#rC3 - Hacking Diversity: The Politics of Inclusion in Open Technology Cultures
-
0:05 - 0:12rc3 preroll music
-
0:12 - 0:19Herald: All right, so our next talk is
called Hacking Diversity, where we -
0:19 - 0:24basically try to treat a really awkward
question about these spaces that we move -
0:24 - 0:29in here, which is that we really have
these ideas about inclusion and diversity. -
0:29 - 0:33But in the end, most of the people that
come just look like me. And in open -
0:33 - 0:38source, most people look like me. And this
is extremely strange, right? Because we -
0:38 - 0:43have all these ideas about diversity and
everything. And today we try to answer the -
0:43 - 0:47question of why this happens and maybe
what we can do about it. Our speaker for -
0:47 - 0:52this is Professor Christina Dunbar-Hester.
She's a professor at the University of -
0:52 - 0:56Southern California, I think. And today
she is preparing, uh, she is showing -
0:56 - 1:01essentially a condensed version of a book
that she just wrote, called Hacking -
1:01 - 1:05Diversity. And I'm really looking forward
to this talk because I also have asked -
1:05 - 1:08myself these questions and I don't know
the answers. -
1:08 - 1:10So I'm looking forward to this.
Please Christina. -
1:10 - 1:14Professor Christina Dunbar-Hester: Thank
you so much. Thank you for the -
1:14 - 1:19introduction and thank you for the
invitation and thank you for all of your -
1:19 - 1:25labor to get this remote experience off
the ground. So I'm really happy and -
1:25 - 1:36excited to be here, whatever that is. And
I will get into the talk. Let's see here, -
1:36 - 1:46OK. Let me know, you should be able to see
slides now. If that didn't work, let me -
1:46 - 1:53know. OK, thanks. This is not a best
practices talk so much as a first -
1:53 - 2:00principles and how did we get here talk?
My examples are mostly from the US, but -
2:00 - 2:10they are part of a broader Euro-American
milieu. And so to get started, I think I -
2:10 - 2:19want to put up this quote from the Free
Software Foundation from 2012. And the -
2:19 - 2:25goal of this talk is really to give some
context. And I think at the almost very -
2:25 - 2:32end of 2020 it's safe to say that this is
a fairly mainstream and uncontroversial -
2:32 - 2:36topic, but it wasn't always this way. So
the quote says: "The free software -
2:36 - 2:41movement needs diverse participation to
achieve its goals. If we want to make -
2:41 - 2:46proprietary software extinct, we need to
make everyone on the planet engage with -
2:46 - 2:52free software. To get there we need people
of all genders, races, sexual orientations -
2:52 - 2:59and abilities leading the way. And as I
said, I think this is a very recognizable -
2:59 - 3:04sort of discourse now, but it hasn't
always been. And I'm going to sort of -
3:04 - 3:10unpack this for a little while. The
outline of the talk, this is a pretty bare -
3:10 - 3:16bones outline, but there's going to be a
lot of sort of history and context and -
3:16 - 3:21then a little bit about the value and goal
of diversity and how it relates to profits -
3:21 - 3:28and markets and also the goal of diversity
and how it relates to other values, -
3:28 - 3:33particularly justice. And I want to note
that there's a couple of content warning -
3:33 - 3:40slides on here. One, for people who have
been involved in promulgating genocide and -
3:40 - 3:46another for a person who's been ejected
from hacking for abusive behavior. And so -
3:46 - 3:55there will be a warning preceding each of
those. OK, so first, talking about -
3:55 - 4:03genocide. In the 19th century in the
United States and even into the 20th -
4:03 - 4:13century, there was an idea of a sort of
frontiersmen, brawny man who you can see -
4:13 - 4:17here. This is a folk hero, but was
important enough to still be being -
4:17 - 4:22represented on television in the 1960s.
And the sort of consistent thing -
4:22 - 4:28here is going to actually go, this is the
genocide one, to these sort of consistent -
4:28 - 4:32representations. You can see these folks
are wearing, well, they're men and they're -
4:32 - 4:37being manly and they're wearing animal
hide with the implication that they maybe, -
4:37 - 4:44you know, shot the deer themself. They
carry a gun, they're in naturalistic -
4:44 - 4:58settings. They're sort of rough and ready
for anything. I'm drawing here on -
4:58 - 5:04historian Susan Douglas, who argues that
around the turn of the 20th century, -
5:04 - 5:10society started to change. And so even
though there was still this mythos of this -
5:10 - 5:15brawny frontiersmen, what society actually
needed was a reconfigured masculinity that -
5:15 - 5:23didn't sort of have this rough physical
brawny masculinity. And so masculinity -
5:23 - 5:30itself, she says, was reconfigured to what
she calls technical masculinity. And so -
5:30 - 5:39the masculinity was sort of refashioned to
be about mastery over machines and -
5:39 - 5:43particularly these sort of new cutting
edge electronic machines, which in this -
5:43 - 5:51case was radio. So radio experimentation
in the very early 20th century, first -
5:51 - 5:57wireless telegraphy and then later
wireless sound transmission, which became -
5:57 - 6:03broadcasting, she argues, is a way to sort
of refit masculinity or the way the -
6:03 - 6:09society was changing. It was more urban.
There was more specialized division of -
6:09 - 6:15labor needing people to work in a
professional white collar fields with -
6:15 - 6:20technology as opposed to going out and
settling the West. And so here we see -
6:20 - 6:26technical, technical masculinity,
entrainment basically, a father with his -
6:26 - 6:36very young son teaching him this is a way
to be in the world. And Douglas argues -
6:36 - 6:41that this started with ham radio in the
early 20th century. But perhaps -
6:41 - 6:47unsurprisingly, it continued to sort of
persist over time. And so my next few -
6:47 - 6:52slides are showing the same technical
masculinity, which is about, you know, -
6:52 - 7:00curiosity, solving a problem, you know,
expressing your will with technology only -
7:00 - 7:06with different sorts of technical
artifacts. And so here this is the Model -
7:06 - 7:12Railroad, made very famous in Steven
Levy's book about hackers. We also have, -
7:12 - 7:17and this is probably about the 1950s.
