Hacking with Care!
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Part Number | 90 | |
Number of Parts | 188 | |
Author | ||
License | CC Attribution - ShareAlike 3.0 Germany: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this | |
Identifiers | 10.5446/20599 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
re:publica 201690 / 188
1
2
3
5
6
13
14
15
17
18
20
21
22
24
26
27
28
29
31
32
33
34
35
37
38
39
40
41
42
44
46
47
49
51
52
54
55
58
59
63
64
65
66
67
68
70
71
72
75
77
79
80
82
85
86
90
91
93
94
96
97
98
99
102
103
105
106
109
111
112
113
115
116
118
119
120
121
123
124
126
128
129
132
133
136
137
138
139
140
141
144
146
147
148
149
151
155
157
160
161
162
163
165
167
169
171
172
173
174
176
178
179
180
181
183
185
186
188
00:00
HypermediaWeightMetropolitan area networkMoore's lawHigher-order logicLaptopSinc functionGeometryArmJSONXMLComputer animationLecture/Conference
00:58
Multiplication signRevision controlDirection (geometry)Meeting/Interview
01:40
Maschinenbau KielMach's principleMusical ensembleMereologyPoint (geometry)Multiplication signDirection (geometry)Disk read-and-write headBitPhysical systemCodecTurtle graphicsTelecommunicationFlow separationHacker (term)Self-organizationRight angleCoordinate systemGraphic designTotal S.A.Meeting/Interview
03:37
WeightBitShared memoryField (computer science)Combinational logicComputer clusterMeeting/Interview
04:14
Metropolitan area networkMessage passingCommunications protocolNeuroinformatikPoint (geometry)SoftwareHypermediaLecture/ConferenceMeeting/Interview
04:52
Message passingHypermediaGame theoryGraphic designState of matterVideoconferencingMeeting/Interview
05:21
Integrated development environmentState of matterHacker (term)Asynchronous Transfer ModeArithmetic meanBitSystem callMeeting/Interview
05:48
Multiplication signHacker (term)WeightMeeting/Interview
06:19
Moore's lawMetropolitan area networkCAN busHacker (term)Physical systemOrder (biology)CuboidSet (mathematics)Lecture/ConferenceMeeting/Interview
06:52
Metropolitan area networkInformationDataflowFreewareShared memoryChemical equationGoodness of fitMeeting/InterviewLecture/Conference
07:22
Machine visionSet (mathematics)Category of beingMeeting/Interview
07:54
Metropolitan area networkRight angleFile formatGoodness of fitPerturbation theoryMoment (mathematics)Shared memoryMachine visionLecture/ConferenceMeeting/Interview
08:27
Metropolitan area networkRegulärer Ausdruck <Textverarbeitung>Propositional formulaLecture/ConferenceMeeting/Interview
08:50
Artificial neural networkMaschinenbau KielHacker (term)DistancePropositional formulaQuicksortMeeting/Interview
09:23
System callProjective planeMeeting/Interview
09:48
Boom (sailing)Metropolitan area networkMaxima and minimaPower (physics)Perturbation theoryResultantProjective planeSystem callData storage deviceLecture/ConferenceMeeting/Interview
10:39
Metropolitan area networkConfidence intervalKey (cryptography)Projective planeConstraint (mathematics)Virtual machineMultiplication signInformation securityGame controllerCausalityContext awarenessLaptopObject (grammar)Computer animationLecture/ConferenceMeeting/Interview
11:52
Mach's principleLaptopMultiplication signIntegrated development environmentGame controllerProjective planeMoment (mathematics)System callMeeting/Interview
13:11
Maxima and minimaMetropolitan area networkMaschinenbau KielHacker (term)QuicksortSensitivity analysisInformation privacyDefault (computer science)Latent heatInformation securityCondition numberCASE <Informatik>Physical systemContext awarenessFamilyGroup actionDivisorPrisoner's dilemmaPower (physics)ExpressionState of matterComplex (psychology)Lecture/ConferenceMeeting/Interview
15:50
Maxima and minimaMetropolitan area networkHacker (term)Zirkulation <Strömungsmechanik>Lecture/ConferenceMeeting/Interview
16:24
Electronic mailing listInformation privacySelf-organizationDesign by contractContext awarenessMereologyGame controllerExploit (computer security)MassMeeting/Interview
17:19
Internet der DingeContext awarenessGame controllerVector potentialPower (physics)State of matterPartition (number theory)Information privacyExploit (computer security)Meeting/Interview
17:56
Metropolitan area networkMaxima and minimaMassContext awarenessArmPlastikkarteProcess (computing)PlanningLecture/ConferenceMeeting/Interview
18:28
TelecommunicationMeeting/Interview
18:53
Online helpTelecommunicationProfil (magazine)Right angleMassMeeting/Interview
19:55
Group actionVirtual machineGame controllerTelecommunicationEncryptionCellular automatonService (economics)SoftwareMeeting/Interview
