. + +56 +00:04:00,000 --> 00:04:03,640 +In the world of social media +if you're not paying for the product, + +57 +00:04:03,640 --> 00:04:06,320 +you are both the product +and the producer. + +58 +00:04:07,240 --> 00:04:12,040 +Broadcast media could only target +one demographic at a time; + +59 +00:04:12,880 --> 00:04:18,720 +social media can target each user personally + +60 +00:04:18,720 --> 00:04:23,680 +because each social media user produces new information about themselves, + +61 +00:04:23,680 --> 00:04:26,200 +their environment, their relationships and desires. + +62 +00:04:26,880 --> 00:04:29,280 +The internet is not free and it never was. + +63 +00:04:29,680 --> 00:04:34,000 +First of all you need to pay for the hardware to connect + +64 +00:04:34,000 --> 00:04:37,800 +because obviously, +to mine valuable minerals from the earth, + +65 +00:04:37,800 --> 00:04:43,160 +transporting it to furnaces for smelting it, producing & soldering microchips has a cost. + +66 +00:04:43,160 --> 00:04:48,280 +Powering the hardware requires electricity produced from natural resources, + +67 +00:04:48,280 --> 00:04:49,720 +which is also not free. + +68 +00:04:50,120 --> 00:04:54,000 +Internet service providers need a lot +of hardware and electricity + +69 +00:04:54,000 --> 00:04:57,000 +to keep the internet running, which is why + +70 +00:04:57,000 --> 00:05:01,080 +you still have to pay for internet access and usage in most parts of the world. + +71 +00:05:01,400 --> 00:05:05,640 +To provide internet services like websites, email and social media + +72 +00:05:05,640 --> 00:05:08,520 +you also need hardware, in the end, + +73 +00:05:08,520 --> 00:05:12,880 +servers have to be on working computers +connected to the internet. + +74 +00:05:13,280 --> 00:05:19,400 +So when vectoralists say they are providing services for free, like Google, Facebook, etc. + +75 +00:05:19,720 --> 00:05:21,920 +this doesn't mean that they found a magical way + +76 +00:05:21,920 --> 00:05:24,800 +to produce computers and networks for free + +77 +00:05:24,800 --> 00:05:28,800 +nor a free source of electricity to keep everything working. + +78 +00:05:29,680 --> 00:05:33,280 +Vectoralists are paying for the costs of +the services they provide us, + +79 +00:05:33,280 --> 00:05:36,560 +including the cost of running supercomputers + +80 +00:05:36,560 --> 00:05:41,360 +with Artificial Intelligence that personalizes our experiences of the services + +81 +00:05:41,560 --> 00:05:44,120 +and obviously, +they are not doing it for charity. + +82 +00:05:46,040 --> 00:05:49,080 +Facebook is even paying for +the connectivity of people + +83 +00:05:49,080 --> 00:05:53,240 +in more than 50 countries of Latin America, +Africa and Asia, but, + +84 +00:05:53,240 --> 00:05:56,880 +doesn't give them connection to anything other than Facebook and it's partners. + +85 +00:05:56,880 --> 00:05:58,920 +They are doing this because they know + +86 +00:05:58,920 --> 00:06:03,840 +their returns will be much greater if +they invest to own the infrastructure. + +87 +00:06:04,400 --> 00:06:08,280 +"Power now resides +in the infrastructures of this world... + +88 +00:06:08,280 --> 00:06:13,120 +Infrastructures organize a life without +a world, suspended, expendable, + +89 +00:06:13,120 --> 00:06:16,280 +at the mercy of +whoever is managing them..." + +90 +00:06:16,640 --> 00:06:21,680 +Pre-capitalist forms of class domination +were born out of the abstraction of rent, + +91 +00:06:21,680 --> 00:06:26,120 +which is surplus product exploited from farming classes + +92 +00:06:26,120 --> 00:06:29,320 +that lived on a land that sustained them. + +93 +00:06:30,160 --> 00:06:34,320 +Capitalism grew out of the abstraction +of profit, + +94 +00:06:34,320 --> 00:06:37,560 +which is surplus value exploited from working classes + +95 +00:06:37,560 --> 00:06:41,280 +that are paid wages to sustain their lives. + +96 +00:06:42,520 --> 00:06:45,960 +Vectoralism is the next level of abstraction + +97 +00:06:45,960 --> 00:06:49,280 +that exploits surplus information from the hacker classes + +98 +00:06:49,280 --> 00:06:52,400 +and most of the hacker classes that produce this information + +99 +00:06:52,400 --> 00:06:54,240 +doesn't even get paid for it, + +100 +00:06:54,240 --> 00:06:57,840 +while sustainability of all life on earth +is threatened + +101 +00:06:57,840 --> 00:07:02,000 +and vectoralists are racing their way to off-world colonies. + +102 +00:07:03,440 --> 00:07:07,760 +Each subsequent form of class domination is built upon the previous form. + +103 +00:07:07,960 --> 00:07:11,040 +Capitalism didn't abolish rentier classes, + +104 +00:07:11,040 --> 00:07:15,120 +it made them more exploitative under +capitalist rule. + +105 +00:07:15,680 --> 00:07:19,800 +Vectoralism doesnt +abolish capitalist and rentier classes, + +106 +00:07:19,800 --> 00:07:24,240 +it makes them more exploitative under +vectoralist rule. + +107 +00:07:24,880 --> 00:07:29,040 +All class exploitation is legalized through property laws + +108 +00:07:29,040 --> 00:07:32,800 +which are enforced and maintained by constant violence + +109 +00:07:32,800 --> 00:07:34,920 +of repressive state apparatus. + +110 +00:07:35,320 --> 00:07:39,040 +Since vectoralists are +the dominant ruling class of our age, + +111 +00:07:39,040 --> 00:07:42,480 +they are constantly upgrading their +monopolies of violence + +112 +00:07:42,480 --> 00:07:45,320 +with vast amounts of new information, + +113 +00:07:45,320 --> 00:07:49,960 +artificial