We have phone phreaking in the 1960s -
7:17 - 7:22and here this is also a 2600
magazine from the 80s, sort -
7:22 - 7:29of continuing to mythologize phone
phreaking. Going into the 70s, we -
7:29 - 7:33see this with computers, the Homebrew
Computer Club, a really important hobbyist -
7:33 - 7:41formation for both, you know, the history
of Silicon Valley, but also the history of -
7:41 - 7:44hacking and free software. It was people
who were sort of building and tinkering -
7:44 - 7:50and experimenting. And so what we're
starting to see here is even as the tech -
7:50 - 7:56shifts, the technical masculinity stays
consistent. And this is probably the early -
7:56 - 8:0480s and the slide is just an ad for a
microcomputer. But we can see not only the -
8:04 - 8:10representation of masculinity at the
center, we also see femininity in relation -
8:10 - 8:17to the technology, which is to say it's
just the sort of ancillary handmaiden for -
8:17 - 8:24the sort of male agent here. And as I
said, this is certainly a really cheesy -
8:24 - 8:32ad, but I think, I hope underscores the
sort of consistent promulgation of this -
8:32 - 8:38relationship with technology. And so I
want to suggest is that tech here over the -
8:38 - 8:4620th and into the 21st century is not just
reflecting a legacy of division, of which -
8:46 - 8:53gender prescription, gender roles are a
part of this, but is actually actively -
8:53 - 8:59been involved in enforcing this. And so
we've got basically a white patriarchal, -
8:59 - 9:07Christian, native-born supremacy, and a
global system of racial capitalism. And so -
9:07 - 9:11I've shown you who's sort of at the top of
this hierarchy. We've got colonized -
9:11 - 9:18subjects, immigrants, women, rural and
lower class people, indigenous people -
9:18 - 9:23coming out on the bottom. And both
builders and consumers of tech are -
9:23 - 9:31implicated in this tension. OK, so going
back even further in the history to sort -
9:31 - 9:36of where some of this comes from. I'm not
sure how many of you thought that in a -
9:36 - 9:40discussion of hacking you'd be looking at
a 19th century American oil painting. But -
9:40 - 9:45here we are. This is called American
Progress. So I think mythologized American -
9:45 - 9:52progress from the late 19th century. And
as you can probably see, there's a real -
9:52 - 9:57sort of light to dark element of the
photo, of the picture, the painting. And we -
9:57 - 10:05have this maiden who's really not so much
a person, but more like a God, this is -
10:05 - 10:13sort of Greek iconography, sort of up
above everyone, up above man. And we do -
10:13 - 10:19see technology in the painting. We see
the railroads and some ships on the right -
10:19 - 10:25hand side, which is the east. And so you
can tell that she's sort of presiding over -
10:25 - 10:28everybody, settling the west. And again,
they're bringing the light, which is -
10:28 - 10:33civilization. The maiden herself is
actually carrying a book which symbolizes -
10:33 - 10:38knowledge and what may not be obvious, but
she's actually got telegraph wire strung -
10:38 - 10:45around her arm. And then you can see the
telegraph pattern behind her. And so this -
10:45 - 10:53control over technology is part of how
white settler, you know, newly arrived -
10:53 - 10:59Americans are maintaining or sort of
promoting and maintaining dominance over -
10:59 - 11:03their new continent, their new continent.
And you can actually see, so we've -
11:03 - 11:08got these white settler folks in the
center of the painting. All the way in the -
11:08 - 11:12dark are indigenous people. And there's
also actually a bear. So they're sort of, -
11:12 - 11:20again, a biblical hierarchy of man over
the beasts. And you can tell that the -
11:20 - 11:23indigenous subjects and the bear are
probably either going to get run out of -
11:23 - 11:30the frame or sort of forced to become
civilized. So this is very deep in how -
11:30 - 11:39American sort of hierarchy and notions of
dominance get promoted and, you know, sort -
11:39 - 11:46of renewed over time. And this is
interesting because this ideology is so -
11:46 - 11:52strong that it's actually succeeded in
basically erasing some of the historical -
11:52 - 11:58record. Like, for instance, we know that
there were women, highly skilled women -
11:58 - 12:05operators in World War 2 operating the
first electronic computers. This is ENIAC -
12:05 - 12:11in the US. But they were still, they were
sort of written out of the record and -
12:11 - 12:20computing, once it became popular and moved
out of a top secret military project, the -
12:20 - 12:28womens' roles were basically effaced and
credit for dominance over and sort of -
12:28 - 12:34control over the new technology publicly
went to men. And again, so we see this -
12:34 - 12:38sort of sorting happening in all these
different ways, even in defiance of the -
12:38 - 12:46actual historical record. Another
instance, which may be kind of surprising -
12:46 - 12:52is this is a really wonderful article by
Lisa Nakamura that I'm drawing from here. -
12:52 - 13:02This is a Fairchild Semiconductor, so
they're based in Silicon Valley, they used -
13:02 - 13:08to make microchips and associated
equipment in Silicon Valley, but they had -
13:08 - 13:14an intermediate period before outsourcing
that stuff to Asia, where they opened -
13:14 - 13:21operations on a Navajo reservation in the
American Southwest. And so there's really -
13:21 - 13:28interesting ways in which race and gender
basically become resources for valuing the -
13:28 - 13:34labor of some kind of people more and
other kinds of people less. So this -
13:34 - 13:40reservation is attractive because regular
American labor laws didn't obtain and they -
13:40 - 13:48also, managers in their minds, thought, oh
there's this history of Navajo weaving and -
13:48 - 13:55sort of fine fabrication work. And so
there's a sort of stereotype that nonwhite -
13:55 - 14:03people, particularly women, particularly
in this day and age, Asian, have "nimble -
14:03 - 14:08fingers" and are going to be really good
and diligent at something that we need, -
14:08 - 14:13like electronics assembly, to be really
sort of diligently done. And so what we've -
14:13 - 14:22got here is the sort of overlay of Navajo
weaving and microchip. So Nakamura calls -
14:22 - 14:28this insourcing, sort of outsourcing
before outsourcing. And, you know, now -
14:28 - 14:32those laboratories and factories have
mostly moved to Asia. But this sort of -
14:32 - 14:39period of experimentation with trying to,
like, alienate the labor from the sort of -
14:39 - 14:43managerial home. And so now we would
think, like, you know, your Apple products -
14:43 - 14:48as assembled in China, designed in
Cupertino or whatever. But that kind of -
14:48 - 14:55thing, this is a sort of early moment of
that. And so, again, I want to sort of -
14:55 - 14:59underscore that race and gender are a
resource for global capitalism to assign -
14:59 - 15:05worth to some people's bodies and work and
not to others. Another way that this -
15:05 - 15:10works, I don't know how much people in the
US will remember this, let alone outside -
15:10 - 15:15of the US, but this is a student, a high
school student who is a Sudanese American, -
15:15 - 15:23I believe, who was, you know, a geek. And
he was enthusiastic about doing a DIY -
15:23 - 15:29electronics assembly at home where he
built a clock and he brought it to school -
15:29 - 15:35and the school called police. And so here
we can see that whiteness has been a -
15:35 - 15:41resource for avoiding criminalization for
certain kinds of sort of hacky -
15:41 - 15:46activities. I'm certainly not saying that
no white people have been criminalized for -
15:46 - 15:52hacking because that's not true. But
certain activities get more of a pass -
15:52 - 15:57based on who's participating in them. And
I also want to point out that this legacy -
15:57 - 16:06of division and this system of social
sorting is flexible. In 2015, it -
16:06 - 16:15could easily be turned to islamophobic
purposes, which is what happened here. And -
16:15 - 16:20so what I want to point out is there's
a sort of like, you know, history of -
16:20 - 16:26division and really sort of policing who's
in bounds and who's out of bounds for the -
16:26 - 16:34most celebrated category of technological
agent, but I also want to sort of -
16:34 - 16:41introduce the idea that this is not
inconsistent in a way with diversity as a -
16:41 - 16:49market value. Capitalism is actually happy
to affirm difference if it can help sell -
16:49 - 16:54something, even though here we also see
the sort of, you know, cultural and even -
16:54 - 17:03legal system being brought to bear to
punish certain forms of difference. OK, so -
17:03 - 17:06at this point, this kind of statement is
really ubiquitous. This is from 2012 from -
17:06 - 17:13a TechCrunch post. In my mind, the
women in tech discussion should really be -
17:13 - 17:17framed as having different people with
different experiences and different -
17:17 - 17:23outlooks helps you build a better product.