20:20
Metropolitan area networkValue-added networkAuthorizationSymbol tableHacker (term)BitLecture/ConferenceMeeting/Interview
20:53
Point (geometry)Self-organizationLecture/ConferenceMeeting/Interview
21:32
Commodore VIC-20Maschinenbau KielTask (computing)Context awarenessGoodness of fitMeeting/Interview
21:55
Moore's lawMetropolitan area networkUniformer RaumReal numberPosterior probabilityLogical constantGroup actionFile formatVideoconferencingMathematical analysisHacker (term)WikiMessage passingField (computer science)Self-organizationCommunications protocolLecture/Conference
23:25
Field (computer science)Hacker (term)Self-organizationInstance (computer science)TelecommunicationFile formatEvent horizonDependent and independent variablesMeeting/Interview
23:48
Gamma functionMach's principleDependent and independent variablesChannel capacityBounded variationVariety (linguistics)Meeting/Interview
24:27
Maxima and minimaMetropolitan area networkChannel capacityScaling (geometry)Projective planeLecture/ConferenceMeeting/Interview
24:50
Domain nameAreaGenderHacker (term)Meeting/Interview
25:19
Information systemsMaschinenbau KielMultiplication sign1 (number)Right angleStudent's t-testStreaming mediaFocus (optics)Data miningLecture/ConferenceMeeting/Interview
26:26
TelecommunicationAffine spaceElectronic mailing listGoodness of fitLecture/Conference
27:21
Electronic mailing listInclusion mapMultiplicationDrum memoryLecture/ConferenceMeeting/Interview
27:45
View (database)Mathematical singularityPhase transitionSmoothingForm (programming)Stress (mechanics)Multiplication signQuicksortVideo gameLipschitz-StetigkeitMeeting/Interview
28:34
HypermediaLecture/ConferenceJSONXML
Transcript: English(auto-generated)
00:18
Can you hear me? So, in the meantime, I suggest, maybe some of you are familiar with using
00:26
a laptop computer, no? Maybe some of you are using a backpack every day, maybe some of you have ever experienced neck pain, back pain, maybe aches that goes all along the arm, the elbows, because of too much typing, you know? I learned some years ago
00:45
these very simple exercises that really changed the way I related to my upper back and shoulders, and never experienced pain again since I practiced them quite regularly. I want to show them to you, if you agree, you can do them about any time, it's quite quick. I'll do kind of an abridged
01:05
version here, whatever happens, be careful, you know, every mileage is different, but the principle is simple. Look, you put your shoulders up, then down, up, then down, like on, off, on, off,
01:23
and you do that a couple of times, actually 10, 12 times maybe, we don't have time now. Then you roll your shoulders like this, gently, at first, then depending on how much you suffer, you can vary that, then in the other direction, then in a disjointed way, it goes very well with music,
01:46
like funk music, then the other direction, again you should do this 10, 12 times, whatever works for you, and now the point is to really warm up the upper part of the back, the spine,
02:03
and well, mostly the shoulder blades, now that they're warm, you can turn your head all the way to the left, then all the way to the right, you may hear and feel a cracking that may feel really good actually, and that is the tension going away, then all is left is to bring your
02:22
head forward like a turtle, and back, forward, and back. So to summarize, on, off, on, off, then rolling in one direction, rolling in the other, disjointed in one direction, disjointed in the other, all the way left, all the way right, and again, then forward and back,
02:43
like a turtle, you can do that several times a day when you feel a bit of pain, or any time I hope it helps, like it helped for me. Well, it is now time we begin. So I'm Jeremy Zimmerman, I would define myself as a hacker, an enthusiast of technology
03:01
and systems in general who like to understand how they work, and hopefully make them work better. I used to be an activist for seven years, full, full, full, full time. I was the main coordinator, and spokesperson, and campaigner, and analyst, and graphic designer, and whatnot. For La Quadrature du Net, Paris-based citizen organization Defending Freedom Online,
03:25
I got in many fights in France and in the European Parliament, the telecoms package, the actor, net neutrality, and so on. And I went very, very, very close to a very bad burnout, and I learned quite a bit about this.
