For nearly two years, my primary focus has been on the information security of activists and marginalized communities at risk of being targeted by hostile actors through the internet. I began working on this as part ActSecure, an ad-hoc group of movement technologists formed after the 2016 election.
The need is great, and there’s only so much an informal group of volunteers can do before hitting the limits of what we can deliver. Despite the fact that we mainly work with individuals, we’ve been approached by a number of non-profit organizations over the past two years looking for help.
Serendipitously, we met Oliver Day, founder and executive director of an organization called Securing Change. Oliver had just had a baby and was in discussion with his board of directors around shutting Securing Change down. With a focus on helping non-profit organizations with tech security and five years of history, we started talking about what we could do together. Earlier this year, we began the process of transitioning leadership of Securing Change to the ActSecure core team and rebooting the organization.
As I have the most experience with startup and non-profit work, my primary focus right in facilitating this merger is to build an operation under which we can develop new programming within and parallel to ActSecure.
More to come.
Don’t make a post to wordpress that centers an embedded facebook status and then shortly thereafter mark all of your facebook posts private at once.
I helped make a thing!
Amira 1.0.0: A Self-Sovereign Web of Trust Engagement Model
This paper began as a collaborative project at the fifth Rebooting the Web of Trust^1 workshop, held in Cambridge MA in October 2017. We reinterpret Christopher Allen’s Rebooting the Web of Trust user story,^2 through the lens of the Information Lifecycle Engagement Model (described in Appendix A). We present a human-centric illustration of an individual’s experience in a self-sovereign, decentralized realization of the Web of Trust as originally conceived by Phil Zimmerman for PGP.^3
In our scenario, Amira is a successful programmer working in Boston at a prestigious multi-national bank. Outside of working hours, Amira wants to give back to her community by writing software that matters. On the advice of her friend Charlene, Amira joins RISK, a self-sovereign reputation network that connects developers with projects while protecting participants’ anonymity, building reputation, and sending & receiving secure payments.
This paper came out of the Rebooting the Web-of-Trust workshop series. The purpose of #RebootingWebofTrust is:
This facilitated design workshop (“DesignShop”), hosted by Christopher Allen, is focused on the creation of the next generation of decentralized web-of-trust based identity systems. The goal of this event is to generate 5 technical white papers on topics decided by the group that will have the greatest impact on the future, followed by a hackathon early in the new year to implement those ideas. http://www.weboftrust.info/index.html#fh5co-tab-feature-center2