Editor’s note: This post is the fourth in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
Blog
-
Using Private Electronic Money: Off-Ramping
-
Using Private Electronic Money: On-ramping
Editor’s note: This post is the third in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
-
Using Private Electronic Money: Wallet Apps
Editor’s note: This post is the second in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
-
Using Private Electronic Money: Introduction
Editor’s note: This post is the first in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.
-
Firewalls Don't Stop Dragons: Luck Favors the Prepared
Putin’s brutal aggression in Ukraine has put cyberwar back in headlines. Recently, Carey Parker, host of the Firewalls Don’t Stop Dragons podcast, reached out to us at Tech Learning Collective to talk through some of the issues the war in Ukraine has once again raised for laypeople who may be newly concerned about the reliance we’ve developed as a society on digital infrastructures. So, late last month, we sat down with him for another conversation about what anyone and, arguably, everyone could be doing not only to keep themselves safer online, but also prepared in the event of an escalation of hostilities in a cyber theater, rapid shifts in political climates, or even just natural disasters that affect telecommunication abilities.