<<

REVERSIBLE

FREELY GIVEN Building Consentful Tech INFORMED

ENTHUSIASTIC

SPECIFIC What does consent have

3 What does consent have to do with to do with technology?

4 Content Warning technology?

5 Consentful technology is about having control over our digital bodies 2017 10 Consent makes technology more just and equitable You are free to: Share — copy and redistribute the A lot of us know about consent with regard to our 14 Consent from the ground up material in any medium or format physical bodies, like in the context of medical decisions Adapt — , transform, and 17 Consent is an ongoing process build upon the material or sexual activities. But when it comes to our digital for any purpose, even lives, there’s a lack of discussion about what consent 19 Consentful technology relies on commercially. community and accountability means for our data, our identities, and our online Under the following terms: interactions. 23 Consentful technology moves us Attribution — You must give appropriate credit, provide a link towards consent culture to the license, and indicate if changes were made. You may do This is intended for anyone who uses, makes, or so in any reasonable manner, but 24 Resources not in any way that suggests the is affected by digital technologies and wants to build licensor endorses you or your a more consentful world. It is by no means a compre- 24 Acknowledgments use. No additional restrictions — You hensive resource, but rather a collection of thoughts 25 Who wrote this? may not apply legal terms or technological measures that and questions we’ve gathered in the hopes of growing legally restrict others from doing 25 Feedback? anything the license permits. this conversation. 4 BUILDING CONSENTFUL TECH have used the symbol references to sexual violence. We this zine, however we do make several to reproduce harm and violence in We’ve tried asmuch aspossible not Content Warning where this content appears. of the relevant pages to indicate Verb: Givepermissionforsomething tohappen Verb: agreement todosomething. Noun: Consent DICTIONARY THE IN CONSENT Permission forsomethingtohappenor /kən’sent/ at the top “Doxing”: distributing Apps like track Uber when we are not location our digital bodies digital control over our about having is technology Consent non-consensual ways: to themmightnotbephysical,ourdigitalbodiesarefrequently acteduponin participate incommunities.Theycanalsoexperience harm. Althoughtheharm physical bodies,ourdigitalbodiesexistinrelationship withothersandcan digital bodies.Digitalaremadeupofpiecespersonaldata.Likeour But whataboutconsentbeyondourphysicalbodies?Thesedays,wealsohave but iscoercedintoperforminganother, thesexisnotconsensual. really consent.With sexualactivity, ifsomeonesaysyestooneformofintimacy of thepatient—theymustbeawarebothbenefitsandrisksinorderto simple yesorno.Medicalprocedureslikesurgeryrequirethe When itcomestoourphysicalbodies,weknowthereismoreconsentthana using them a target’s private their social network account passwords information, like even even ful “Revenge “Revenge Twitter Unchecked threats digital spaces like subject’s consent of sexual assault in posting intimate pornography”: images without the

databases data being shared with disabilities, disabilities, with across government such asbiometric Private information poor. particularly immigrants, the and impacts people informed consent

, which BUILDING CONSENTFUL TECH 5 TECH CONSENTFUL BUILDING 6 BUILDING CONSENTFUL TECH aspects. underlies all which consent and spaces in are applications technologies Consentful our digitalbodies havemoreautonomy? What woulda futurelooklikeinwhichthe cellsof exclusively bytheenvironment theylivein. physical bodies,ourbodyparts arecontrolled the serversthatmakeup internet.Alsounlike place, ourdigitalbodiesare scatteredthroughout However unlikeaphysical body thatexistsinone and organs,digitalbodieshavedatametadata. they’re comprisedofsmallerbits.Insteadcells Digital bodiesarelikephysicalinthat WHAT ADIGITAL IS BODY? ongoing approachtoconsent. Consentful technologyisaboutaholisticand the latterimpliesasingularaskorinteraction. We useconsentfulinsteadof“consensual”because between users. and accessed,tothewayinteractionshappen the waytheyaredeveloped,tohowdataisstored spaces inwhichconsentunderliesallaspects,from this. Consentfultechnologiesareapplicationsand consentful technologiestohelpusmovetoward our digitalbodies.We wanttoofferuptheideaof political shiftinhowweadvocateforcontrolover how weunderstanddigitalconsent,aswella to aneedforculturalandtechnologicalshiftin Instead, caseslikethoseonthepreviouspagepoint terms andconditions.” someone checkedaboxthatsaid“Iagreetothese technology. Andharmcan’tbejustifiedbecause bodies, harmcan’tbepreventedbytryingtoavoid become increasinglyinterlinkedwithourdigital consent thana“yes”or“no.”Asourphysicalbodies With ourdigitalbodies,thereisalsomoreto INTERNET THATSERVERS THE MAKE UP SCATTERED THE THROUGHOUT YOUR DIGITAL BODY IS