So this is a pretty different framing of -
17:23 - 17:30difference than the one I just showed you.
But the point is capitalism is -
17:30 - 17:36actually able to sort of reconcile these
in these contradictions in a way. And you -
17:36 - 17:41can also see this is my name tag from a
Google sponsored event I attended for work -
17:41 - 17:47for this book. And they're not only saying
we need women to help us build a better -
17:47 - 17:53product, they're also reflecting back this
sort of symbol of femininity, you know, the -
17:53 - 17:57pink Venus sign, which, of course, turns a
lot of people off. But it's you know, if -
17:57 - 18:03you're thinking about marketing, it's a
way to symbolize this inclusion. Right? -
18:03 - 18:10Now, I'm going to put up the only horribly
academic slide I have for the whole talk. -
18:10 - 18:16This is a quote from Herman Gray who says,
"Abstract notions of rights and freedom -
18:16 - 18:22and their expansion to new subjects elide
the social salience of race and gender as -
18:22 - 18:26a basis of inequality even as it
culturally recognizes and celebrates -
18:26 - 18:32differences." So here we can see the
market is happy to recognize and celebrate -
18:32 - 18:40difference, to sort of take up, you know,
women in tech or whatever, while sort of -
18:40 - 18:47papering over and doing nothing to unseat
the sort of core, which is that race and -
18:47 - 18:53gender are bases of inequality. So you can
sort of have this lip service, abstract -
18:53 - 19:00expansion of, you know, new identities.
But what is sort of always intact is even -
19:00 - 19:04if you're sort of bringing one group over
and saying, oh, you know, you're part of -
19:04 - 19:12the dominant group, now, in some way.
The system of sorting is remaining intact -
19:12 - 19:18and in a less abstract way. Like in the US
this summer, there is huge Black Lives -
19:18 - 19:24Matter protests, uprisings. And pretty
quickly, all these companies started -
19:24 - 19:29saying, oh, yes, Black Lives Matter, we
support this. You know, Amazon was really -
19:29 - 19:35prominent among them. And yet Amazon
doesn't stop to question whether or not -
19:35 - 19:40it's exploiting racialized workforce
during Covid with warehouse work and -
19:40 - 19:45delivery work. These are some of the
lowest paid workers. They are not getting -
19:45 - 19:51health insurance. They're not getting
consistent hazard pay or protection. And -
19:51 - 19:57they're dying at disproportionate rates.
But Amazon is very happy to say black -
19:57 - 20:04lives matter as part of the PR. Similarly,
they're still basically building -
20:04 - 20:11surveillance equipment, but there's no
inconsistency between the sort of -
20:11 - 20:16recognition and celebration of difference
while working to continue to cement that -
20:16 - 20:23difference and exploit that difference.
So all of this is to say is that diversity -
20:23 - 20:32is, in my opinion, a rather toothless
value to sort of attach to the work and -
20:32 - 20:39the sort of meaning for what's at stake
with working with tech and with inclusion, -
20:39 - 20:44too. Diversity can sort of bring
our attention to these patterns of social -
20:44 - 20:48difference. But if it ends there, it can
actually kind of draw us in the wrong -
20:48 - 20:55directions without the tools we might need
to, you know, actually make some of the -
20:55 - 20:59more justice affirming points that I
think are why people are drawn to these -
20:59 - 21:05topics in the first place. OK, so after
this digression, getting more some into -
21:05 - 21:11how this relates to hacking and free
software. So I've established a sort of -
21:11 - 21:18legacy of division. And I want to sort of
underscore that the hacking and free -
21:18 - 21:24software milieu has had this commitment to
freedom and openness. That's definitely -
21:24 - 21:31been at the core pretty consistently. But
historically, this has really had to do -
21:31 - 21:36with, the freedom and openness has been
about controlling technology, some free -
21:36 - 21:43speech of course. It's definitely about
the individual's exercise of freedom -
21:43 - 21:47without necessarily a lot of thought about
who the individual is, who's maximally -
21:47 - 21:56empowered to be free, or it's been about
individuals in collectives, but that are -
21:56 - 22:02relatively small and relatively
homogenous. And so what I want to suggest -
22:02 - 22:08is this sat within the bigger context of
tech and division, but without really -
22:08 - 22:14acknowledging this, because the freedom of
the individual was presented as a sort of -
22:14 - 22:20universal value. Even though in practice
it really, really wasn't. And I think -
22:20 - 22:26around 15 to 20 years ago that really
started to change. When I started working -
22:26 - 22:32on this project, there was already a good
deal of agitation forming some of these -
22:32 - 22:39groups in free software and related
projects to especially draw attention to -
22:39 - 22:46the sort of disparities around women and
Py Star was initially for sort of women, -
22:46 - 22:51and it was was trans-inclusive and I think
pretty quickly this started as a women, -
22:51 - 22:58but then it became often non-binary and
trans-inclusive, so not the sort of -
22:58 - 23:03essentialist version of women. Something
happened in 2006 that really caused this -
23:03 - 23:11topic to really spring to the fore in a
lot of these communities. There was an EU -
23:11 - 23:18policy report that came out. So the
research was from 2004/2005 that showed -
23:18 - 23:26that the rate of participation by women
and FLOSS was less than 2% and that was -
23:26 - 23:31significantly less even than academic and
proprietary computer science. And so that, -
23:31 - 23:37I think, really shocked people who had
maybe sort of intuitively known, oh, yeah, -
23:37 - 23:44this isn't very representative, but that
number really galvanized a lot of -
23:44 - 23:51conversations and got people started
talking and organizing basically in new -
23:51 - 23:56ways. And so I'm now going to show just a
handful of sort of what this report -
23:56 - 24:05caused, which is a bunch of conversations.
