< Return to Video

#rC3 - Hacking Diversity: The Politics of Inclusion in Open Technology Cultures

  • 0:05 - 0:12
    rc3 preroll music
  • 0:12 - 0:19
    Herald: All right, so our next talk is
    called Hacking Diversity, where we
  • 0:19 - 0:24
    basically try to treat a really awkward
    question about these spaces that we move
  • 0:24 - 0:29
    in here, which is that we really have
    these ideas about inclusion and diversity.
  • 0:29 - 0:33
    But in the end, most of the people that
    come just look like me. And in open
  • 0:33 - 0:38
    source, most people look like me. And this
    is extremely strange, right? Because we
  • 0:38 - 0:43
    have all these ideas about diversity and
    everything. And today we try to answer the
  • 0:43 - 0:47
    question of why this happens and maybe
    what we can do about it. Our speaker for
  • 0:47 - 0:52
    this is Professor Christina Dunbar-Hester.
    She's a professor at the University of
  • 0:52 - 0:56
    Southern California, I think. And today
    she is preparing, uh, she is showing
  • 0:56 - 1:01
    essentially a condensed version of a book
    that she just wrote, called Hacking
  • 1:01 - 1:05
    Diversity. And I'm really looking forward
    to this talk because I also have asked
  • 1:05 - 1:08
    myself these questions and I don't know
    the answers.
  • 1:08 - 1:10
    So I'm looking forward to this.
    Please Christina.
  • 1:10 - 1:14
    Professor Christina Dunbar-Hester: Thank
    you so much. Thank you for the
  • 1:14 - 1:19
    introduction and thank you for the
    invitation and thank you for all of your
  • 1:19 - 1:25
    labor to get this remote experience off
    the ground. So I'm really happy and
  • 1:25 - 1:36
    excited to be here, whatever that is. And
    I will get into the talk. Let's see here,
  • 1:36 - 1:46
    OK. Let me know, you should be able to see
    slides now. If that didn't work, let me
  • 1:46 - 1:53
    know. OK, thanks. This is not a best
    practices talk so much as a first
  • 1:53 - 2:00
    principles and how did we get here talk?
    My examples are mostly from the US, but
  • 2:00 - 2:10
    they are part of a broader Euro-American
    milieu. And so to get started, I think I
  • 2:10 - 2:19
    want to put up this quote from the Free
    Software Foundation from 2012. And the
  • 2:19 - 2:25
    goal of this talk is really to give some
    context. And I think at the almost very
  • 2:25 - 2:32
    end of 2020 it's safe to say that this is
    a fairly mainstream and uncontroversial
  • 2:32 - 2:36
    topic, but it wasn't always this way. So
    the quote says: "The free software
  • 2:36 - 2:41
    movement needs diverse participation to
    achieve its goals. If we want to make
  • 2:41 - 2:46
    proprietary software extinct, we need to
    make everyone on the planet engage with
  • 2:46 - 2:52
    free software. To get there we need people
    of all genders, races, sexual orientations
  • 2:52 - 2:59
    and abilities leading the way. And as I
    said, I think this is a very recognizable
  • 2:59 - 3:04
    sort of discourse now, but it hasn't
    always been. And I'm going to sort of
  • 3:04 - 3:10
    unpack this for a little while. The
    outline of the talk, this is a pretty bare
  • 3:10 - 3:16
    bones outline, but there's going to be a
    lot of sort of history and context and
  • 3:16 - 3:21
    then a little bit about the value and goal
    of diversity and how it relates to profits
  • 3:21 - 3:28
    and markets and also the goal of diversity
    and how it relates to other values,
  • 3:28 - 3:33
    particularly justice. And I want to note
    that there's a couple of content warning
  • 3:33 - 3:40
    slides on here. One, for people who have
    been involved in promulgating genocide and
  • 3:40 - 3:46
    another for a person who's been ejected
    from hacking for abusive behavior. And so
  • 3:46 - 3:55
    there will be a warning preceding each of
    those. OK, so first, talking about
  • 3:55 - 4:03
    genocide. In the 19th century in the
    United States and even into the 20th
  • 4:03 - 4:13
    century, there was an idea of a sort of
    frontiersmen, brawny man who you can see
  • 4:13 - 4:17
    here. This is a folk hero, but was
    important enough to still be being
  • 4:17 - 4:22
    represented on television in the 1960s.
    And the sort of consistent thing
  • 4:22 - 4:28
    here is going to actually go, this is the
    genocide one, to these sort of consistent
  • 4:28 - 4:32
    representations. You can see these folks
    are wearing, well, they're men and they're
  • 4:32 - 4:37
    being manly and they're wearing animal
    hide with the implication that they maybe,
  • 4:37 - 4:44
    you know, shot the deer themself. They
    carry a gun, they're in naturalistic
  • 4:44 - 4:58
    settings. They're sort of rough and ready
    for anything. I'm drawing here on
  • 4:58 - 5:04
    historian Susan Douglas, who argues that
    around the turn of the 20th century,
  • 5:04 - 5:10
    society started to change. And so even
    though there was still this mythos of this
  • 5:10 - 5:15
    brawny frontiersmen, what society actually
    needed was a reconfigured masculinity that
  • 5:15 - 5:23
    didn't sort of have this rough physical
    brawny masculinity. And so masculinity
  • 5:23 - 5:30
    itself, she says, was reconfigured to what
    she calls technical masculinity. And so
  • 5:30 - 5:39
    the masculinity was sort of refashioned to
    be about mastery over machines and
  • 5:39 - 5:43
    particularly these sort of new cutting
    edge electronic machines, which in this
  • 5:43 - 5:51
    case was radio. So radio experimentation
    in the very early 20th century, first
  • 5:51 - 5:57
    wireless telegraphy and then later
    wireless sound transmission, which became
  • 5:57 - 6:03
    broadcasting, she argues, is a way to sort
    of refit masculinity or the way the
  • 6:03 - 6:09
    society was changing. It was more urban.