social media companies providers,service law enforcement agencies, Some servers your data lives in: Internet contents, contacts and friends recognition information, search history, email Some types of data: photos, facial BUILDING CONSENTFUL TECH 7 TECH CONSENTFUL BUILDING 8 BUILDING CONSENTFUL TECH definition, consent must be: Parenthood’s acronym. FRIES robust definition of consent, we turn to Planned For the sake of starting with acommon but AS EASY AS F.R.I.E.S. UNDERSTANDING CONSENT IS

FREELY GIVEN print ofterms&conditions. than buryingtheseimportant detailsine.g.,thefine they presentandthedataarestoring,rather accessible languagetoinformusersabouttherisks not consent. they’ll useprotectionandthentheydon’t,that’s Informed. remove yourdataatanytime. you shouldhavetherighttolimitaccessorentirely what theywanttodo,atanytime. Reversible. Anyonecanchangetheirmindabout do, theapplicationisnotconsentful. people intodoingsomethingtheynormallywouldn’t technology, ifaninterfaceisdesignedtomislead force, manipulation,orwhileincapacitated. a decisionthatshouldbemadewithoutpressure, Freely given. Behonest.For example,ifsomeonesays Consentful applicationsuseclearand Doingsomethingwithsomeoneis

* According to this REVERSIBLE In technology, In uses itonlyinwaystheuserhasconsentedto. through othermeanslikescrapingorbuying,and data theuserhasdirectlygiven,notacquired they’ve saidyestoothers. Specific. consentful. services andnotbecausetheywantto,thatis data becausetheyhavetoinorderaccessnecessary it, that’snotconsent. Enthusiastic. Ifsomeoneisn’texcited,orreallyinto Sayingyestoonethingdoesn’tmean

ENTHUSIASTIC SPECIFIC If peoplearegivinguptheir A consentfulapponlyuses

technologies? ofdigital qualities networked and definition to address the intangible How might we expand this INFORMED *

easy-as-fries-consent understanding-consent-is-as- com/post/148506806862/ plannedparenthood.tumblr. http:// from Adapted BUILDING CONSENTFUL TECH 9 TECH CONSENTFUL BUILDING 10 BUILDING CONSENTFUL TECH participates inthe making of it? Who owns the technology, and who or inequitable impacts on anyone? day to day basis. Can it have unjust of atechnology you use on a equitableand technology more just Consent Who makes it? Who is harmed? makes Who profits? Who accurate ideaofwhatyourfacelookslike. algorithms. Whether youconsentedtobeingtaggedornot,Facebook hasa98% tagged withyourfaceinitsdatabase,whichinformsfacialrecognition of complaintstomakethishappen.And,Facebook stillstoresphotosthatare which userscanapprovetaggedphotos.However, itrequired acriticalmass In responsetouseroutcry, Facebook eventuallyimplementedaprocessby consequences foremployment,housing,safety, and more. lives withouttheirconsentcouldleadtothembeingouted,whichcanhave be muchmoreserious.For transusers,taggingphotosfromtheirpre-transition if thephotowasn’tparticularlyflattering.Butforotherpeople,harmcould or notyouwereokaywithit.For someusers,thatcouldleadtoembarrassment Facebook introduced photo tagging,anyonecouldtagyouinaphoto,whether be minornuisancesforsomepeople,butcanveryharmfultoothers.When is oneimportantconsideration.Non-consentfulfeaturesandinteractionscan There aremanywaystomaketechnologymorejustandequitable,consent those whocouldbeharmed,butoftenthereisn’t. there isoverlapbetweenthosewhoworkonthebuildingoftechnologyand harassment orsurveillancearenottheownersoftechnology. Sometimes In alotofcases,you’llfindthatthosewhomightexperienceharmsuchas happen? and build the technology for this to others? Whowould need to own not negatively impacted more than experience, and some users were that everyone equitable hadan look like if it was built to ensure thinking of earlier. What would it Consider the technology you were 1