This is from the hackers on planet Earth -
24:05 - 24:12Hope Conference in New York in 2006. And
it may not totally be clear what's going -
24:12 - 24:20on here, but some folks had responded to
this statistic on the one hand and this -
24:20 - 24:28quote from this United States senator who
had said something like, sort of gibberish -
24:28 - 24:33about he was supposed to be considering
net neutrality and internet regulation, -
24:33 - 24:37and he said something like, the internet
is a series of tubes. It's not a truck -
24:37 - 24:42that you dump something on. And everybody
was making fun of him for not even, you -
24:42 - 24:48know, understanding networked computing at
all. But these activists sort of put these -
24:48 - 24:53together in a sort of mash-up. And they
were selling t-shirts, actually, that said -
24:53 - 24:58"The Internet: A Series of Tubes". And as
you can see, that's a sort of textbook -
24:58 - 25:03representation of a female reproductive
system. And so they just sort of brought -
25:03 - 25:08this to the conference and they were
trying to force a conversation about it -
25:08 - 25:12because they estimated, this is not an
official count, but they estimated that -
25:12 - 25:19there were maybe, the ratio of women to
men at Hope was like 1:40. And so they -
25:19 - 25:25just wanted to force a conversation about
this. This is an artifact from a little bit -
25:25 - 25:33later, 2014, about the rise of explicitly
dedicated feminist hacker spaces, and this -
25:33 - 25:40is from the US and it's just a flyer for a
Zine-making workshop, which is again, a -
25:40 - 25:47pretty mundane thing, but just the sort of
difference between the 2006 sort of flag -
25:47 - 25:51planting and something a bit later where
there's actually a separate space here. -
25:51 - 25:58And crucially, Zine-making isn't
necessarily in bounds with traditional -
25:58 - 26:06hacking, but it is closer to sort of
strands of feminist consciousness raising -
26:06 - 26:12and riot grrrl. And so there's a sort of
intermingling of these different kind of -
26:12 - 26:19threads of DIY, basically. This is another
artifact from someone in Philadelphia who -
26:19 - 26:26was an artist and a designer and was
trying to find a way from the stuff that -
26:26 - 26:34she knew how to do with craft and sewing
and find a way into electronics and soft -
26:34 - 26:43circuits and doing new things. And so she,
kind of for her own exploration, knitted a -
26:43 - 26:50scarf using Ethernet cables. And for
her this was a kind of speculative object -
26:50 - 26:55that was meant to help her find her way
into electronics, but also to kind of -
26:55 - 27:02start conversations about why haven't
these things gotten together. Also seeing -
27:02 - 27:12gatherings like this one, a more sort of
explicitly radicalized feminist hacking -
27:12 - 27:16convergence. And I don't know if everybody
can read all the text, but it says -
27:16 - 27:21"Trans Futuristic Cyborgs, anti-racist,
anti-sexist, gynepunk, DIY-DiWO - so taking -
27:21 - 27:33DIY of a sort of heroic individualist to
doing it with others, making it more -
27:33 - 27:39self-consciously collective and less
individualist self-reliant. It also says -
27:39 - 27:44gender-hacking, anti-capitalism, libre
culture, technologies, bio-hacking. So -
27:44 - 27:53again a sort of spectrum of politics and
interventions around hacking and feminist -
27:53 - 28:01hacking. And I'm going to dwell for a
moment on feminist servers. Haven't spent -
28:01 - 28:07too much, haven't had too much text on
slides. But this one is. So these are -
28:07 - 28:12artifacts that were on the one hand,
basically, like an independently -
28:12 - 28:18maintained server run primarily by women-
identifying folks or non-masculine -
28:18 - 28:25identifying folks running free software,
but they're also a sort of list of -
28:25 - 28:31networking principles that gets out of
that more kind of literal artifactual mode -
28:31 - 28:42into a more sort of speculative and
aspirational sort of politics of what it -
28:42 - 28:47means to be doing this. And so the first
couple- it's actually a very long list and -
28:47 - 28:51I only have a handful up here - the first
couple, I think, are very consonant with -
28:51 - 28:59kind of mainstream hacking, wants networks
to be mutable and read-write accessible, -
28:59 - 29:02and radically questions the conditions for
serving and service experiments with -
29:02 - 29:08changing client-server relations. Those,
again, seem kind of axiomatic for -
29:08 - 29:14mainstream hacking. But then the feminist
server starts to go in some other -
29:14 - 29:19directions; is autonomous in the sense
that she decides her own dependencies. I -
29:19 - 29:23think this one's really interesting and
important. It's again, it's getting away -
29:23 - 29:31from this kind of heroic, individualistic
or almost sort of libertarian sense of -
29:31 - 29:36autonomy. It's just the autonomy is about
deciding where you're dependent and being -
29:36 - 29:43sort of transparent and open about that.
It's not about bootstrapping or being -
29:43 - 29:49individually self-sufficient; does not
strive for seamlessness, division of -
29:49 - 29:54labor; the not so fun stuff is made by
people. That's a feminist issue. That one, -
29:54 - 29:59I think is really important. A lot of
hacking that goes on in, say, a Global -
29:59 - 30:08North context is about the artifacts and
the practices in that moment. But here -
30:08 - 30:13this is, if it's not clear, drawing
attention to where did that come from, it -
30:13 - 30:19shouldn't be a seamless experience for you
not thinking about the pre-history, the -
30:19 - 30:24supply chain of this artifact, which
actually started with mining and -
30:24 - 30:33fabrication and assembly and shipping. And
will also have a post-use life, which -
30:33 - 30:41might be recycling, might be very
hazardous reclaiming of precious metals -
30:41 - 30:47by people without good labor protections,
or might not. But sort of instead of -
30:47 - 30:53having this all be invisible, sort of
drawing it forward treats technology as -
30:53 - 30:56part of a social reality. This is a big
one, but it's really just sort of opening -
30:56 - 31:02up the space to acknowledge that legacy of
division that I was talking about earlier. -
31:02 - 31:08And takes the risk of exposing her
insecurity. I like this one so much. It's -
31:08 - 31:13it's really evocative on a few levels. But
at the most sort of basic level, what I -
31:13 - 31:18want to point out is that it's very
different than, again, a sort of threat or -
31:18 - 31:24a strand of hacking that's about owning
hard, or mastery or something. Instead, -
31:24 - 31:34it's being, you know, sort of present with
oneself and with others and disclosing -
31:34 - 31:41insecurities, which could be network
insecurities or personal ones. Right. So -
31:41 - 31:46it's taking what it means to be engaging
in hacking and all these new and sort of -
31:46 - 31:52mutated directions. One more example from
the sort of feminist hacking that I want -
31:52 - 31:59to just tell you about for a second was
this exercise. I was at a feminist hacking -
31:59 - 32:06convergence in Montreal in 2016 and people
did a exercise in understanding public key -
32:06 - 32:14cryptography as a dance where, you know,
instead of learning about this theory, -
32:14 - 32:19people actually tried to embody it. So
placing your body in the relationship with -
32:19 - 32:25tech and often some of these things happen
in kind of explicitly separate spaces, but -
32:25 - 32:31going through the principles of
cryptography in a spontaneously -
32:31 - 32:37choreographed dance and then performing it
all together. OK, so these are some of the -
32:37 - 32:42ways, the mutant strains of feminist
hacking. I don't want to suggest that this -
32:42 - 32:48has been just a very linear and conflict-
free progression. And so I do want to -
32:48 - 32:55dwell for a moment on just a single
instance of conflict, which probably -
32:55 - 32:58the details will be unfamiliar, but there
might be a sort of wider recognition -
32:58 - 33:07I think. So this is from a hackerspace in
Philadelphia in 2011 and a handful of -
33:07 - 33:16members of the space proposed holding an
event to hack sex toys, and they thought -
33:16 - 33:24it was a pretty uncontroversial suggestion,
the same as having an Arduino night or a -
33:24 - 33:29... you know, I'm making stuff up. But
they sort of put it out there as this: -