03:42
So hi, am I on? Yes. Hi, my name is Emily. I'm a wellbeing massage practitioner. I have been doing that for 10 years now. So I make, I share, and I study massage, and recently classical Chinese medicine as well.
04:01
I like to work in a combination of techniques in a rather open, freestyle way, and I like to collaborate with people outside my field, like musicians, for example, and I like to write massage protocols. And I am not especially a tech enthusiast, and I was not a computer literate.
04:31
But I improved on that second point and had much pleasure learning, thanks to Jeremy and the lovely friends he introduced me to. So when we met with Emily, I figured that
04:44
even if I knew how, I knew about hacking computers, networks, parliaments, legislations, press releases, graphic design, vintage video games, and whatnot, I had no clue what massage was about. So since then, I learned a lot to our contact. But when we met, I was so badly
05:06
burned out, I slept three hours and three hours and three hours, had my phone constantly on my ear burning, was running from place to place, and wasn't really myself anymore. Emily offered to give me my first massage, and after one hour, I figured I ended up in a state
05:23
where I was so much recentred on myself, so much myself again on a slow, deep-breathing mode, I opened my eyes and I remember looking at her and saying, well, hey, you're a hacker! Right, so we've been talking already a bit about hacking, activism, and what it is that we do,
05:43
but that's actually when Jeremy calls me a hacker that I really understood the meaning of the word and that I could really relate to it. So then I really gladly accepted his invitation to join him and La Quadrature du Net on a hacker summer camp in the Netherlands in 2013,
06:02
where La Quadrature du Net were experimenting with their first teahouse, now famous, and where other friends were there as well who'd been reflecting on the same questions. So that's basically where Hacking with Care started for the first time, so that was three years ago. So what's hacking, what's care, and what's hacking with care?
06:26
To me, hacking is an emancipatory practice of humans versus systems or tools. It is a systemic approach where you have to understand the whole box in order to be able to
06:41
outside of it. It is sometimes about breaking, it is about remixing, it is always about inventing. It is, before everything, to me, a set of ethical values. It is about the free flow of information, the free sharing of knowledge, and it is about enabling others
07:01
to participate. Care, there would be much to say about care, but simply put, I would say that care is about goodness, and even it's about common goodness, actually, and nurturing that. It's also about creating sustaining harmonies and finding balance between
07:25
one and the world, one and the other beings in the world, and one with oneself as well. I would say that care is not defined by a particular set of skills. Rather, it has to do with a presence and an intention, what it is that you are going to do
07:47
with what you love to do, what vision of the world are you going to support with what you do. And so, in that view, care, community care, self-care, for us, will be all the same thing.
08:03
So, this is what we mean by hacking with care. It's a shared vision, shared ethics, with common good at heart. It is always to create situations, moments, formats in which to exchange and share. It is about producing resources to embed
08:25
this knowledge we want to share, and it is to give us ability to engage into research. This is how we plan to hack care. This is how we plan to be hacking with care. This is how we do it. This is how we do it.