book-machine-learning/ http://fortune.com/face- zine, April13,2016. Project Ever,’ Fortune Maga- Biggest ArtificialIntelligent seconds.” ‘InsideFacebook’s 800 millioninlessthanfive person inonepictureoutof camera...[It can]identifya [aren’t] directlyfacingthe 98% accuracy, evenifthey “recognize humanfaces with ognition algorithmscan 1 Facebook’s imagerec- BUILDING CONSENTFUL TECH 11 TECH CONSENTFUL BUILDING 12 BUILDING CONSENTFUL TECH 4 DetroitCommunity Technology Project, Teaching Community Technology Handbook. 3 DetroitDigital JusticeCoalition.http://detroitdjc.org/about/story/ 2 DesignJustice Network.http://designjusticenetwork.org/ 1 OnlywithConsent.http://onlywithconsent.org/blog/consent-culture interactions andrelationships. Consentful technologybuildshealthydigitalcommunities throughconsenting know whatisbestforyourselves.” the rightoveryourownbodilyautonomiesandunderstandingthateachofyou human beings.Consentcultureisbelievingthatyouandyourpartner(s)have in aconsentculturewhenwenolongerobjectifypeopleandvaluethemas person’s responseevenifitisn’ttheyouhadhopedfor for consentisnormalizedandcondonedinpopularculture.Itrespectingthe the conceptofconsentculture.Consentcultureis“ainwhichasking Consent culture Theanti-violenceagainstwomenmovementhasgivenus other ideas.Thiszinebuildsuponthefollowingconceptsandmovements: Our thinkingaroundconsentfultechnologyhasbeenshapedbynumerous UPON BUILDS WHAT ZINE THIS healthy communities.” the digitalagebypromotingaccess,participation,common ownership,and “communication isafundamentalhumanright.We are securingthatrightfor Digital justice AccordingtotheDetroitDigitalJusticeCoalition, of consentfultech. around peoplewhocanbeunjustlyimpactedbytechnologyareacornerstone with thegoalofrestoringrelationshipsandhealingneighborhoods.” community technologyas“amethodofteachingand learning abouttechnology TheDetroitCommunityTechnology technology Community Projectdefines and communitiesbasedinconsentinginteractions. participation inthedesignprocess,ownershipandcontrol ofourdigitalbodies, decisions indesignprocesses.” practices thatcenterthosewhostandtobemostadverselyimpactedbydesign and community. TheDesignJusticeNetworkis“strivingtocreatedesign Design justice Designjusticeisanapproachtodesignthatrootedinequity an importantroletoplayincreatingaconsentculture. 3 Consentfultechnologyismodelledonequitableaccess, 2 Designprocessesthatareledbyandcentered 1 We believethatconsentfultechnologyhas . We willlive 4 • • • • • • by: tech Tech folks contribute can to building consentful • • • • • consentful tech by: Non-technology folks contribute can to building roles toplay. who aremostvulnerable.Butweallhaveimportant imagine howtocentertheirworkaroundpeople for thepeoplewhoaremakingtechnologyto building consentfultech.Itcanalsobechallenging investors toimaginehowtheycanbeinvolvedin It canbehardforpeoplewhoaren’tdevelopersor TECHNOLOGIES TOGETHER TECHNOLOGIES CONSENTFULBUILDING processes Consistently reviewing ourdevelopment intersectionality like collaborativedesignprocesses and Growing ourknowledgeon concepts mainstream techcommunities who areoftenexcludedor marginalized from Mentoring newcomers,particularlythose companies andorganizations Working towardsaculture ofconsentinour people whothosearevulnerabletoharm Opening updesign&developmentprocessesto Advocating fordiverseteams legislation Learning moreaboutcode,policies,and Signing ontoplatformsthatareconsentful demonstrations, etc.) through communityorganizing(petitions, Intervening indevelopmentprocesses legislation Advocating forconsent-focusedpolicyand how theyuseourdata Holding theplatformsweuseaccountableto