33:29 - 33:34well, let's do this on the Saturday. And
they were really surprised when a bunch of -
33:34 - 33:39other members of the space were very
opposed to it. And this is in the book. -
33:39 - 33:47It's a design for a DIY flogger made from
a bicycle tube. And this was on the -
33:47 - 33:53proposed sort of flier for the event. And
so what happened was they were really -
33:53 - 33:57surprised that other people in the space
were sort of like, no, no, we don't want -
33:57 - 34:01to have this here. We don't think it's
appropriate. And so here's a quote from -
34:01 - 34:09one of the people who was opposing the
event. And he says: "A lot of the hackers -
34:09 - 34:14here at the space are the Make Magazine/
Instructables type, not the Julian -
34:14 - 34:19Assange HOPEconference attending type or
even the kind that cares much about a -
34:19 - 34:26global movement of hacker spaces. I'm not
sure what category dildo-hacking falls in. -
34:26 - 34:34For a lot of people, DIY has to do with
the sort of father-son nostalgia", end -
34:34 - 34:45quote. So this is really interesting,
because we've got this acknowledgment of -
34:45 - 34:52hacking being a variety of things, and
maybe again, for some people in a European -
34:52 - 34:57context where hacker spaces are often
more political, maybe this Make Magazine -
34:57 - 35:07sort of home-project, personal fabrication
will be a little bit unrecognizable or -
35:07 - 35:13even disappointing, but it is part of
hacking and making in the US. And then, of -
35:13 - 35:20course, there's the "information wants to
be free" HOPE-conference, lock-picking all -
35:20 - 35:26these kinds of things, hacking that he
acknowledges. But he he says, I'm not sure -
35:26 - 35:33what dildo-hacking is, maybe suggesting
it's not even hacking at all. And then he -
35:33 - 35:37says, for a lot of people, DIY has to do
with this father-son nostalgia, which I -
35:37 - 35:42hope might make you think of the picture
I had up at the very beginning of the -
35:42 - 35:51father-son with the radio apparatus. And
so it's really interesting that this sort -
35:51 - 35:55of proposal that these people didn't think
of as being controversial turned into -
35:55 - 36:02this, pretty full on argument about what
even hacking is in the sort of essential -
36:02 - 36:10way. And so here's a reply from one of the
people who had proposed the workshop, and -
36:10 - 36:16she says: "So my concern here is that it's
a hackerspace. Initiative shouldn't be -
36:16 - 36:21punished, particularly initiative that
shakes up old patterns. Our space is -
36:21 - 36:26really stratifying into hardware-tinkering
as the core interest , and white males as -
36:26 - 36:33the demographic. I'm really frustrated.",
end quote. And so this again, I assume -
36:33 - 36:42that this is fairly recognizable to folks.
Right? If the core of what hacking is, is -
36:42 - 36:48taking it upon yourself to take artifacts
and practices that you already know how to -
36:48 - 36:55do in a new direction; like that's what
hacking is, according to a lot of people. -
36:55 - 36:58And so she's really surprised and really
dismayed and really, I think felt very -
36:58 - 37:09hurt and rejected that this was flaring as
controversy, and was really surprised that -
37:09 - 37:16people were sort of raising the prospect
that dildo-hacking was interruption of -
37:16 - 37:25a nostalgic father-son tech practice, that
was somehow offensive. Certainly, it seems -
37:25 - 37:31like part of the problem might have been
the introduction of sexuality and maybe -
37:31 - 37:34questions about whose sexuality;
sexuality that didn't seem to center -
37:34 - 37:41straight men. What happened was this
didn't get resolved. The people who had -
37:41 - 37:48proposed the workshop - included women,
men and non-binary people - actually left. -
37:48 - 37:56They decamped to a new space that was
forming, that was forming with more kind -
37:56 - 38:01of feminist hacking principles and
welcomed them there. And the first space -
38:01 - 38:08stayed how they were and didn't have to
keep having conflicts and grapple with -
38:08 - 38:12this kind of controversy anymore because
the people - and they weren't kicked out - -
38:12 - 38:23but they decided to leave. And so, I know
these conflicts have been very painful and -
38:23 - 38:27and alienating for people who have
experienced them, even though maybe the -
38:27 - 38:32content of this one seems almost funny or
something in hindsight. But what I want to -
38:32 - 38:40propose is that part of why this has been
so difficult for people in these spaces is -
38:40 - 38:46that people are actually wrestling with
this whole legacy of division that I laid -
38:46 - 38:51out in the first part of the talk. So it
may feel like you're just having an -
38:51 - 38:57argument with your fellow group members
who are a lot like you, but then you're -
38:57 - 39:03breaking down along some kind of line that
you both can't cross over to with the -
39:03 - 39:13other one. But there's a sort of really
deep sedimentary layer of who has been -
39:13 - 39:22anointed the sort of power of agency over
tech and for whom that has been sort of -
39:22 - 39:26a taken for granted tacit assumption and
who's had to sort of assert their presence -
39:26 - 39:30or their right to be there in different
ways. And so when there are these -
39:30 - 39:34conflicts and flashpoints, all of that
stuff is there. And that's actually really -
39:34 - 39:42hard to solve anywhere. But it's very,
very hard to solve in elective -
39:42 - 39:47volunteeristic associations, I think, also
so not not to say impossible, but there's -
39:47 - 39:57a reason these conflicts are difficult.
OK, so returning to diversity and this is -
39:57 - 40:04the same quote, I won't read it again, but
the sort of idea that women in tech are -
40:04 - 40:10there to bring forward different
experiences and build a better product. -
40:10 - 40:14Diversity is maybe necessary to start
these conversations, or the idea of -
40:14 - 40:20diversity, but I don't think it's
sufficient for the purposes here. It's too -
40:20 - 40:26easily sitting alongside market values,
which I think are not what people in -
40:26 - 40:31hackerspaces are primarily most
interested in. And that's not really why -
40:31 - 40:37they're there. And it's also very easily
steered away from the important political -
40:37 - 40:43work that I think people in hacking
communities often want to do. It can sort -
40:43 - 40:49of mutate into this contradictory thing
where you've got sort of market values on -
40:49 - 40:54the one hand, and something that isn't
what you set out to do on the other hand, -
40:54 - 40:58and I'm going to illustrate that with this
somewhat more provocative example. This is -
40:58 - 41:05a meme I stole from the internet. But the
point here is that you can make these -
41:05 - 41:11diversity affirming slogans. And here
we've got "Black Lives Matter" and "Yes, -
41:11 - 41:19we can" and LGBT sort of flags or slogans
on a bomber. You can make these diversity -
41:19 - 41:25affirming slogans fit within a system that
is fundamentally violent, carceral, -
41:25 - 41:30militarized. It doesn't necessarily
challenge the system itself to bring -
41:30 - 41:36forward individuals' identities as members
of marginalized groups. In fact, -
41:36 - 41:41capitalism is actually quite happy to
resolve what might seem like contradiction -
41:41 - 41:46here, by commodifying identity, selling
it as a brand without resolving the -
41:46 - 41:52fundamental tensions that we know that are
here, that have to do with social power -
41:52 - 41:58and dominance and exploitation. So coming
back to the free software quote from the -
41:58 - 42:05beginning, as I said, this sort of hit
consensus, but I'm actually going to argue -
42:05 - 42:10it's not really going far enough. Diverse
participation and making proprietary -
42:10 - 42:16software extinct are fine, but I think
they actually do not fully capture what's -
42:16 - 42:22at stake in these very tough conversations
that have been happening in hacking and -
42:22 - 42:31free software groups. And so, we might
think of this as, again, a point of entry, -
42:31 - 42:35but we might want to take it a bit
farther. And this is as far as I'll go -
42:35 - 42:44with prescriptions or how-to. So specific
in local voluntaristic communities that -
42:44 - 42:50are either your hackerspace in the city
you live in or the the project that you... -
42:50 - 42:56that's distributed, but that you work on.
