FemH3ck - How the internet works for WHRD, Mexico
From Gender and Tech Resources
|Title||How the internet works for WHRD|
|Category||Digital Security Gender and Tech|
|Scale||amecameca, estado de mexico|
|Organisation||SocialTIC, Luchadoras, WITNESS, Subversiones y la Sandía Digital|
rompeviento.tv/Bienvenidos/luchadoras/ es.witness.org subversiones.org http://lasandiadigital.org.mx/
|Target audience||Participats of Voces de Mujeres (Voices of women project)|
|Number of participants||28|
|Context and motivations|| We believe that before telling this women participating in the project, about how great is the Internet, we needed to share with them more information related to how it works. So we started the introductory session on digital security with the exercise how the internet works, we talked about the stages or places where our information travels when sharing it through the Internet.
One of the things I have learned about basic digital security with WHRD, is that we don't always know where the risks are, but sometimes we hear somthing about a certain tool and we quickly download it but we don't always use the tool in the right way. So this session always helps to get a general picture and also it helps to solve a lot of questions from different tools and different risks.
We have now a couple of materials for the session, we also have the flyer on how the internet works: https://www.dropbox.com/sh/q8o7041fi8ac6mz/AAAUn56sjbpWa3krLldVPRnea?dl=0 A serie of cards like ISP, router, platforms that help in the facilitation of the dinamic.
Also we printed some materials to share with them on this same topic, this are also available in the dropbox link. The printed material had some other great resources to check.
|Topics||How internet works, general risks, secure tools|
|Agenda|| Voces de Mujeres (Women's Voices) was a 3 days training on multimedia production with WHRD in Amecameca, Estado de Mexico. During this 3 days we covered:
Narrative - How to tell a story How to conduct an ethic and secure interview Video, photo, text and audio production Digital security: How the Internet works?
- What do we use Internet for? - What type of information do we exchange through Internet? - Exercise with the cards: giving each person a card (router, computer, ISP, Google..) - Looking at the risks - What could go wrong on each stage? - What can we do or which tools can we use to solve this? - Questions
|Methodologies|| A reflexion on types of information.
Constructing with all of them the process of How the Internet works? Finding easy examples to explain things like: HTTPS, Encryption..
|Resources||Security in a box. Dominemos las TIC site.|
|Gendersec||Security in the box|
|Feelings||How was it? It was good, all of them were very interested and had a lot more questions even the other organizers so I had a few direct talks with them during the rest of the training.|
|Feedbacks||What were the impressions? Time was a bit too short. It was good from what people said to me and in the evaluation, but I could tell that it was hard for some people, like 3 girls that we have in the group, to understand some concepts.|
|Start||What will you start doing? By asking for more time for the work shops, and I think I need to work more in the introduction.|
|Stop||What will you stop doing? It is hard when you are doing this activity that people start always asking so they start sharing a lot of information and questions they have but in different part of the process so I think it can turn into a mess and people can get confused if you don't follow the order. So it is important to stop answering the questions as they come up, but to better go with the process and take notes of this to attend when you arrive to that part.|
|Keep||What will you keep doing? Giving them the chance to organize themselve in the way they think things work. It gives you a good idea of what they use to think related to the internet, and doing it with the papers or materiales printed makes it more interesting and fun for them. Also to explain them why digital security tools aren't always as easy to use af Facebook for example. This is something I have started doing a couple of trainings ago. It is important to let them know who build this secur tools and to make them responsible for their own security habits, it is not me and my ideas, it is you identifying the risks and thearts you are facing.|