Technologists

tech. technologists in building important consentful alike have non- and roles to play BUILDING CONSENTFUL TECH 13 TECH CONSENTFUL BUILDING 14 BUILDING CONSENTFUL TECH were asked: of code, the following questions What if, before writing asingle line designed with consent at their core? most reliant upon look if they were How might the technologies we are up ground Consent from the for thosewho needthesebenefitsmost. register withtheseonlineservices isnotanoption access socialservicebenefits online.Decliningto they prefertouseit?Inmany placesonecanonly technology, whichmeansthatpeopleuseitbecause Enthusiastic? Isthereanoptionnotto use this How arewemakingsurethattheconsentis conditions? exposed toburiedinthefineprintofterms& information abouttherisksausermightbe about whatthey’reconsentingto?Isimportant How arewefullyandclearly and theirdata? easy isitforpeopletowithdrawboththeirconsent Does oursystemallowfor consent? a personbedisplayedorstoredwithouttheir potentially harmfulpersonalinformationabout access andstorepartsoftheirdigitalbodies?Can Are peopleFreely givingustheirconsentto Reversible Informing people consent?How We canandmustdobetter. foreground theconcernsofuserswhocouldbeseverelyandunjustlyimpacted. when wefailtodesignwithconsentinmindfromthegroundup,and platforms wereintending,buttheydoillustratetheharmthatcanhappen These areobviouslynottheusecasesdevelopersandownersofthese extremely difficulttodeletetheseimagesoncetheyhavebeendistributed. who haveexperiencedviolenceandperpetuatesinourculture.Itis been usedtocirculateimagesofactssexualviolence,whichre-harmspeople to bedesigned.Popular photoandvideosharingplatforms,forinstance,have serious harmcanhappen.Itoftentakesmultipleinstancesofforapatch When technologyisbuiltwithoutaskingthesequestionsfromthebeginning, and havestored? people selectwhichaspectsoftheirdigitalbodiestheywanttohaveexposed Can peopleconsentto could bestored encrypted,withthedecryption keysresidingonlyon yourown lower thetrustbarrierforthat system.For example,yourpersonalinformation We candobetter. Bydesigningthe systemsocertainthingsareimpossible,we your consent. to additionalrisk)itisstill an acttakenuponpartofyourdigitalbodywithout dating services)orseeminglybenign(addinganewfeature thatexposesyou didn’t intend,andwhetherthat’smalicious(usingyour profilepictoadvertise see itincaseswherecompaniesmakeuseofyourdigital bodyinwaysyou private photosetc)areexposedpubliclyorsoldtothe highestbidder. We also of digitalbodies(passwords,creditcardinformation, medical information, acknowledging thoserisks.We seethisindatabreaches,whereintimate details Historically speaking,technologyprovidershavedone apoorjobof with yourphysicalbody. decisions youmakeaboutwheretotravel,stay, andhowtogetthere are involvedinitsactivities,soyoucanmakeinformeddecisions,justlikethe You shouldhaveagoodunderstandingoftheriskstoyourdigitalbodythat be atrestinadatabase,socializingthecloud,ortravelingthroughtubes. Unlike ourphysicalbodies,adigitalbodycanbeinmanyplacesatonce.It RISK WITH DEALING Specific