So articulate values and politics. -
42:56 - 43:02Diversity is a good one. But I'm going to
say it's necessary and not sufficient. And -
43:02 - 43:06some of the things that I talk about in
the book include like other forms of -
43:06 - 43:14political beliefs, like decolonization or
attention to militarism that can actually -
43:14 - 43:19sort of force you to have sometimes harder
conversations, but ones that can clarify -
43:19 - 43:26values and goals. Obviously, I don't need
to tell hacking groups, but keep -
43:26 - 43:33theorizing and keep experimenting. That is
a way, whether it's crypto dancing or not, -
43:33 - 43:39it's a way to sort of like walk yourself
through what you're trying to sort of -
43:39 - 43:43build and iterate. And within spaces - I
think at this point this is fairly -
43:43 - 43:47uncontroversial, but I do chronicle in the
book how people got here - making and -
43:47 - 43:54enforcing rules, having conversations
sometimes one on one, not a sort of public -
43:54 - 44:01conflagration, flame war. But if people
feel safe, respect each other enough -
44:01 - 44:08to actually talk through what is the sort
of point of contention or difference and -
44:08 - 44:13see if you can understand one another. The
other thing I want to point out though, is -
44:13 - 44:19that there's a whole lot of stuff going on
here that is much, much bigger than the -
44:19 - 44:25spaces and communities that you're in. And
so it is kind of a mistake and no one's -
44:25 - 44:31fault that you can't solve all of this in
the groups that you're in. And so there -
44:31 - 44:38also has to be much bigger society-wide
goals that we all have our eyes on, -
44:38 - 44:44because if we solve some of this stuff,
then, lo and behold, quote, "diversity in -
44:44 - 44:48tech" would be a lot easier and probably
less fraught and contentious. But things -
44:48 - 44:55like demilitarization, supply chain
justice, basic social equity, workplace -
44:55 - 45:01fairness, public reconciliation - I'm
giving US examples here - reparations, -
45:01 - 45:08land back. And obviously the one that's
coming for all of us, climate, is going to -
45:08 - 45:13be the biggest problem. It already is the
biggest problem in terms of, you know, -
45:13 - 45:20racial and economic and environmental
justice worldwide. So in conclusion, my -
45:20 - 45:25little take home slogan is that there's no
hack or tech audit for justice, but there -
45:25 - 45:31are these different levels and you can work
on one and work on another, but you can't -
45:31 - 45:37solve the really big stuff in the sort of
tech domain. And that's not a shortcoming, -
45:37 - 45:43and it's not for lack of trying. That is
all. I'm very happy to quit talking so -
45:43 - 45:48much and move to Q&A. Thank you so much
for your attention. Thanks. -
45:48 - 45:52Herald: All right. Thank you.
Dunbar-Hester: Thank you. -
45:52 - 46:02Herald: All right, everyone, questions on
Twitter, Mastodon, #rc3-two on IRC. We -
46:02 - 46:06wait for a little bit and ask the
questions in the meantime. So this -
46:06 - 46:12research for this book, when
did you actually do it, like timewise? -
46:12 - 46:18Dunbar-Hester: Yeah, it started, it
actually, we were talking before we had an -
46:18 - 46:23audience a little bit about radio. And my
earlier project was about people building -
46:23 - 46:30radio stations and - try to be brief - but
they had a very emancipatory set of ideas -
46:30 - 46:35about what it meant to teach people how to
build electronics or solder a transmitter -
46:35 - 46:40board or something. But they kept running
into some of these patterns of exclusion -
46:40 - 46:47that I mentioned. And so it was actually
through them that I heard about these -
46:47 - 46:51conversations that were starting to happen
in and hacking and open source communities -
46:51 - 46:57where people were trying to directly head-
on confront some of this stuff. So I think -
46:57 - 47:03I heard about it in around the 2006 era,
started working on it, maybe... It's about -
47:03 - 47:092010 to about 2015, is the period
that I was actively, you know, going to -
47:09 - 47:14conferences and meet-ups and spaces and
interviewing people. So it's this sort of -
47:14 - 47:18snapshot. Yeah, that's the shortest
answer. Thanks. -
47:18 - 47:23Herald: All right. That's very interesting
because I kept thinking if you had -
47:23 - 47:27encountered this sort of rise of the alt-
right or something like this, because I -
47:27 - 47:31feel like in the last couple of years,
these discussions have just become so much -
47:31 - 47:35more radicalized and not from the left,
but from the right, like where you can -
47:35 - 47:40basically no longer talk about this
without just all hell breaking loose. -
47:40 - 47:42Right?
Dunbar-Hester: I think that's a really -
47:42 - 47:47interesting point. And I think you're
right. This does, I mean, I was finishing -
47:47 - 47:51the book during the Trump era over here,
and I know you've got your own counterparts -
47:51 - 47:58in Europe, but this is all very much within
that kind of Obama liberal, neo liberal -
47:58 - 48:03framing. And actually something I wrote
about, I think it's in the intro of the -
48:03 - 48:11book, is the Obama White House had a women
in STEM, as part of a women and people of -
48:11 - 48:17color in STEM, as part of a kind of
national security and a nationalist agenda -
48:17 - 48:23basically on their page. And the Trump
administration took it down. So I think, -
48:23 - 48:33and also in the book, there's a discussion
of a channel for Polish Python users where -
48:33 - 48:39they were like fretting about how to ban
Nazis from the channel and whether Nazis -
48:39 - 48:45were just people showing up and throwing
swastikas all over the IRC channel, -
48:45 - 48:50whether that was "trolling" or whether it
was real Nazis. And, yes, I think the sort -
48:50 - 49:00of stakes of some of this has gotten a lot
more stark. And so in certain ways, -
49:00 - 49:04the sort of "which side are you on?"-
questions are easier, but the sort of -
49:04 - 49:11depth of what's at stake and what's being
defended is maybe harder. So, yeah, the -
49:11 - 49:17political context is sort of
temporal is really is part of this, yeah. -
49:17 - 49:23Herald: All right. Now we turn to the IRC.
