Agenda. Building fugitive [digital] infrastructure in hostile environments

A presentation of some concepts that could be useful when building [digital] infrastructures in hostile environments (state, police, fascists, cis-men, TERFs, SWERFs, etc.) where it can be difficult to build trust remotely, asking ourselves how can we bridge the gap between documentation and configuration, bridge the gap between “users” and “admins” ?

Current digital infrastructures are usually managed by a series of mysterious incantations made by cis-menpersons with full-privileges. Can we depart from that and find a way to build them collectively, and make them transparent, reproducible, autonomous?

Language: English