thingsinthissystemandnotothers?Can BUILDING CONSENTFUL TECH 15 TECH CONSENTFUL BUILDING 16 BUILDING CONSENTFUL TECH applications inamore Taken totheirlogicalconclusionthesetechniquessuggestbuildingour automatically, withaserviceworkerorexternalmonitor). an immutablelocation,anycompromiseofthepageis detectableeasily(and refuse toloadanycompromisedcode.Bythenpublishing thecode’shashin by usingsubresourceintegritytolockthecodeonaweb page,thebrowserwill those claims,andinvalidatethemwhentheyarecompromised. For example, Creating aggregation tohappenwithoutneedingdecryptthedata. 3 http://scuttlebot.io 2 https://crypto.stanford.edu/craig/craig-thesis.pdf https://www.cis.upenn.edu/~aaroth/Papers/privacybook.pdf 1 A techniquecalled IDEAS FOR TECHNICAL MECHANISMS use software,andhowwecanmakeitsafermoreaccessibleforeveryone. starts byhavingthisconversation.Let’stalkabouthowriskyitcurrentlyisto developers, industrygroups,advocatesandusersallworkingtogether, andit based riskwouldhelptoo.Thisisabigproblem:itrequiressoftware rest, intransitandduringprocessing.Additionalstandardsforfunctionality- educate usersaboutthem.Let’sbuildindustrystandardsforreportingrisksat If wecan’tmakeitsaferthencanacknowledgetheremainingrisksand is requestedforeachoperation. devices. Theapplicationsendsdataandcodetoyourdevice,consent Homomorphic encryption levels ofencryptionischallenging,butcancreatestrongsafetyguarantees. encrypted ontheirdevice,butusingitbecomesunwieldy. Balancingthe Modern encryption techniques allowauser’sinformationtobefully which inmanycasescandramaticallyreduceriskexposureforsensitivedata. likelihood ofnegativeimpactandalsoawaytointroduceplausibledeniability, to youanddirectlycontrol howtheyinteractwithyourdata. longer spread throughout servers ontheinternet; instead the applications come processing, theserverscandolesswork.Inthismodel yourdigitalbodyisno bar forsecurity, butalsohelpswithscaling:ifeveryoneissharingsomeofthe falsifiable security claimsallowsindependentanalyststovalidate differential privacy decentralized 2 canallowcertaintypesofprocessingor 3 way, whichnotonlyprovidesahigher 1 providesawaytomeasurethe “Is it“Is cool if you dancing this video of with that hot does not stop at the first yes. The process of asking for consent process Consent is ongoing an I Snapchat dog?”

manage ongoinganddirect consentprocesses? technologies wouldweneed tobuildhelpus in withyoufromtimeto aboutit?What of photosorcontactinformation, weretocheck access toyourdigitalbody, whether intheform experience oftheInternetshiftifpeoplewhohad interaction, isastrongpractice.Howmightyour asking peopledirectly, asonewouldinaphysical impacted whoarenotusers?We havefoundthat of userstoeachother. Whataboutpeoplewhoare only requiretheconsentofausertosystem,or This isbecausemanyofthetechnologieswerelyon open GoogleSheethaspotentialexposure. who hastheirnameandemailaddressaddedtoan consent ontheirplatform:forexample,anyone holders aren’ttheonlyonesimpactedbynon- to, whichisagoodstart.ButGoogle’saccount check-ins withusersaboutwhatthey’veconsented Platforms likeGoogleareincorporatingperiodic time. consent wasprovidedforanindefiniteperiodof Facebook profile—should notimplythatthe it’s ahugorlinkingyouruseraccountwith Saying yestoaninteractiononce—whether BUILDING CONSENTFUL TECH 17 TECH CONSENTFUL BUILDING 18 BUILDING CONSENTFUL TECH to statesurveillance? people fromcommunitiesthatareregularlysubject privacy andsecurityofsurvivorsviolence?Of process looklikeifitwascenteredaroundthe to thosefeaturesbeingreleased.Whatwouldthat harm —wemustalsoiteratetheprocessthatlead It isn’tenoughtoiteratefeaturesinresponse harm forAlexausers. doxed orstalked,andmayhavedirectlyleadto raises immediateredflagsforanyonewhohasbeen which didnotallowforblockingcallsortexts.This the releaseofAlexaappforAmazonEcho, the livesofpeopleusingthosefeatures.Consider experiments notonlywithfeaturesbutalso negatives impacts.Thefailfasterapproach positive impacts,itdoesnothingtodiminish Unfortunately whilethisprocesscanincrease get therightfeatures. with somethingsimpleandexperimentinguntilyou value ofyourapplicationtousers,bystarting iterations.Thisisagreatwaytooptimizethe world quicklyandrespondingtouserfeedbackin these days.Itmeansputtingsomethingoutintothe “Fail faster”isamaximofapplicationdevelopers PROCESS EQUITABLEAN ITERATION accountability relies on community and Consent assault laws.Often itisthepersonwhoexperienced theharmwho isblamed with thisapproach mirrorthosethatare rampantinenforcementof sexual punishments forpeoplewho arecommittingviolenceonline.Buttheproblems knowledgeable aboutcurrent technology, andforlawmakerstocreateharsher Some peoplehavecalledfor policedepartmentstobecomemore image frombeingpostedby othersandtootherplatforms. harassing others.Reporting animagethatis harmfultoyoudoesnotstopthat enough. Blockinguserswhoareharassingyoudoesnot easilystopthemfrom accountability mechanismsavailableinmosttechnologies arenotgood Accountability meansbeingheldresponsibleforyour actions. The APPROACH ACCOUNTABILITY COMMUNITY A communities. users interactwitheachother. Digitalcommunitiescan overlapwithphysical and worksonthetechnology. Anothertypeofcommunityiscreatedwhen for aservice—asusers,theyarenowinrelationshipwithwhoeverowns community ornetworkiscreated.Onetypeformedwhenpeoplesignup Whenever therearemultiplerelationshipsbetweenpeople,atypeof More andmore,ourdigitalbodiesexistinnetworkscommunities. DIGITAL COMMUNITIES accountability are critical inaddressing harm. actions will not happen. This is why community and these measures can’t guarantee that non-consensual more consentful technologies. But implementing We have talked alot about what we do can to build