Have you looked into the woman in FLOSS as -
49:23 - 49:28perhaps being one with predominantly
engineers as mothers/fathers? -
49:28 - 49:33Dunbar-Hester: Sorry, could you repeat
women in FLOSS ...? -
49:33 - 49:37Herald: I think the question is whether
you have sort of noticed a pattern that -
49:37 - 49:42women that get into these spaces, sort of,
by their parents, have encountered -
49:42 - 49:46engineering, I think it's a familiar
context. -
49:46 - 49:53Dunbar-Hester: Yes, I have not personally
done research on that, but it does, -
49:53 - 50:03y'know, sort of other historical and
sociological research shows that people -
50:03 - 50:12who are exposed at a young age,
that's part of the differential. And even, -
50:12 - 50:18even in households where, say, a computer
came home early on, we're talking about a -
50:18 - 50:24slightly older generation. A computer came
home early on because parents brought it -
50:24 - 50:31into the house. You know, boys were more
likely to sort of claim it as theirs or -
50:31 - 50:35take time on it or start playing with it
even a couple or a few years earlier than -
50:35 - 50:40girls. And so, yeah, I haven't looked at
that, the sort of life narratives -
50:40 - 50:44directly, but other people have. And I
draw on that. And that's also something I -
50:44 - 50:50am hearing now from people who are adults
and are thinking about these problems and -
50:50 - 50:59how they want to not have their own kids
encounter the same problems or sort of -
50:59 - 51:02legacy of division. You definitely hear
people saying, "I want this to get solved -
51:02 - 51:07so my daughter doesn't have a hard time."
But that's a little outside of what -
51:07 - 51:13I've looked at, but it feeds in, yeah.
Herald: All right. All right. This is a -
51:13 - 51:16slightly longer question. I'll try to do
my best: I've witnessed a lot of white -
51:16 - 51:24feminism in FOSS, that's free open source
software, right? And FOSS diversity, equity -
51:24 - 51:30and inclusions. DEI Spaces. Is
intersectionality sufficiently recognized -
51:30 - 51:36as an issue in FOSS feminism, or is it
actually worse off due to the low number -
51:36 - 51:39of women in FOSS, around 2%.
-
51:39 - 51:46Dunbar-Hester: Great. Yeah. So I couldn't.
At first I would flag that the numbers in -
51:46 - 51:52FOSS have started to change. There's later
research that shows that they're up some. -
51:52 - 51:57The question about white feminism is a
really good one. And I do write in the -
51:57 - 52:08book about people sort of grappling with
that. And so the sort of trajectory was -
52:08 - 52:18the first category that people started to
notice of exclusion was women, and I think -
52:18 - 52:27I discussed how women opened up pretty
quickly to being non essentialist and -
52:27 - 52:32again, inclusive of trans and non binary
sorts of identities. But I think that the -
52:32 - 52:40race and the what I sometimes talk about
is sort of global positioning, the Global -
52:40 - 52:47North hackers in Europe and North America.
It is harder, I think, for them to sort of -
52:47 - 52:56deal as head on with, you know, race. And
I mean, these are fundamental questions of -
52:56 - 53:04racial capitalism. And so being positioned
within fairly well advantaged Global North -
53:04 - 53:10communities, it is harder to confront some
of those issues. I think there's a -
53:10 - 53:15consciousness of it, but I would say it's
a lot. What I observed was a lot greater -
53:15 - 53:23awareness and sort of development of
potential solutions for being inclusive of -
53:23 - 53:32women than a sort of really broadly
intersectional notion of women, including -
53:32 - 53:38people in Global South positions and in
racialized categories in the Global North. -
53:38 - 53:43And again, I think there's been a
sort of probably a shift in attention to -
53:43 - 53:50that, some of which postdates the
period in the book. But I also think that -
53:50 - 53:55that it's uniquely hard, I think, to
solve in volunturistic groups because the -
53:55 - 54:00forces, at least in the US and I would
speculate in Europe as well, like the -
54:00 - 54:10forces that cause inequality and
segregation. And, you know, like the tech -
54:10 - 54:13industry is a really good place to see
these contradictions, like what's going on -
54:13 - 54:22now with, like Google and the firing of Dr
Timnit Gebru is. You know, places where -
54:22 - 54:30there's a sort of capitalistic incentive
are not going to be able to solve these -
54:30 - 54:35problems of inequality because the profit
motive is always going to be there to -
54:35 - 54:43build surveillance tech, to assist
countries and that want to -
54:43 - 54:49build prisons. Again, this is what's
coming with climate stuff. And so saying, -
54:49 - 54:55oh, you need to hire more black women or
something is like running smack into these -
54:55 - 54:59contradictions. And this is part of why I
say this really can't be solved within -
54:59 - 55:03tech. And these are very big, thorny
issues. Another thing the final thing I'll -
55:03 - 55:10point out this is sort of rambling is for
a voluntaristic group, it's gonna be -
55:10 - 55:16easier to make fairly small interventions.
And so I think that that's. I actually -
55:16 - 55:20have somebody talking about this, like if
we make the space more inclusive to -
55:20 - 55:28anybody and say bad behavior isn't here or
isn't welcome here, you know, that can hit -
55:28 - 55:33a note where it might cause there to be a
sort of more inclusive community that -
55:33 - 55:36would be welcoming to a bunch of different
kinds of folks. But it's not necessarily -
55:36 - 55:44realistic to tailor in a voluntaristic group
that's more a response to the sort of forms -
55:44 - 55:50of exclusion all the kinds of
different people have experienced. And so, -
55:50 - 55:55again, I think this is kind of a question
of scale, but I really do think that the -
55:55 - 56:00sort of way that voluntaristic groups,
i.e. not the market, not workplaces, -
56:00 - 56:06articulate, you know, what they think the
problems are and how -
56:06 - 56:10they can sort of begin to talk about
solutions are really important precisely -
56:10 - 56:19because they're not hamstrung by the same
contradictions that for profit spaces are. -
56:19 - 56:24That was a long ... That's a really great
question. I do take it up. Some are the -
56:24 - 56:27people I was writing about. I think we're
starting to take it up. It's probably -
56:27 - 56:31more full throated now. And it's very
complicated. -
56:31 - 56:34Herald: Yes, all of these things.
Dunbar-Hester: Yeah. -
56:34 - 56:39Herald: Alright, we do have an interesting
question: "Would you advise people to try -
56:39 - 56:46to change communities from within or just
start new structures with more intersexual -
56:46 - 56:48spaces?"
Dunbar-Hester: I don't have a great answer -
56:48 - 56:58to that. I think it is kind of the
pressing question of the day, I think in a -
56:58 - 57:11lot of a lot of spaces, and I see good
answers on both sides, and I think it -
57:11 - 57:23depends perhaps. I do see a virtue in
some space being set aside, but how that a -
57:23 - 57:31separate space chooses to interface with a
sort of wider space is going to vary. And -
57:31 - 57:34I don't think, I don't think it's
necessarily a binary like you're either -
57:34 - 57:40totally outside or you're within having a,
you know, a big discussion about how to be -
57:40 - 57:45maximally inclusive. I think those things
are always kind of dialogically happening. -
57:45 - 57:50But I've seen people argue both sides of
it, and I've seen, I think, compelling -
57:50 - 57:59answers on both sides of it. But, yeah, it
is kind of the place where the idea that -
57:59 - 58:06we're sort of all taking up this project
together can start to, you know, break -
58:06 - 58:10down. And some people think you're really
losing. A lot of people go off and stop, -
58:10 - 58:19you know, working together as some sort of
unified group. And so, yeah, I don't -
58:19 - 58:23have a great answer that. I do write
about it in the book. And I would say it -
58:23 - 58:26depends on what the goals are. I think
having some separate space is probably -
58:26 - 58:30important in any event.
