Tech Learning Collective

Technology education for radical organizers and revolutionary communities.

Blog

Subscribe to our blog.

  1. Using Private Electronic Money: Off-Ramping

    Editor’s note: This post is the fourth in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.

  2. Using Private Electronic Money: On-ramping

    Editor’s note: This post is the third in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.

  3. Using Private Electronic Money: Wallet Apps

    Editor’s note: This post is the second in a four-part series about making privacy-preserving cryptocurrency accessible and useful for underserved populations. Its original author, Violet Rollergirl, is a transgender sex worker who has modified the post from its original in order to speak to a broader audience. We are republishing her work here with her express permission.

  4. Firewalls Don't Stop Dragons: Luck Favors the Prepared

    Putin’s brutal aggression in Ukraine has put cyberwar back in headlines. Recently, Carey Parker, host of the Firewalls Don’t Stop Dragons podcast, reached out to us at Tech Learning Collective to talk through some of the issues the war in Ukraine has once again raised for laypeople who may be newly concerned about the reliance we’ve developed as a society on digital infrastructures. So, late last month, we sat down with him for another conversation about what anyone and, arguably, everyone could be doing not only to keep themselves safer online, but also prepared in the event of an escalation of hostilities in a cyber theater, rapid shifts in political climates, or even just natural disasters that affect telecommunication abilities.