08:44
So, basically, the very happy encounter between us and other friends with this proposition would like to scale and bring more people together and make alliances, because, actually, we think even if from a distance it doesn't seem at first that we're doing the same thing,
09:03
what in fact we are. So, let's do this together sort of thing, yeah. So, care for hackers, activists, and whistleblowers. What's common in activists, hackers, and I guess whistleblowers as well, I think, is passion. Passion as an engine that
09:27
makes you do things better, that makes you do things more. Passion as a fuel that takes all of yourself into the battle, into the cause, into the project.
09:42
All of yourself means all your resources, your mental and your physical resources. This passion is something burning hot. It is something of tremendous power. We used to joke in the European Parliament that one passionate activist equates ten, maybe a hundred robotic lobbyists. So, this passion is something very beautiful, very precious that we must preserve,
10:08
but the flip side of this passion is that as everything that is tremendously hot, it burns, and it burns, and the risk is that it ends up burning you. When you're exhausting all your resources and it keeps burning, the result is what we call a burnout,
10:26
and a burnout has terrible consequences. It has terrible consequences, first of all, on your cause, on your project, on whatever this is you're defending, but it also has terrible consequences on yourself. It makes you stressed, anxious. Therefore, it makes you make mistakes.
10:45
Therefore, it makes you lose your confidence. Therefore, it will make you be more aggressive, and therefore, it has consequences on the people around you. It makes you make mistakes the way you behave with people around you, and this is what leads to anger. This is what
11:02
leads to tension. This is what could lead to infighting, and we know how much infighting is the main cause for failure of social movements and projects alike. It's one of the main. Mitigating burnout, of course, is a major objective. Also, keep in mind that activists
11:25
in many contexts and increasingly, we hope, will have to handle security seriously, and this brings extra constraints on the body and on the mind. Handling those keys, keeping those keys on the USB at all times, keeping one or several laptops with you at all times, retaining
11:46
physical control over those machines. How do you go to a doctor? How do you go to a sauna? How do you lay down on the beach when you feel tired if you have to get those three, four, or five laptops with you is something also we should keep in mind.
12:03
Also, what is very interesting to me after my own experience is that when you're burning out, you're submitted to fast time. Everything around you is going faster and faster. Those phone calls, those tweets, those emails, you have to take care of them. You have to handle them. You have this feeling that if you stop, everything is going to crumble,
12:24
so you have to be on top of it, which means that you become a slave to your environment. Your environment defines the time in which you live. When we all know that it is in other moments of times, in those long moments of time when you decide, when you control,
12:41
when you sit down, when you breathe deeply, that you can look at the future, that you can think for your well-being. It is in those moments of longer time that we can think strategically and strategic thinking is what we need today, whatever your cause, whatever your project. This is what we badly need today. It is about collectively finding ways to mitigate, detect
13:05
this burnout when it comes, but also about taking back control over time and over timelines. So on the subject of care for hackers, why care for hackers and activists? Of course, we're interested in care for everyone, but we do have at heart to focus on hackers and activists
13:25
and whistleblowers is because not only do they work themselves out in very specific conditions, but they also face pretty intense repression from the systems of powers that they disturb with their action. People, companies, states who don't have public interest at heart,
13:47
unlike our friends, and rather, favor their profits and privileges. So it is a fact that hackers, activists, whistleblowers are closely monitored. They are intimidated, harassed,
14:01
and they get all sorts of abuses, whether they be made-up accusations and disproportionate charges and whatnot. So how do we bring care in such complex and sensitive context on top of all the
14:26
specificities that Jeremy has described? How do we facilitate that access to care? As a caregiver, that will mean learning and experimenting and adapting with security, because obviously, as we have understood here, access to care will be closely tied to security
14:46
aspects, which will have to do also with anonymity and privacy and also much more. Actually, later we will argue that much of it would benefit actually everyone and should be
15:02
default setting for everyone, but right now we're focusing on hackers and activists. One other very important motivation for us to bring care for hackers and activists is gratitude. So our care as an expression of our gratitude for their action, and with that, the idea is that care is transitive. It communicates itself,
15:27
and although we are very aware that a massage cannot get someone out of prison, cannot win a case, cannot bring the justice which would actually be really good for their health, a massage can maybe help a lawyer, a journalist, a friend, a family,
15:46
someone who is out there kicking ass for us and for them. This very notion of care as gratitude I think demonstrates that care is not only hacking, that it is also actually activism. So hacker ethics and tools for caregivers.