ful technology BUILDING CONSENTFUL TECH 19 TECH CONSENTFUL BUILDING 20 BUILDING CONSENTFUL TECH 1 http://www.incite-national.org/page/community-accountability harms thattheirbiasescause? change thewaythatcreatorsofalgorithmsareheld accountableforthe in question,aswellpeoplewhomightbeimpacted byit?Howcouldthis look like?Howwoulditworkforbothpeoplewhoare usersofthetechnology What wouldacommunityaccountabilityapproachto digital communities This iswhatmeantbycommunityaccountability. responsible toeachotherasindividualswellmembersofacommunity. whether theharmisinterpersonalorcausedbyalgorithms.Sowemustbe is animpactonboththatpersonandthecommunityasawhole.Thistrue When weactharmfullyagainstothers,whetheritisintentionalornot,there technologies? What ifwebuiltcommunity-basedresponsestoharmandviolenceintoour people andmore,policeprisonsarekeyvectorsofviolenceindailylife. troll? And,forBlackandIndigenouspeople,racializedimmigrants,LGBTQ — whydidyousendnudephotostoyourex,ordidn’tjustignorethat • • • • neighborhood, etc—worktogethertodothefollowingthings: of friends,afamily, achurch,workplace,anapartmentcomplex, Community accountabilityisaprocessinwhichcommunity—group police/prison-based strategy, toaddressviolencewithinourcommunities. strategy,Community accountabilityisacommunity-based rather thana targeted thatrespectstheirself-determination Provide safety&supporttocommunitymemberswhoare violently oppression andviolence the communityitself, totransformthepoliticalconditionsthatreinforce Commit toongoingdevelopmentofallmembersthecommunity, and transform theirbehavior behavior, creatingaprocessforthemtoaccounttheiractionsand Develop sustainablestrategiestoaddresscommunitymembers’abusive encourage safety, support,andaccountability Create and affirm values & practices that resist abuse and oppression and 1 AND COMMUNITIES IN DIGITAL RELATIONSHIPS TO EACH OTHERCONNECTED DIGITAL BODIES ARE