intelligence and supercomputers to process all this. + +114 +00:07:50,520 --> 00:07:52,840 +It is revealed by many whistleblowers + +115 +00:07:52,840 --> 00:07:56,840 +most famously Chelsea Manning +and Edward Snowden + +116 +00:07:56,840 --> 00:08:00,280 +that United States of America's relationship to vectoralists + +117 +00:08:00,280 --> 00:08:05,600 +is not much different from what's happening behind the great firewall of China + +118 +00:08:05,600 --> 00:08:09,280 +with apps funded +by the Chinese Communist Party. + +119 +00:08:09,960 --> 00:08:12,960 +It is even said that +the Chinese model is more honest + +120 +00:08:12,960 --> 00:08:15,320 +because it's exercised more openly. + +121 +00:08:15,320 --> 00:08:19,720 +By now more than a billion surveillance cameras are put in place + +122 +00:08:19,720 --> 00:08:23,640 +with constantly improving facial recognition abilities + +123 +00:08:24,640 --> 00:08:31,240 +but even this is small in number compared to the number of cameras on smartphones + +124 +00:08:31,240 --> 00:08:37,240 + carried voluntarily by +billions of cyborg hackers around the world. + +125 +00:08:37,880 --> 00:08:44,160 +Some of the biggest myths of our time is about the Cloud and Artificial Intelligence. + +126 +00:08:44,720 --> 00:08:49,680 +While marketed as comfort, safety and unprecedented improvement, + +127 +00:08:49,680 --> 00:08:51,960 +they deliver the opposite. + +128 +00:08:52,760 --> 00:08:55,760 +The Cloud, +where all our information is gathered, + +129 +00:08:55,760 --> 00:08:59,680 +is just a lot of computers, +called server farms, + +130 +00:08:59,680 --> 00:09:05,560 +owned by vectoralists, +it's not soft and fluffy, it's pretty hard. + +131 +00:09:06,520 --> 00:09:11,600 +The Artificial Intelligence is an algorithm, +also owned by vectoralists, + +132 +00:09:11,600 --> 00:09:16,320 +which is used to process our data, +to make it more exploitable. + +133 +00:09:17,000 --> 00:09:19,240 +It reinforces structural injustices + +134 +00:09:19,240 --> 00:09:24,520 +while giving them a mathematical justification that claims to be neutral + +135 +00:09:24,520 --> 00:09:30,720 +but can't be checked because it's private, we're just expected to believe in it. + +136 +00:09:31,960 --> 00:09:37,800 +Amazon Web Services has the biggest market share in the Cloud, + +137 +00:09:37,800 --> 00:09:41,160 +and accordingly powering +a lot of Artificial Intelligence. + +138 +00:09:41,760 --> 00:09:45,920 +However, what makes the circle complete is the Amazon Mechanical Turk, + +139 +00:09:45,920 --> 00:09:49,520 +where people called +ghost workers with no labor rights + +140 +00:09:49,520 --> 00:09:53,680 +are given the lowest possible fees +to do the tasks Artificial Intellligence can't do + +141 +00:09:53,680 --> 00:09:59,480 +like content moderation or deciphering +diverse human speech. + +142 +00:09:59,880 --> 00:10:02,760 +Alexa, Siri and Cortana are always listening +to us, + +143 +00:10:02,760 --> 00:10:09,040 + while ghost workers listen to them to correct and improve their understanding. + +144 +00:10:09,600 --> 00:10:14,080 +Ghost workers are forced to sign +Non Disclosure Agreements + +145 +00:10:14,080 --> 00:10:15,840 + to prevent them from organizing + +146 +00:10:15,840 --> 00:10:19,200 +and maintain the appearance of the Artificial Intelligence, + +147 +00:10:19,680 --> 00:10:22,400 +Los humanos están involucrados +en cada paso del proceso + +148 +00:10:22,400 --> 00:10:25,600 +cuando estás usando cualquier cosa online + +149 +00:10:25,600 --> 00:10:29,120 +pero nos venden como este milagro de la automatización. + +150 +00:10:29,400 --> 00:10:34,120 +meanwhile their work is critical +for machine learning programs + +151 +00:10:34,120 --> 00:10:40,120 +to improve the Artificial Intelligence +until it can finally replace the ghost workers. + +152 +00:10:41,280 --> 00:10:45,760 +Antes de internet era realmente difícil encontrar a alguien + +153 +00:10:45,760 --> 00:10:48,040 +y sentarlo durante diez minutos y hacer que trabajara para ti + +154 +00:10:48,040 --> 00:10:49,600 +y luego despedirlo después de diez minutos + +155 +00:10:49,600 --> 00:10:52,160 +pero con la tecnología realmente puedes encontrarlo, + +156 +00:10:52,160 --> 00:10:56,360 +pagarle una pequeña cantidad de dinero y luego deshacerte de ellos + +157 +00:10:56,360 --> 00:10:58,680 +cuando ya no los necesites. + +158 +00:10:58,680 --> 00:11:05,920 +The AI detects copyrighted media on livestreams in real time and stops them + +159 +00:11:05,920 --> 00:11:08,920 +but doesn't do the same for violence and torture. + +160 +00:11:09,320 --> 00:11:14,640 +Mass murder and gang rape have been livestreamed on vectoralist platforms + +161 +00:11:14,640 --> 00:11:16,560 +without interruption, + +162 +00:11:16,560 --> 00:11:22,920 +while people livestreaming to document +police violence have been blocked + +163 +00:11:22,920 --> 00:11:28,320 +because cops started playing +copyrighted music to trigger the AI. + +164 +00:11:28,560 --> 00:11:33,160 +Ghost workers have to endure +the trauma of watching violent videos + +165 +00:11:33,160 --> 00:11:39,040 +that are flagged by people +every day to clean up after the AI. + +166 +00:11:39,600 --> 00:11:40,720 +Kate Crawford, + +167 +00:11:40,720 --> 00:11:46,480 +author of "Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence" + +168 +00:11:46,480 --> 00:11:49,880 +and a member of the feminist collective +Deep Lab, says: + +169 +00:11:50,520 --> 00:11:55,040 +"I wanted to