16:08
So when we speak of hackers' ethics and tools for caregivers, we refer to, for example, very concretely, access and circulation of knowledge and resources for care,
16:20
as opposed to their privatisation and restrictions around them with paywalls, copyrights and whatnot, trade agreements. We refer to, as we've evoked already, best practices with regards to anonymity and privacy and even amnesia. That would be a good one as well. And here, let me paraphrase
16:42
the publishing organisation WikiLeaks. So we want transparency for the powerful and privacy for the weak, and who are the weak? Well, the list is very long, unfortunately, very sadly, but if we listen closely here, privacy for the weak is a part
17:01
of a Hippocratic oath, basically, so that should bring to mind the doctor-patient relationship and the contract between them, and how is this done today in a context where there is massive data exploitation for commercial or social control purposes, and how is this done today
17:26
with the internet of things and medical things which increases potential for misuse and failure, and also how is this done today when we're in a context where there are abuses of power
17:43
in the name of anti-terror, and basically caregivers and other state bodies who are being asked to turn into thought police and therefore breach privacy with their patients, so that's the context. And when we talk about exploitation of data, it's important to
18:03
understand that it has very concrete implications on everyone's freedoms and what they can do with their lives. So, for example, are you going to get this job if you're planning to have a baby? Are you going to get fired because you smoke weed? How expensive is your health insurance going
18:23
to be if you can't show that you made 10,000 steps, if you walked 10,000 steps last month? And can you enter this country if you're HIV-positive or another one? So that's very, concrete repercussions on freedoms. As a quick question here, who encrypts their communication with their doctors and other
18:45
caregivers? You see one hand in the room. So, for all the others here, what's happening when you're asking a question about an STD, about an abortion, about mental illness?
19:03
What's happening is that it's going unencrypted, right? So, we know now that all our communications, all our behaviors are being recorded, aggregated in profiles, and are potentially being used against ourselves for commercial or political purposes. But you know what's worse? The worst
19:24
consequence of mass surveillance maybe is self-censorship. It's the things we don't say, but also the things we don't do, the places we don't go, the people we don't associate with. So, what are we going to do? When we feel low, will we stop asking for help? When we're
19:40
asking questions about this thing that is growing somewhere on ourselves, will we stop looking for answers? Will we stop caring for each other because we are too afraid that those things will be known and used against us? So, Acre ethics and tools provide a concrete path
20:00
of action. With free, liberal software, we will take back control of our machines. With decentralized services, we will take back control of the infrastructure and know where our data is. With end-to-end encryption, we will get hold of our keys and secure ourselves or communications. So, our hope is that by transmitting those tools and those values
20:24
to the caregivers, maybe they can help. Maybe they can help leading by the example. You know how the white gown is a symbol of authority for many people. Maybe this authority could be put at good use. So, this is a bit dark and I'm sorry, but our hope is that we
20:46
can do all this in a joyful way because hacker culture is mostly about a playful enthusiasm, about doing things in an inventive way, and that's precisely the point and the way we want to do it with Hacking with Care. So, what we've done so far and what's next?
21:06
Yeah. So, for the past three years, what we've done is very concretely offer care to individuals and organizations, and we cannot tell you much about this because privacy, right? And we've also
21:28
been present at hackers, congresses, and camps, conferences with workshops, care sessions, documentation, and often teaming up with others, like La Croix d'Auteur du Net, very good friends,
21:45
center of investigative journalism, tactical tech, and courage. And we have created some resources as well. So, this hands massage manual for everyone, for example, which you can find
22:06
and download on our Wiki, available in English and Portuguese for now, and soon Spanish and more.
