Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revision Both sides next revision | ||
hacker_culture [2024/02/13 23:27] ntnsndr [12. Beyond the valley] Replaced Shenzhen doc with Fernanda Rosa |
hacker_culture [2024/03/31 16:04] ntnsndr [10. Security culture] |
||
---|---|---|---|
Line 222: | Line 222: | ||
* Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://archive.thinkprogress.org/meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/)," _ThinkProgress_ (April 29, 2014) | * Jessica M. Goldstein, "[Meet The Woman Who Did Everything In Her Power To Hide Her Pregnancy From Big Data](https://archive.thinkprogress.org/meet-the-woman-who-did-everything-in-her-power-to-hide-her-pregnancy-from-big-data-80070cf6edd2/)," _ThinkProgress_ (April 29, 2014) | ||
- | **Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://www.isaca.org/Journal/archives/2010/Volume-1/Pages/Performing-a-Security-Risk-Assessment1.aspx) about the [nature](http://webkay.robinlinus.com/) of potential [threats](https://panopticlick.eff.org/) and how they might be mitigated. Check out software listed at [AlternativeTo](https://alternativeto.net/platform/all/?license=opensource), [PRISM Break](http://prism-break.org/), [PrivacyTools](https://www.privacytools.io/), or [Surveillance Self-Defense](https://ssd.eff.org/) if the dangers are digital. Go further with Janet Vertesi's [Opt Out Project](https://www.optoutproject.net/). Try out a few patches, and determine whether they're worth the trouble. | + | **Exploit: Audit your communication practices and identify improvements.** Review some of your regular practices, digital and otherwise, and locate potential security vulnerabilities. Do some [research](https://www.isaca.org/Journal/archives/2010/Volume-1/Pages/Performing-a-Security-Risk-Assessment1.aspx) about the [nature](http://webkay.robinlinus.com/) of potential [threats](https://coveryourtracks.eff.org/) and how they might be mitigated. What do online services you use [make you agree to](https://privacyspy.org/)? Check out software listed at [AlternativeTo](https://alternativeto.net/platform/all/?license=opensource), [PRISM Break](http://prism-break.org/), [PrivacyTools](https://www.privacytools.io/), or [Surveillance Self-Defense](https://ssd.eff.org/) if the dangers are digital. Go further with Janet Vertesi's [Opt Out Project](https://www.optoutproject.net/). Try out a few patches, and determine whether they're worth the trouble. |
### 11. Disintermediation | ### 11. Disintermediation |