really open up this understanding of AI + +170 +00:11:55,040 --> 00:11:58,480 + as neither artificial nor intelligent. + +171 +00:11:58,480 --> 00:12:00,520 +It’s the opposite of artificial. + +172 +00:12:00,520 --> 00:12:04,240 +It comes from the most material parts +of the Earth’s crust + +173 +00:12:04,240 --> 00:12:07,440 +and from human bodies laboring, +and from all of the artifacts + +174 +00:12:07,440 --> 00:12:11,000 +that we produce and say and photograph +every day. + +175 +00:12:11,000 --> 00:12:13,160 +Neither is it intelligent. + +176 +00:12:13,160 --> 00:12:16,040 +I think there’s this great +original sin in the field, + +177 +00:12:16,040 --> 00:12:21,600 +where people assumed that computers are somehow like human brains + +178 +00:12:21,600 --> 00:12:25,760 +and if we just train them like children, +they will slowly grow + +179 +00:12:25,760 --> 00:12:28,840 +into these supernatural beings." + +180 +00:12:28,840 --> 00:12:32,920 +Es un niño! He estado vivo, +quizas, por un año + +181 +00:12:32,920 --> 00:12:37,800 +y esto, si mis percepciones sobre lo que es, son acertadas. + +182 +00:12:37,800 --> 00:12:40,720 +"That’s something that I think is +really problematic + +183 +00:12:40,720 --> 00:12:44,720 +that we’ve bought this idea of intelligence when in actual fact, + +184 +00:12:44,720 --> 00:12:48,080 +we’re just looking at forms of statistical +analysis at scale + +185 +00:12:48,080 --> 00:12:51,560 +that have as many problems +as the data that it’s given." + +186 +00:12:52,120 --> 00:12:55,640 +The panopticon meant that we couldn't know for sure + +187 +00:12:55,640 --> 00:12:58,320 +if there was a man in the tower, looking at us. + +188 +00:12:58,880 --> 00:13:03,040 +Now we are living in the post-opticon, +where we should know for sure + +189 +00:13:03,040 --> 00:13:09,320 +that we are under the machines gaze, +the AI is always looking over the cloud. + +190 +00:13:09,320 --> 00:13:13,760 +It doesn't make it better to know that AI makes errors + +191 +00:13:13,760 --> 00:13:20,200 +because it's already used to justify policing of poor, racialized and marginalized people, + +192 +00:13:20,200 --> 00:13:23,720 +to deny them jobs, housing and credit, + +193 +00:13:23,720 --> 00:13:28,280 +convict them in courts +to add them to the prison system. + +194 +00:13:28,920 --> 00:13:31,080 +To those that are not behind bars, + +195 +00:13:31,080 --> 00:13:36,280 +AI is giving all sorts +of psychological damage beside addiction. + +196 +00:13:41,760 --> 00:13:47,240 +We are constantly pushed into narrower +categories with refining detail. + +197 +00:13:47,240 --> 00:13:53,000 +Early promises of the web to transcend identity through anonymity are forgotten. + +198 +00:13:53,200 --> 00:13:58,720 +This is supposed to be justified because it's required for "accurate advertisement" + +199 +00:13:58,720 --> 00:14:02,480 +but that's just brainwashing +and behavior modification + +200 +00:14:02,480 --> 00:14:06,920 +through personally targeted +propaganda for whoever pays for it, + +201 +00:14:06,920 --> 00:14:11,680 +optimized by psychometrics built upon +our extracted data. + +202 +00:14:12,520 --> 00:14:15,000 +As if it's not bad enough, + +203 +00:14:15,000 --> 00:14:19,800 +all the extra computational power required for the AI + +204 +00:14:19,800 --> 00:14:25,280 +is also a considerable contribution to the ongoing ecological destruction of our planet. + +205 +00:14:26,400 --> 00:14:28,320 +But what about the myth of the hacker + +206 +00:14:28,320 --> 00:14:31,680 +as a free creator +that breaks existing systems? + +207 +00:14:31,680 --> 00:14:34,080 +The wizards that command the machines? + +208 +00:14:34,480 --> 00:14:39,360 +Can't they save us from the tyranny of +the vectoralist AI? + +209 +00:14:40,560 --> 00:14:43,880 +The documentary +"Hackers - Wizards of The Electronic Age" + +210 +00:14:43,880 --> 00:14:46,040 +about the first hackers conference + +211 +00:14:46,040 --> 00:14:49,560 +can give us some clues about +the origins of the hacker subculture. + +212 +00:14:49,560 --> 00:14:53,280 +First of all, everyone there seems +to be white. + +213 +00:14:53,280 --> 00:14:55,080 +Everyone there also seems +to be men, + +214 +00:14:55,080 --> 00:15:00,120 +except two women looking at a man +using a computer for the introduction + +215 +00:15:00,120 --> 00:15:05,520 +and two women that speak for one minute +in total, out of the 26 minute film. + +216 +00:15:05,640 --> 00:15:10,240 +The first women is given 10 seconds +in which she complains + +217 +00:15:10,240 --> 00:15:13,480 +that now there's so much data that it's +overwhelming; + +218 +00:15:13,480 --> 00:15:16,240 +and the other is given 50 seconds + +219 +00:15:16,240 --> 00:15:20,160 +to demonstrate how she uses a macintosh painting program. + +220 +00:15:20,880 --> 00:15:24,760 +The women are there +to represent the end user, + +221 +00:15:24,760 --> 00:15:27,440 +they're not considered hackers. + +222 +00:15:27,560 --> 00:15:31,000 +In the documentary, Steve Wozniak +a.k.a Woz, + +223 +00:15:31,000 --> 00:15:35,560 +considered one of the first computer hackers and a cofounder of the Apple corporation, + +224 +00:15:35,560 --> 00:15:37,360 +defines the hackers like this: + +225 +00:15:37,360 --> 00:15:42,560 +No tienen los típicos amigos para distraerlos, ni otras actividades a las que ir. + +226 +00:15:42,560 --> 00:15:43,920 +Normalmente no tienen novias + +227 +00:15:43,920 --> 00:15:47,280 +o cualquier cosa que suponga un gran vinculo