Editor’s note: This post is the fourth in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
Technology, taught collectively.
Looking to get certified? Look elsewhere. Looking to spark a revolution? We’ll show you how to become more powerful than the most well-funded adversaries, including corporate- and government-backed opponents.
Click here to subscribe for event discounts and announcements
Onion site mirror (Run your own!)
(Learn more about Tor.)
Using Private Electronic Money: Off-Ramping
Using Private Electronic Money: On-ramping
Editor’s note: This post is the third in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
Testimonials
“an amazing educational organization that can teach you all about online security.”
In unpredictable times, we need to keep each other safe. To do so, you don’t need to be a tech whiz or fluent coder. Plenty of volunteer developers have already made tools and applications to help you and your team increase safety and privacy without sacrificing functionality.
[Tech Learning Collective is] an amazing educational organization that can teach you all about online security. I owe much of this guide to what I have learned from them and the personal research their work has inspired. TLC has recently started to do more webinars (event calendar), so their work is now accessible from anywhere!
“heighten[ed] my own digital defense practice”
During the anti-globalization movement of the early 2000s, tech collectives such as Riseup and Autistici came into existence to provide autonomous, non-corporate communication tools and “How-Tos” for social movements to organize safely and securely with emerging new media. In South Africa, the Right2Know campaign was initiated in 2010 in response to the Protection of State Information Bill, which aimed at weakening the rights of journalists and whistleblowers to access information. As part of their work, R2K has published guides for activists to protect themselves digitally.
To heighten my own digital defense practice, I recently took a virtual workshop offered by the New York-based Tech Learning Collective. This collective provides technology education for radical organizers and revolutionary communities with special attention to underserved groups. These groups, which design tools and training for activists, are not a new occurrence.
“engag[ing for] curious minds”
Teaching a technical class from the terminal is a difficult proposition when you have students coming in from all over the world. The instructor of “Exploring Cyberspace: Network Sniffing and Scanning” did a commendable job getting a sense of the (virtual) room and talking at our level. Their task is probably helped by the fact that the Tech Learning Collective’s course offerings have titles and a mission that engage curious minds.
Before taking the class, I had some passing experience with one or two of the tools the instructor introduced. I would have considered myself a beginner. The instructor managed to take us into deep waters by illustrating small steps, making sure we understood the fundamental terminology, and asking us lots of questions. The scope of the class was thoughtfully limited—enough to make sure we could swim but also realize there is much more to learn. Quite an accomplishment in under two hours!
“I want to take like more than half of [their] workshops”
I want to take like more than half of the workshops offered by the Tech Learning Collective.