interactions to involveusinsteadofacting uponus. restore autonomy toourdigitalbodies,allowing its ownlogic,protectedby encryption, wecould lacks agency. Bybinding thatdataintoacellwith that makesupourdigitalbodies ispassiveand all thecontrolisinenvironment, andthedata intermediated by theserverstheyinhabit. Currently Our digitalbodiesinteractwitheachother, BUILDING CONSENTFUL TECH 21 TECH CONSENTFUL BUILDING 22 BUILDING CONSENTFUL TECH by yourfriendssoyouwon’tseethem. they’ve beenaroundawhile,ormessagesmentioningyoucouldbedownvoted to helpeachother. For example,newusersmighthaveaquietervoiceuntil pathways usedforabusivebehaviour, andwhenwemakeiteasierforpeople Small changescanmakeabigdifferencewhenweaddlittlefrictionto • • • strengthen theircommunitiesandimproveconsentthereinbyasking: is thecaseinphysicalcommunitiesaswelldigital.Usersandmakerscan When attentionispaidtorelationships,strongercommunitiesresult.This TECHNOLOGIES CONSENTFUL TO MORE RISE GIVE COMMUNITIES STRONG normalize askingforconsentonourplatform? How we can better support uplift and each other? Howcanwe that workontherootsofissue? some community-basedstrategiesforaddressingnon-consensualactions How we can hold each other accountable asacommunity? Whatare barrage alone? messages, sothepersonwhoistargeteddoesnothavetodealwith way tohaveothercommunitymembersseeandrespondharassing How we can better protect each other? For example,isthereatechnical consent culture moves us towards Consent are blamed. are is the users who pay the price, and often the users who from users, which means when that trust is violated it security intechnology requires active participation Currently, achieving some measure of privacy and world tosharein. our applications and data; it is about creating a culture of consent for the entire the typeofculturewelivein.Buildingconsentfultechnology isnotjustabout many ofourdailyinteractions,itplaysanincreasingly largepartinestablishing or askingwhetherasexualactivityfeelsokay. With technologymediating so whether it’saskingbeforegoinginforahug,checking inabouttakingaphoto, in whichaskingforconsentpermeatesallourinteractions smallandlarge— We seean alternativetothisinconsentculture.Consentcultureisa the consequences. the burdenofsafetyonusersintermswhoisresponsibleandsuffers Just asweshouldnotblamesurvivorsforsexualviolence,mustplace able topaythatcostarealsothosemostatriskofharmwhenthingsbreak. The costofinteractingwithtechnologysecurelyisquitehigh,andthoseleast ful

technology BUILDING CONSENTFUL TECH 23 TECH CONSENTFUL BUILDING 24 BUILDING CONSENTFUL TECH Resources https://www.troll-busters.com Troll Busters https://www.holdyourboundaries.com Hold Your Boundaries project http://www.incite-national.org INCITE! http://www.crashoverridenetwork.com Crash Override Network PROJECTS & ORGS https://detroitcommunitytech.org/teachcommtech Detroit CommunityTechnology Project Teaching Community Technology Handbook Edited byCindyCrabb.Chico,CA: AKPress,2016. Learning Consent: Good OnHealthy Relationships Survivor and Support Community-Report-7-24.pdf https://www.odbproject.org/wp-content/uploads/2016/12/ODB- Our DataBodiesProject2016Report ParanoiaFrom to Power http://designjusticenetwork.org/zine Design JusticeNetwork Design Justice Zine Rebecca MacKinnon.Lebanon,IN:BasicBooks,2012. Consent of the Networked: The Worldwide Struggle for Internet Freedom READING

Who wrote this? computers, andtocomputersaboutpeople. Dann spendsalotoftimetalkingtopeopleabout design facilitator, andadesignjusticeadvocate. Tool. Unaisadesignpractitioner, acollaborative who aretheteambehindRippleMapping This zinewaswrittenbyUnaLeeandDannToliver, http://bit.ly/2yXQaZy zine. To sendfeedback,pleasevisit We welcomeyourcommentsonthis FEEDBACK? BUILDING CONSENTFUL TECH 25 TECH CONSENTFUL BUILDING 26 BUILDING CONSENTFUL TECH Graphic Design: And AlsoToo participants —you were the spark that inspired this all. Thank you also to the Difference Engine Initiative the content of this zine. Erin Toliver, Tyler Sloane, and Alex Leitch for reviewing Thanks to Shameela Zaman, Lupe Pérez, Hisayo Horie, and insights about consent. Conference family for generously lending your time Much gratitude to the extended Allied Media Foundation. support from Allied Media Projects and the Mozilla This zine would not exist without funding and moral Acknowledgments of this zine, please visit To download aPDF ripplemap.io/zine Consent must be...

REVERSIBLE

FREELY GIVEN

INFORMED

ENTHUSIASTIC

SPECIFIC