22:21
And there's also other massage protocols on the Wiki that you can find, and we've compiled other resources that other people have put together in the same spirit on the Wiki as well for hackers and caregivers. That was a screenshot of a video tutorial that we shot for Freedoms of
22:48
Movement, and we dedicated it, as you can maybe see, to Julien Assange, who will have been four years arbitrarily detained inside the Ecuadorian Embassy in London on the 19th of June
23:02
this year. So, that's dedicated to him, and it will help you with your Freedoms of Movement. So, what we want to do in the future is basically keep doing this and doing more. We want to experiment, keep on experimenting with new formats, new formats for actions,
23:25
for events, some of them directed towards organisations going directly on the field with activists and hackers and try to transmit this knowledge by the practice on the field, but also formats and events directed towards caregivers themselves, help them encrypt their
23:44
communications, for instance. We want also to be able to better response to crisis, individual and maybe collective, and we want to engage in more research, maybe starting with the very question of burnout in activist communities. Our capacity to scale and grow all
24:04
of this will mostly depend on the variety of skills and the material support we'll collect from now on, hint, hint, material support, will depend also on the organisational skills,
24:21
the way we will manage to make all this work together, arrange all this beautiful diversity in a joyful and in a meaningful way, and maybe more importantly, our capacity to grow and scale will depend on you and the way you will feel like participating and contributing. Yeah, there are basically as many hearts and skills,
24:43
as many entries as there are hearts and skills to this project, so you can contribute whichever way you feel. We have lots of ideas, many ideas we haven't had yet as well, and we can discuss this after the talk at two behind the dome in the relaxed area,
25:05
where we will meet with another hacker carer, Sara, who is talking right now on gender and medicine, so we all meet together in the relaxed area after this talk. And so we're very grateful for the occasion to speak here, and before we open the floor,
25:24
we'd like to take some time for a little shout-out for everyone who cannot be here in the room today, all the ones who just can't be here because maybe the price of the ticket and all the ones who are watching the streams, but a particular focus on all the ones whose
25:42
freedom is being restricted right now, all the ones we wish could be exercising all their freedoms with us today the way it should be, as you were saying, what we really need for everyone is justice and care is just what we can do in the meantime. Right, so we send our
26:01
love and support to Julian Assange, to Chelsea Manning, to Edward Snowden, Jeremy Hammond, Barrett Brown, Laurie Love, all the ones we are not, and many, many more. Thank you very much for being here, thank you for everything Hacking with Care, join us. We'll immediately lead to a
26:42
song being sung by Emilie and I. Please. Who has a question? I don't see anybody here. Don't be shy, somebody wants to ask a question, it's now. Well, there are no questions. Be aware that if there is no question, you'll have the singing, and it's worth it. Okay, now we
27:02
have a question. There is a question. It's good as a threat as well. Hi, thank you for this talk. It's not a question I would like to suggest, non-violent communication as a way to learn how to talk to each other with more empathy as one of the caring activities that I would like
27:24
to help you with in the future. Great, yeah. Very interesting, thank you. Thank you. Is there another comment or another question? No, so, well, thank you very much. We have this song, actually. There's a song, okay. We have this song that we sing, it's not
27:48
of courage, it shakes the stress, and also we like to think that when there are someone listening in on us, maybe, we like to sing this song. Singing as a form of care. Yeah, singing is care. Sit on my face and tell me that you love me. I'll sit on your face and
28:06
tell you I love you too. I love to hear you all realize when I'm between your thighs, you blow me away. Sit on my face and let my lips embrace you. I'll sit on your face and then I'll love you truly. Life can be fine if we're both 69, if we sit on our faces
28:27
in all sorts of places and play, till we're blown away. Sit on my face.