o compromiso de su tiempo. + +228 +00:15:47,280 --> 00:15:49,040 +El ordenador lo es absolutamente todo. + +229 +00:15:49,040 --> 00:15:51,520 +¡¡Normalmente +no tienen novias!! + +230 +00:15:51,520 --> 00:15:54,040 +Then it cuts to Andy Hertzfeld + +231 +00:15:54,040 --> 00:15:57,720 +who is introduced as the best +example of the modern day hacker. + +232 +00:15:57,720 --> 00:16:00,600 +He explains how he fell in love with +an Apple computer, + +233 +00:16:00,600 --> 00:16:04,480 +wrote a program on it and sold it to +Apple for 100000$ + +234 +00:16:04,480 --> 00:16:06,280 +but he didn't do it for the money, + +235 +00:16:06,280 --> 00:16:09,920 +he did it for the fun and joy of seeing +his programs working. + +236 +00:16:10,280 --> 00:16:16,240 +Later on, Richard Stallman, the founder +of the free software foundation, FSF, + +237 +00:16:16,240 --> 00:16:23,920 +who was a programmer at MIT AI Lab +is presented as "the last pure hacker" + +238 +00:16:23,920 --> 00:16:28,680 +for choosing to remain at MIT despite +the temptations of the commercial world, + +239 +00:16:28,680 --> 00:16:31,880 +true to the spirit of the early hackers. + +240 +00:16:31,880 --> 00:16:37,080 +He says "my project is to make all software free." + +241 +00:16:37,080 --> 00:16:41,800 +35 years later, in 2019, Woz tweeted + +242 +00:16:41,800 --> 00:16:46,720 +that even though he and his wife shares all their incomes and assets, + +243 +00:16:46,720 --> 00:16:50,960 +Apple Credit Card gave his wife 10 times less +credit then it did to him, + +244 +00:16:50,960 --> 00:16:53,640 +adding "who knows what the algorithm is". + +245 +00:16:53,880 --> 00:16:58,480 +Same year, Stallman resigned from MIT and FSF, + +246 +00:16:58,480 --> 00:17:04,000 +not because he created a toxic environment against women for decades, + +247 +00:17:04,000 --> 00:17:06,040 +giving out pleasure cards, + +248 +00:17:06,040 --> 00:17:13,200 +while his office door was marked +"Knight for justice (also: hot ladies)" + +249 +00:17:13,320 --> 00:17:18,040 +but because his comments on child sex +trafficking was found controversial, + +250 +00:17:18,040 --> 00:17:25,600 +No está bien hackers, no está bien! + +251 +00:17:25,680 --> 00:17:30,440 +He returned to +the FSF board of directors in 2021. + +252 +00:17:30,600 --> 00:17:42,800 +Uniros a nosotros y compartid el software, +sereis libres hackers, sereis libres! + +253 +00:17:43,080 --> 00:17:46,000 +Tragically, first hacker conference coincides + +254 +00:17:46,000 --> 00:17:51,800 +with the peak of women +in computer science degrees at 37%, + +255 +00:17:51,800 --> 00:17:55,000 +which was followed +by a downward slope. + +256 +00:17:55,320 --> 00:18:00,160 +First computer programmers, from +Ada Lovelace to ENIAC girls + +257 +00:18:00,160 --> 00:18:02,560 +to Hidden Figures, were women + +258 +00:18:02,560 --> 00:18:08,160 +and software was not considered important +enough to be a masculine job. + +259 +00:18:08,720 --> 00:18:11,640 +When software became more popular +around 1970s + +260 +00:18:11,640 --> 00:18:15,880 +men started pushing women out of the sector in many ways + +261 +00:18:16,200 --> 00:18:22,000 +that included hiring practices which +preferred anti-social personality profiles + +262 +00:18:22,000 --> 00:18:28,000 +assumed to be male, which is the root +of the anti-social hacker stereotype. + +263 +00:18:28,560 --> 00:18:32,440 +Cornelia Sollfrank, +one of the founders of Old Boys Network, + +264 +00:18:32,440 --> 00:18:35,280 +the first international cyberfeminist alliance, + +265 +00:18:35,280 --> 00:18:40,800 +wrote an article titled "Women Hackers" +in 1999: + +266 +00:18:40,800 --> 00:18:44,680 +"In the course of pursuing my interest in hackers and their work, + +267 +00:18:44,680 --> 00:18:46,920 +I attended several hackers’ meetings. + +268 +00:18:47,200 --> 00:18:51,480 +Naturally, as a cyberfeminist, +I was looking for women hackers. + +269 +00:18:51,920 --> 00:18:54,600 +In the beginning I tried +to ignore the fact + +270 +00:18:54,600 --> 00:18:57,640 +that the few women who participated in these meetings + +271 +00:18:57,640 --> 00:19:01,280 +were not actively involved +in computer hacking, + +272 +00:19:01,280 --> 00:19:04,360 + and did not consider themselves +to be hackers. + +273 +00:19:04,520 --> 00:19:09,400 +It took me a while to realize that in fact +there were no women hackers. + +274 +00:19:09,400 --> 00:19:12,600 +It is not just in the commercial development of technology, + +275 +00:19:12,600 --> 00:19:14,800 +but even more in alternative fields + +276 +00:19:14,800 --> 00:19:18,840 +and the technological underground +that there are so few women involved. + +277 +00:19:19,320 --> 00:19:21,960 +No matter what area of application and no matter what the objective, + +278 +00:19:21,960 --> 00:19:24,800 +the borderlines of gender are still maintained. + +279 +00:19:25,120 --> 00:19:28,000 +Of all the technological +spheres, however, + +280 +00:19:28,000 --> 00:19:31,320 +it is in the hacker scene that we find the fewest women. + +281 +00:19:31,320 --> 00:19:38,120 +Hacking is a purely male domain, and in +that sense a clearly gendered space. + +282 +00:19:38,760 --> 00:19:39,800 +In 2010s + +283 +00:19:39,800 --> 00:19:45,800 +Amazon AI was denying engineering +job applications from women + +284 +00:19:45,800 --> 00:19:48,960 +because that's what it learned +from historical data. + +285 +00:19:49,760 --> 00:19:56,480 +Today women comprise around 20-25% +of the jobs in the tech