Herald: Yeah, it seems like it is like -
58:30 - 58:35these kind of hackerspace have at least
the advantage of being able to accommodate -
58:35 - 58:40sort of subgroups, right. So you can have
these certain events, certain working -
58:40 - 58:45groups that can focus on these issues. For
example, I think our host today, the xHain -
58:45 - 58:50hackerspace in Berlin, just started this
talk series "Gespräch unter Bäumen", which -
58:50 - 58:55is just "Talks below the trees", they have
a LED tree in their hackerspace, and it -
58:55 - 58:58just sort of naturally happened that it
had only women as speakers and it was just -
58:58 - 59:02this lovely natural evolution of just
having much more interesting topics and -
59:02 - 59:08not just, you know, the traditional male
hacker kind of topics. So I think it's -
59:08 - 59:11really cool. And you just have this
ability to have these initiatives inside -
59:11 - 59:21existing spaces somehow, but - just a rant
from my side. Someone had a question, the -
59:21 - 59:24title of the book is just "Hacking
Diversity", right? I think we mentioned -
59:24 - 59:27this at the beginning.
Dunbar-Hester: Yeah, I think the whole -
59:27 - 59:31title, if you look for hacking diversity,
you'll find it. My name, Princeton -
59:31 - 59:39University Press. Yeah. I'll not be
shameless and say it's on very deep sale -
59:39 - 59:44right now. If you were to buy it from
Princeton directly, there's a discount -
59:44 - 59:53code and it's on my Twitter. It's I think
it's "H - D - E - V - S" anyway - it's -
59:53 - 59:5640% percent off through like February.
Herald: Nice. -
59:56 - 60:00Dunbar-Hester: Yeah. It's very affordable.
Herald: Alright, can you comment on how -
60:00 - 60:04structures like GitHub that predominantly
value codes and missions and other highly -
60:04 - 60:09formalized tasks over community building
and less technical contributions play into -
60:09 - 60:16this nexus?
Dunbar-Hester: Yes, absolutely. I mean, -
60:16 - 60:22historically, the focus on the
artifact, what you could produce, the -
60:22 - 60:31code, even hardware, has taken on this
sort of exalted, symbolic meaning, and it -
60:31 - 60:36has definitely contributed to both the
denigration and the invisibility of people -
60:36 - 60:43who weren't doing that kind of work and
who might be doing community building or -
60:43 - 60:50even things documentation or translation,
right? With it's being global practices -
60:50 - 60:56that the sort of authors of the code are
getting the sort of priesthood -
60:56 - 61:01status and everyone else is sort of lower.
I think, again, awareness of that is -
61:01 - 61:09starting to change, but it's definitely
contributed to again historical sense that -
61:09 - 61:15there was underrepresentation of some
kinds of folks. And I think there are ways -
61:15 - 61:22you can, it sort of starts with raising
awareness of this. But again, that sort of -
61:22 - 61:29signal, the celebration of the the
technologist is coming in from all these -
61:29 - 61:35other places in the culture. And so
deprogramming that or something, as it -
61:35 - 61:42were, is is tough, but not impossible. And
again, I see that, I see that actually, at -
61:42 - 61:48least here as part of the sort of bigger
cultural war. And, you know, the idea that -
61:48 - 61:55the sort of tech is the, you know, godly
apparatus and everything else is, you -
61:55 - 62:02know, humanities and squishy soft stuff we
don't need that's going to fall away. -
62:02 - 62:08Yeah, it doesn't have to be as big of
a topic as that, but that's again, it's -
62:08 - 62:13all kind of in there. I don't know if
that answered a question, but, yes, that's -
62:13 - 62:18there. And I think that's something that
the first step in addressing it can be -
62:18 - 62:24acknowledging it and and building forms of
collaboration and that are not just sort -
62:24 - 62:30of like nominally non hierarchical, but
specifically raising visibility and -
62:30 - 62:33sort of credit giving to other kinds of
contributions. -
62:33 - 62:38Herald: So do you feel as someone that is
actually a science and technology scholar -
62:38 - 62:43that this feels as like is finally getting
recognized as something that exists and is -
62:43 - 62:47real? Because I always have this impression
that people just assume this doesn't exist -
62:47 - 62:52and no one thinks about this except them
and there is an entire academic field -
62:52 - 62:56about it. Do you think this is changing or
is it just to say? -
62:56 - 63:01Dunbar-Hester: I don't know. I mean, I
think that there's a there's a lot of -
63:01 - 63:12visibility on the one hand and even, you
know, something in the US with and who -
63:12 - 63:17knows what will be happening after COVID,
but, you know, public school systems were -
63:17 - 63:23having their budgets cut after the first
financial crisis in 2008. And one of the -
63:23 - 63:27things that was being proposed was moving
a hackerspace into a high school and sort -
63:27 - 63:35of having that, you know, come forward and
do things that institutions had maybe once -
63:35 - 63:46been doing. I think that that again, I'll
keep coming back to the tension between -
63:46 - 63:52what I think some of the most interesting
voluntaristic and politicized sort of -
63:52 - 63:59goals for these kinds of activities, them,
versus what the market wants them to do, -
63:59 - 64:06are, are sort of in tension. And there was
a moment where I was interviewing someone, -
64:06 - 64:12maybe and I want to say 2012, and I was
asking him questions about free software -
64:12 - 64:17and he was very kind but he said something
like, "Why are you asking me about free -
64:17 - 64:24software? Like that's dead.", you know,
like Open Source 1.0 - sort of. And I'm -
64:24 - 64:31not the only person who's written about
that at all, but I think this sort of idea -
64:31 - 64:38that there's something here that can't
just be, you know, co-opted by a market -
64:38 - 64:45like that's the hard part and, I mean. I
think there is a lot of there's continuing -
64:45 - 64:50to be a lot of attention to hackathons and
coding bootcamps and these kinds of -
64:50 - 64:59things. But I don't know, I guess I'm sort
of too inside and outside at the same time -
64:59 - 65:02to have a good answer. I think that
there's a well-established body of -
65:02 - 65:10scholarly recognition of these activities.
People look at me less weird talking about -
65:10 - 65:18this than a book about radio in the twenty
first century. But I think the sort of, -
65:18 - 65:26you know, really sustained work to sort of
disarticulate, disentangle some of this -
65:26 - 65:30from industry where it's getting the sort
of most not just attention, but the sort -
65:30 - 65:37of celebration and the ways that that can
kind of distort, I think, some of the -
65:37 - 65:40other intentions that is is always going
to be tough. -
65:40 - 65:45Herald: Allright. Wonderful. I think we're
out of time. So thank you very much. -
65:45 - 65:51Everyone, buy the book. And have a good
night. Bye, bye. -
65:51 - 65:54Dunbar-Hester: Good day.
Thank you so much. Thank you. -
65:54 - 65:56Herald: Thank you.
-
65:56 - 65:58postroll music
-
65:59 - 66:03Subtitles created by c3subtitles.de
in the year 2021. Join, and help us!
Show all