29 lines
1.3 KiB
Markdown
29 lines
1.3 KiB
Markdown
# Technologoical Sovereignty, vol. 2.
|
||
|
||
* [Dedication](content/00dedication.md)
|
||
* [Preface: Technological Sovereignty – What are we talking about?](content/01preface.md)
|
||
* [Introduction: Technological Sovereignty – Learning to love machines again](content/02intro.md)
|
||
|
||
## Part 1: Characterising technological sovereignty initiatives
|
||
|
||
* [Code is political, algorithms are weapons of math destruction](content/03algos.md)
|
||
* [Digital Governance: Once upon a time...](content/04gamification.md)
|
||
* [Keeping technological sovereignty: The case of Internet Relay Chat](content/05irc.md)
|
||
* [Hacklabs to technological cooperatives](content/06cooperatives.md)
|
||
* [From appropriate technologies to re-appropriated technologies](content/07rats.md)
|
||
|
||
## Part 2: Characterising technological sovereignty
|
||
|
||
* [A seed sprouts when it is sown in fertile soil](content/08rizomatica.md)
|
||
* [COATI: Simultaneous interpreting using radio frequencies](content/09coati.md)
|
||
* [Whistleblowing: A double edged sword](content/10leaks.md)
|
||
* [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/11leap.md)
|
||
* [Let's develop peasant computing, let's breed “kittens”](content/12chatons.md)
|
||
|
||
## Credits
|
||
|
||
* [Credits](content/13credits.md)
|
||
|
||
* * *
|
||
|
||
* [Back cover](content/14back.md)
|