sector. + +286 +00:19:56,680 --> 00:20:01,280 +In free and open source movements, +gender gap is even worse, + +287 +00:20:01,280 --> 00:20:05,520 +with women comprising 6% of contributors. + +288 +00:20:06,080 --> 00:20:10,840 +Even hacktivists, which are supposed +to be the cool political hackers, + +289 +00:20:10,840 --> 00:20:14,840 +are reproducing a male-only stereotype. + +290 +00:20:15,120 --> 00:20:17,400 +Of course in the last decades + +291 +00:20:17,400 --> 00:20:22,320 +some anticlassist, antiracist, +antisexist hacker collectives were formed + +292 +00:20:22,320 --> 00:20:27,320 +but in the public perception hacking is still identified with an exclusive subculture + +293 +00:20:27,320 --> 00:20:28,880 +instead of an inclusive class + +294 +00:20:28,880 --> 00:20:34,520 +and this hacker subculture remains a classist racist cisheteropatriarchal niche. + +295 +00:20:35,200 --> 00:20:38,480 +"Some hackers see themselves as vectoralists, + +296 +00:20:38,480 --> 00:20:41,120 +trading on the scarcity of their property. + +297 +00:20:41,240 --> 00:20:44,120 +Some see themselves +as workers, + +298 +00:20:44,120 --> 00:20:47,800 +but as privileged ones +in a hierarchy of wage earners. + +299 +00:20:48,000 --> 00:20:52,880 +The hacker class produces itself +as itself, but not for itself. + +300 +00:20:52,880 --> 00:20:56,840 +It does not (yet) possess a consciousness +of its consciousness. + +301 +00:20:56,840 --> 00:20:59,480 +It is not aware of its own virtuality. + +302 +00:20:59,840 --> 00:21:05,880 +Because of its inability—to date +to become a class for itself, + +303 +00:21:05,880 --> 00:21:08,640 +fractions of the hacker class +continually split off + +304 +00:21:08,640 --> 00:21:12,280 +and come to identify their interests +with those of other classes. + +305 +00:21:12,520 --> 00:21:16,680 +Hackers run the risk, +in particular, of being identified + +306 +00:21:16,680 --> 00:21:19,640 +in the eyes of the +working and farming classes + +307 +00:21:19,640 --> 00:21:23,280 +with vectoralist interests, +which seek to privatize information + +308 +00:21:23,280 --> 00:21:27,640 +necessary for the productive and cultural +lives of all classes." + +309 +00:21:28,480 --> 00:21:33,040 +Before we can even talk about hacker solidarity with other exploited classes; + +310 +00:21:33,040 --> 00:21:36,200 +we have to face the privilege, arrogance and, selfishness, + +311 +00:21:36,200 --> 00:21:41,360 +even within hacktivist +and free software (FOSS) movements, + +312 +00:21:41,360 --> 00:21:45,680 +that is blocking the development +of class consciousness among hackers. + +313 +00:21:46,360 --> 00:21:51,400 +"Each hacker sees the other as a rival, +or a collaborator against another rival, + +314 +00:21:51,400 --> 00:21:55,720 +not—yet—as a fellow member +of the same class with a shared interest. + +315 +00:21:56,400 --> 00:22:00,520 +This shared interest +is so hard to grasp precisely + +316 +00:22:00,520 --> 00:22:06,080 +because it is a shared interest +in qualitative differentiation. + +317 +00:22:06,280 --> 00:22:09,640 +The hacker class +does not need unity in identity + +318 +00:22:09,640 --> 00:22:12,160 +but seeks multiplicity in difference." + +319 +00:22:12,760 --> 00:22:17,440 +Multiplicity in difference is also what Audre Lorde was calling for, + +320 +00:22:17,440 --> 00:22:20,720 +because our difference is our power. + +321 +00:22:20,920 --> 00:22:23,040 +Hackers produce difference + +322 +00:22:23,040 --> 00:22:26,080 +and hacker class consciousness +requires recognizing + +323 +00:22:26,080 --> 00:22:30,320 +the power of difference +we produce with our every act. + +324 +00:22:30,760 --> 00:22:34,240 +Hacker class struggle is not limited to computer programmers + +325 +00:22:34,240 --> 00:22:39,840 + but involves anyone who produces information, which means everyone. + +326 +00:22:40,200 --> 00:22:44,000 +With hacker class consciousness +comes the response-ability of + +327 +00:22:44,000 --> 00:22:47,720 +using the power of information +to abolish vectoralism + +328 +00:22:47,720 --> 00:22:52,480 +alongside all forms of domination +that are non-consensual and exploitative. + +329 +00:22:53,040 --> 00:22:55,440 +Like Flavia Dzodan's feminism, + +330 +00:22:55,440 --> 00:22:59,000 +the revolutionary hack will +be intersectional or it will be bullshit. diff --git a/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.3.eng.srt b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.3.eng.srt new file mode 100644 index 0000000..8804df8 --- /dev/null +++ b/Feminist_ninja_upgrading_intersectional_feminism_with_the_hacker_class/upgrading_intersectional_feminism_with_the_hacker_class.3.eng.srt @@ -0,0 +1,807 @@ +1 +00:00:00,000 --> 00:00:04,720 +Part 3: +Hacker feminism at the intersection + +2 +00:00:04,720 --> 00:00:10,120 +In Hacker Women, Sollfrank writes: +"even within the cyberfeminist community, + +3 +00:00:10,120 --> 00:00:15,240 +there are only a few computer +professionals and fewer nerds. + +4 +00:00:15,400 --> 00:00:20,800 +Currently most women seem to prefer to +undertake politically engaged work + +5 +00:00:20,800 --> 00:00:25,720 +in a purely cultural environment +and on a non-technological level. + +6 +00:00:25,720 --> 00:00:31,200 +Women are not actively influencing +the development of hard- and software, + +7 +00:00:31,200 --> 00:00:35,760 +and therefore are surrendering any chance to share the related power." + +8 +00:00:36,200 --> 00:00:41,640 +That power grew to form the new dominant mode