Editor’s note: This post is the fourth in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
Technology, taught collectively.
Looking to get certified? Look elsewhere. Looking to spark a revolution? We’ll show you how to become more powerful than the most well-funded adversaries, including corporate- and government-backed opponents.
Click here to subscribe for event discounts and announcements
Onion site mirror (Run your own!)
(Learn more about Tor.)
Using Private Electronic Money: Off-Ramping
Using Private Electronic Money: On-ramping
Editor’s note: This post is the third in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
Testimonials
“I’m learning way more in Tech Learning Collective workshops than my college classroom”
The amount I’m learning in Tech Learning Collective workshops is way more than what I was learning in my college classroom. As a computer science major, most of the curriculum was all about theory and had very little practical work. TLC more than fills in that gap for me. Another reason I’m frequenting TLC events is for their community! I would’ve never known how vibrant TLC’s alternative tech community was. I’m definitely looking forward to participating in as many Tech Learning Collective events and courses as possible.
“gain some more knowledge in IT security [at] these webinars that we can really recommend”
If you are looking to gain some more knowledge in IT and especially in IT security, [these] are some webinars coming up that we can really recommend […] held and organized by the Tech Learning Collective and will address various areas of IT and IT security. Check the event calendar out (and even subscribe)!
“immensely valuable, and changed my core beliefs about my technological proficiency and potential.”
[I participated in] the “Tor: What is it Good For? (Absolutely Everything!)” workshop [and] I loved (LOVED!) the workshop.
The instructor was personable, friendly, and warm, with a keen vision of the change they want to see in the world and the ability to draw that vision into reality using self-direction and their unique and valuable gifts. They use analogies and examples to demystify complex subjects and connect, and anchor, abstract concepts to concrete understanding. They are kind, helpful, informative, and empowering to students.
The information was presented in an organized fashion, with step-by-step guidance that eliminated confusion in even the most inexperienced novice. The class is geared toward creating positive change in students’ lives by helping them better understand their use of internet security and privacy. Everything taught was highly applicable and useful to the common person. (These classes work to level the playing field between those with innate technological interest/skill and those without.)
The teaching methods used (analogies, examples, demonstration, verbal explanation, and hands-on practice) address the needs of all different kinds of learners in the classroom. The flow of the class was seamless. The incorporation of questions and answers was so helpful, and the progression of the material was logical and conducive to learning. There were frequent “comprehension checks” which made the material and instructor accessible to students throughout class.
I could go on, but TLDR: This class was immensely valuable, and changed my core beliefs about my technological proficiency and potential.
“very supportive to newbies […] I learned a lot”
I found out about Tech Learning Collective through an Electronic Frontier Foundation article about an event they were hosting regarding cybersecurity.
What I really liked about it, is that they were very supportive to newbies (like me) and I wasn’t too overwhelmed during the event. They made it as simple as they could. The communication between the audience and the presenter (and the teacher’s assistant) was really nice too. They tried to answer as many questions as possible and kept going for almost two hours after the event was supposed to end.
Among other things I learned a lot about the Tor Browser, brute-force attacks, and how password hashing works.