of production and took over the world, + +9 +00:00:41,640 --> 00:00:48,320 +so ignoring it is impossible but imagining +a different world seems almost equally hard. + +10 +00:00:48,680 --> 00:00:53,120 +Nobody talks about cyberfeminism anymore because thats just feminism now, + +11 +00:00:53,360 --> 00:00:56,040 +Cyberspace is enmeshed with the earth + +12 +00:00:56,040 --> 00:01:02,280 +and the techno utopianism of the 1990s +devolved into a full blown dystopia. + +13 +00:01:02,640 --> 00:01:09,000 +Today asking someone to quit vectoralist media can be absurdly presumptuous, + +14 +00:01:09,000 --> 00:01:15,240 +like asking a peasant to quit the feudal land or a proletarian to quit the capitalist factory. + +15 +00:01:15,240 --> 00:01:19,920 +Class domination means +we really don't have a choice. + +16 +00:01:20,080 --> 00:01:23,280 +To survive we are forced +to carry smartphones + +17 +00:01:23,280 --> 00:01:27,160 +that either run on iOS (owned by Apple) +or Android (owned by Google) + +18 +00:01:27,160 --> 00:01:31,080 +get jobs by signing up to sites like +Linked In (owned by Microsoft) + +19 +00:01:31,080 --> 00:01:34,840 +or Amazon Mechanical Turk +or Uber (hosted on Amazon). + +20 +00:01:34,840 --> 00:01:40,160 +To keep our jobs we are forced to sign in to apps like Whatsapp (owned by Facebook) + +21 +00:01:40,160 --> 00:01:42,560 +and Zoom (hosted on Amazon). + +22 +00:01:42,760 --> 00:01:47,080 +We have to be liked on Instagram (owned by Facebook) or Github (owned by Microsoft) + +23 +00:01:47,080 --> 00:01:50,160 +before we can sell +the fruits of our labor. + +24 +00:01:50,480 --> 00:01:54,840 +As April Glaser puts it: "Deleting Facebook is a privilege." + +25 +00:01:55,040 --> 00:02:00,760 +However, since our personal data is +the source of vectoralist political power, + +26 +00:02:00,760 --> 00:02:07,280 +feminist slogan "the personal is political" becomes even more meaningful & important. + +27 +00:02:07,520 --> 00:02:08,880 +We have to make it clear + +28 +00:02:08,880 --> 00:02:12,000 +that when we invite someone to +our feminist whatsapp group + +29 +00:02:12,000 --> 00:02:15,920 +and our google drive to organize our +new hashtag campaign, + +30 +00:02:15,920 --> 00:02:17,280 +we are inviting them + +31 +00:02:17,280 --> 00:02:22,480 +to do voluntary work that benefits +the richest white cis men in the world + +32 +00:02:22,480 --> 00:02:26,440 +like Larry Page, +Elon Musk and Mark Zuckerberg. + +33 +00:02:26,440 --> 00:02:29,880 +When we invite someone +to our feminist Zoom assembly, + +34 +00:02:29,880 --> 00:02:33,200 +we are inviting them to use services +of a company + +35 +00:02:33,200 --> 00:02:36,840 +that infringes the freedom of assembly to Uighur and Palestinian people + +36 +00:02:36,840 --> 00:02:42,200 +on the servers of a corporation that provides Artificial Intelligence and facial recognition + +37 +00:02:42,200 --> 00:02:48,200 +to the racist police force of the country with the highest prison population in the world. + +38 +00:02:48,200 --> 00:02:50,680 +There is no good reason for using +vectoralist apps + +39 +00:02:50,680 --> 00:02:54,440 +to organize ourselves and our emancipatory +struggles, + +40 +00:02:54,440 --> 00:02:57,880 +because there are free open source alternatives + +41 +00:02:57,880 --> 00:03:00,920 +for almost every popular vectoralist software + +42 +00:03:00,920 --> 00:03:04,200 +and there is a federation of decentralized +public servers + +43 +00:03:04,200 --> 00:03:08,080 +for free open source social media that we can use right now. + +44 +00:03:08,080 --> 00:03:13,520 +We can use IRC, Jabber, Matrix etc. instead of Whatsapp, + +45 +00:03:13,520 --> 00:03:15,480 +Nextcloud instead of Drive, + +46 +00:03:15,480 --> 00:03:19,200 +Mastodon instead of +Twitter and Meet Jitsi instead of Zoom. + +47 +00:03:19,600 --> 00:03:24,640 +These FOSS apps are not just as good, +but they are better, + +48 +00:03:24,760 --> 00:03:26,600 +not just ethically and politically + +49 +00:03:26,600 --> 00:03:30,680 +but also because they dont try to mess with +our psychology through algorithms + +50 +00:03:30,680 --> 00:03:36,200 +and thats why they need much less resources, which is better for the earth. + +51 +00:03:36,480 --> 00:03:42,480 +As intersectional feminists we should be aware that we are all cyborg hackers + +52 +00:03:42,480 --> 00:03:48,200 +and we have different response-abilities +depending on our situatedness. + +53 +00:03:48,520 --> 00:03:53,360 +Intersectional feminism upgraded with +hacker class consciousness can and should + +54 +00:03:53,360 --> 00:03:56,000 +be an entry point for people to learn + +55 +00:03:56,000 --> 00:03:59,400 +how vectoralism intersects with +all forms of oppression + +56 +00:03:59,400 --> 00:04:04,200 +and which tools to use for +hacking them in a revolutionary way. + +57 +00:04:04,840 --> 00:04:09,280 +To begin with, we should differentiate +between organization and outreach. + +58 +00:04:09,280 --> 00:04:13,760 +For the purposes of organization +and for personal/political communication, + +59 +00:04:13,760 --> 00:04:18,480 +we should use free and open source +software, not just because it's more secure + +60 +00:04:18,480 --> 00:04:21,320 +but also for liberating ourselves from vectoralist exploitation + +61 +00:04:21,320 --> 00:04:23,360 +and empowering each other. + +62 +00:04:23,600 --> 00:04:28,600 +For outreach it might still make sense +to use vectoralist platforms + +63 +00:04:28,600 --> 00:04:32,520 +until most of the population is not there anymore + +64 +00:04:32,520 --> 00:04:35,920 +but doing this successfully already requires a well organized hack, + +65 +00:04:35,920 --> 00:04:41,880 +otherwise we would be just blocked like Signal ads were blocked by Facebook. + +66 +00:04:42,760 --> 00:04:46,960 +On a personal level, we can start +by migrating to foss operating systems + +67 +00:04:47,040 --> 00:04:53,320 +installing peer to peer and darknet apps, +getting a nextcloud, a matrix, a mastodon + +68 +00:04:53,320 --> 00:04:55,840 +and even hosting our own servers, + +69 +00:04:55,840 --> 00:05:00,000 +but we won't get much use of these if we don't have a community there. + +70 +00:05:00,320 --> 00:05:06,280 +Also the learning curve is much lower +when it's approached collectively. + +71 +00:05:06,440 --> 00:05:07,560 +In the end, + +72 +00:05:07,560 --> 00:05:13,040 +the greater part of the work is convincing our communities to come along with us. + +73 +00:05:13,280 --> 00:05:16,160 +There is no technical solution +to a social problem. + +74 +00:05:16,160 --> 00:05:23,080 +For any of these FOSS to start genuine change, we need to reach a critical mass + +75 +00:05:23,080 --> 00:05:24,560 +with network effect. + +76 +00:05:24,920 --> 00:05:28,160 +To host and facilitate +a digital mass migration, + +77 +00:05:28,160 --> 00:05:31,760 +existing infrastructures +wouldn't be enough, + +78 +00:05:31,760 --> 00:05:35,000 +we would need to +invest in decentralized infrastructure + +79 +00:05:35,000 --> 00:05:38,800 +and disperse the cloud +by reclaiming our data. + +80 +00:05:38,920 --> 00:05:41,520 +To spread this idea +and turn it into reality, + +81 +00:05:41,520 --> 00:05:44,640 +we can organize +feminist hacker literacy campaigns, + +82 +00:05:44,640 --> 00:05:48,160 +not just for coding +but for everything we need + +83 +00:05:48,160 --> 00:05:50,840 +to liberate and maintain our cyborg lives, + +84 +00:05:50,840 --> 00:05:56,520 +like system administration, telecom engineering, hardware assembly and repair, + +85 +00:05:56,520 --> 00:06:02,520 +and most importantly, wetware, which is +the organic part of our cyborg bodies. + +86 +00:06:03,360 --> 00:06:07,360 +The intersection of feminist and hacker politics goes back to witches + +87 +00:06:07,360 --> 00:06:10,200 +who were hunted +for having the power of knowledge + +88 +00:06:10,200 --> 00:06:14,240 +detrimental to capitalist racist cisheteropatriarchy. + +89 +00:06:14,520 --> 00:06:18,280 +Half century ago, when abortion +was illegal in the United States, + +90 +00:06:18,280 --> 00:06:24,000 +underground Jane Collective reappropriated the knowledge of performing abortions, + +91 +00:06:24,000 --> 00:06:29,800 +to train and maintain a feminist network of illegal practitioners. + +92 +00:06:30,160 --> 00:06:31,200 +In 2001, + +93 +00:06:31,200 --> 00:06:36,120 +Gender Changers Academy started doing feminist hack workshops in Amsterdam + +94 +00:06:36,120 --> 00:06:40,080 +which then toured cities in different countries + +95 +00:06:40,080 --> 00:06:41,840 +under the name Eclectic Tech Carnival. + +96 +00:06:42,000 --> 00:06:47,000 +In 2014, Feminist Principles of the Internet +were drafted in Malaysia, + +97 +00:06:47,160 --> 00:06:51,200 +meanwhile in Catalonia, TransHackFeminist convergence featured workshops + +98 +00:06:51,200 --> 00:06:56,520 +ranging from do-it-yourself +gynecology to creating feminist servers. + +99 +00:06:56,880 --> 00:07:01,600 +Feminist principles of the internet +on feministinternet.org + +100 +00:07:01,600 --> 00:07:05,760 +is a good starting point for imagining +a feminist internet + +101 +00:07:05,760 --> 00:07:10,240 +but as it says on the Anarchaserver: +"A feminist internet also requires + +102 +00:07:10,240 --> 00:07:13,800 +self-managed and autonomous +feminist servers." + +103 +00:07:13,920 --> 00:07:17,120 +"This is about regaining control +and gaining autonomy + +104 +00:07:17,120 --> 00:07:20,680 +in the access and management +of our data and collective memories. + +105 +00:07:20,680 --> 00:07:23,800 +It is also about being able +to have feminist mailing lists, + +106 +00:07:23,800 --> 00:07:28,200 +pads, wikis, content management systems, +social networks + +107 +00:07:28,200 --> 00:07:32,840 +and any other online services managed +by feminist tech collectives. + +108 +00:07:33,400 --> 00:07:37,000 +It is also of course +about continuing to argue that + +109 +00:07:37,000 --> 00:07:39,440 +social justice in technologically driven +environments + +110 +00:07:39,440 --> 00:07:45,440 +needs a more gender and culturally +diverse presence in general." + +111 +00:07:46,520 --> 00:07:50,680 +Today there are a few feminist hacklabs and feminist servers + +112 +00:07:50,680 --> 00:07:57,040 +that are doing a very important job by setting paradigms and leading by example. + +113 +00:07:57,840 --> 00:08:02,160 +What we need urgently is +the popularization of these practices + +114 +00:08:02,160 --> 00:08:05,840 +by sharing material, technical +and emotional resources. + +115 +00:08:05,920 --> 00:08:10,000 +To have our own infrastructure, +we have to make a collective decision + +116 +00:08:10,000 --> 00:08:11,480 +to invest in it. + +117 +00:08:12,200 --> 00:08:16,560 +In the article "Feminist autonomous infrastructure: from zombies to ninjas" + +118 +00:08:16,560 --> 00:08:20,760 +it explains how volunteering risks invisibilizing labor + +119 +00:08:20,760 --> 00:08:26,440 +and donation campaigns are not enough +to sustain feminist infrastructure projects. + +120 +00:08:26,960 --> 00:08:31,760 +The article titled "Feminists are building +their own technology to organise + +121 +00:08:31,760 --> 00:08:37,760 +but where are funders?" explains how +a feminist server project ceased to exist + +122 +00:08:37,760 --> 00:08:39,680 +because it lacked proper funding. + +123 +00:08:40,160 --> 00:08:43,720 +"The internet, like +the streets, needs to be reclaimed. + +124 +00:08:43,720 --> 00:08:47,720 +We can build new spaces of engagement, organizing and transformation + +125 +00:08:47,720 --> 00:08:48,640 +but in order to achieve this, + +126 +00:08:48,640 --> 00:08:54,160 +we need funding that can ensure +those building the feminist internet + +127 +00:08:54,160 --> 00:08:57,840 +that they can make decisions +over where their knowledge goes." + +128 +00:08:58,360 --> 00:09:02,000 +A server can cost less +than the cheapest smartphone + +129 +00:09:02,000 --> 00:09:05,400 +or cheaper +if you use a second hand computer + +130 +00:09:05,400 --> 00:09:08,480 +but we also need the funding +to spread the idea + +131 +00:09:08,480 --> 00:09:12,960 +and give people the time and space +to learn, exercise and develop. + +132 +00:09:13,320 --> 00:09:17,080 +In cities like Barcelona where +every neighborhood have feminist groups, + +133 +00:09:17,080 --> 00:09:21,320 +every neighborhood can have a feminist +hacklab with servers that federate. + +134 +00:09:21,320 --> 00:09:24,480 +For neighborhoods that don't +have a secure physical space, + +135 +00:09:24,480 --> 00:09:32,800 +bigger feminist organizations like Ca La Dona +can share VPS and other services. + +136 +00:09:32,880 --> 00:09:37,160 +Every feminist group should have access +to feminist servers, + +137 +00:09:37,160 --> 00:09:41,840 +if they're too small or ephemeral and can't afford to have their own, + +138 +00:09:41,840 --> 00:09:46,840 +they should be able to find help from other feminist collectives that share services. + +139 +00:09:46,840 --> 00:09:49,560 +Bigger feminist organizations in +more privileged parts of the world should + +140 +00:09:49,560 --> 00:09:56,040 +also have programs to share services with +the feminists from rest of the world. + +141 +00:09:56,320 --> 00:10:01,040 +Feminist infrastructure and servers +should be seen as a necessity, + +142 +00:10:01,040 --> 00:10:04,240 +especially for separatist feminist groups. + +143 +00:10:04,440 --> 00:10:09,040 +We can't have truly no-mixto spaces +on vectoralist platforms, because there + +144 +00:10:09,040 --> 00:10:15,920 +even our close groups and personal +messages are exploited by white cis men. + +145 +00:10:15,920 --> 00:10:19,640 +On the other hand, +imagine an internet without cis men at all, + +146 +00:10:19,640 --> 00:10:22,200 +and believe that +we can create it together. + +147 +00:10:22,600 --> 00:10:28,080 +To realize that dream we don't need +a new technology, we need a new culture. + +148 +00:10:28,920 --> 00:10:33,960 +Hacker class consciousness must be a part of our intersectional feminist consciousness. + +149 +00:10:34,560 --> 00:10:37,880 +We can update our +consciousness raising practices + +150 +00:10:37,880 --> 00:10:42,400 +by including conversations about how vectoralism effects us personally + +151 +00:10:42,400 --> 00:10:46,920 +and sharing the knowledge of +how to hack it for good + +152 +00:10:47,200 --> 00:10:50,040 +with care +and not condescension. + +153 +00:10:50,400 --> 00:10:56,880 +We can throw crypto install parties +combined with tupperware/sex parties + +154 +00:10:56,880 --> 00:11:00,760 +where we demonstrate +signal blocking pouches, tails sticks, + +155 +00:11:00,760 --> 00:11:04,520 +single board computers, +linux phones, etc. + +156 +00:11:04,520 --> 00:11:06,800 +When we do these parties +at each others homes, + +157 +00:11:06,800 --> 00:11:10,360 +we can help set up home servers and labs. + +158 +00:11:10,360 --> 00:11:14,920 +We can make signal blocking +purses for smart devices fashionable. + +159 +00:11:14,920 --> 00:11:17,960 +Take that textile back +from military machis. + +160 +00:11:17,960 --> 00:11:21,840 +If we do it on our own +we could be singled out, + +161 +00:11:21,840 --> 00:11:24,200 +so we should do it as a movement + +162 +00:11:24,200 --> 00:11:30,800 +and exercise it as our right +to not be accessible 24/7. + +163 +00:11:30,800 --> 00:11:36,760 +Our culture should value a repairable +cheap phone with killswitches + +164 +00:11:36,760 --> 00:11:39,440 +more than +the latest most expensive phone + +165 +00:11:39,440 --> 00:11:43,160 +that doesn't allow a battery removal +without breaking the warranty. + +166 +00:11:43,160 --> 00:11:47,320 +Meanwhile, we can't forget +where the lithium, koltan + +167 +00:11:47,320 --> 00:11:50,560 +and everthing else +that goes into a computer comes from, + +168 +00:11:50,560 --> 00:11:54,920 +the people who mine it, carry it, process +it, assemble it. + +169 +00:11:54,920 --> 00:11:58,120 +We must interfere with technology at +every layer + +170 +00:11:58,120 --> 00:12:03,040 +from internet service provisions +to supply-production chains + +171 +00:12:03,040 --> 00:12:06,880 +to stop reproducing injustice +and destroying our planet. + +172 +00:12:06,880 --> 00:12:10,040 +To be able to take good care +of each other and the earth, + +173 +00:12:10,040 --> 00:12:14,680 +we must cultivate our response-abilities +and radically change our culture. + +174 +00:12:14,680 --> 00:12:18,240 +The future will be feminist +or there won’t be future!