    There was more specialized division of
  • 6:09 - 6:15
    labor needing people to work in a
    professional white collar fields with
  • 6:15 - 6:20
    technology as opposed to going out and
    settling the West. And so here we see
  • 6:20 - 6:26
    technical, technical masculinity,
    entrainment basically, a father with his
  • 6:26 - 6:36
    very young son teaching him this is a way
    to be in the world. And Douglas argues
  • 6:36 - 6:41
    that this started with ham radio in the
    early 20th century. But perhaps
  • 6:41 - 6:47
    unsurprisingly, it continued to sort of
    persist over time. And so my next few
  • 6:47 - 6:52
    slides are showing the same technical
    masculinity, which is about, you know,
  • 6:52 - 7:00
    curiosity, solving a problem, you know,
    expressing your will with technology only
  • 7:00 - 7:06
    with different sorts of technical
    artifacts. And so here this is the Model
  • 7:06 - 7:12
    Railroad, made very famous in Steven
    Levy's book about hackers. We also have,
  • 7:12 - 7:17
    and this is probably about the 1950s.
    We have phone phreaking in the 1960s
  • 7:17 - 7:22
    and here this is also a 2600
    magazine from the 80s, sort
  • 7:22 - 7:29
    of continuing to mythologize phone
    phreaking. Going into the 70s, we
  • 7:29 - 7:33
    see this with computers, the Homebrew
    Computer Club, a really important hobbyist
  • 7:33 - 7:41
    formation for both, you know, the history
    of Silicon Valley, but also the history of
  • 7:41 - 7:44
    hacking and free software. It was people
    who were sort of building and tinkering
  • 7:44 - 7:50
    and experimenting. And so what we're
    starting to see here is even as the tech
  • 7:50 - 7:56
    shifts, the technical masculinity stays
    consistent. And this is probably the early
  • 7:56 - 8:04
    80s and the slide is just an ad for a
    microcomputer. But we can see not only the
  • 8:04 - 8:10
    representation of masculinity at the
    center, we also see femininity in relation
  • 8:10 - 8:17
    to the technology, which is to say it's
    just the sort of ancillary handmaiden for
  • 8:17 - 8:24
    the sort of male agent here. And as I
    said, this is certainly a really cheesy
  • 8:24 - 8:32
    ad, but I think, I hope underscores the
    sort of consistent promulgation of this
  • 8:32 - 8:38
    relationship with technology. And so I
    want to suggest is that tech here over the
  • 8:38 - 8:46
    20th and into the 21st century is not just
    reflecting a legacy of division, of which
  • 8:46 - 8:53
    gender prescription, gender roles are a
    part of this, but is actually actively
  • 8:53 - 8:59
    been involved in enforcing this. And so
    we've got basically a white patriarchal,
  • 8:59 - 9:07
    Christian, native-born supremacy, and a
    global system of racial capitalism. And so
  • 9:07 - 9:11
    I've shown you who's sort of at the top of
    this hierarchy. We've got colonized
  • 9:11 - 9:18
    subjects, immigrants, women, rural and
    lower class people, indigenous people
  • 9:18 - 9:23
    coming out on the bottom. And both
    builders and consumers of tech are
  • 9:23 - 9:31
    implicated in this tension. OK, so going
    back even further in the history to sort
  • 9:31 - 9:36
    of where some of this comes from. I'm not
    sure how many of you thought that in a
  • 9:36 - 9:40
    discussion of hacking you'd be looking at
    a 19th century American oil painting. But
  • 9:40 - 9:45
    here we are. This is called American
    Progress. So I think mythologized American
  • 9:45 - 9:52
    progress from the late 19th century. And
    as you can probably see, there's a real
  • 9:52 - 9:57
    sort of light to dark element of the
    photo, of the picture, the painting. And we
  • 9:57 - 10:05
    have this maiden who's really not so much
    a person, but more like a God, this is
  • 10:05 - 10:13
    sort of Greek iconography, sort of up
    above everyone, up above man. And we do
  • 10:13 - 10:19
    see technology in the painting. We see
    the railroads and some ships on the right
  • 10:19 - 10:25
    hand side, which is the east. And so you
    can tell that she's sort of presiding over
  • 10:25 - 10:28
    everybody, settling the west. And again,
    they're bringing the light, which is
  • 10:28 - 10:33
    civilization. The maiden herself is
    actually carrying a book which symbolizes
  • 10:33 - 10:38
    knowledge and what may not be obvious, but
    she's actually got telegraph wire strung
  • 10:38 - 10:45
    around her arm. And then you can see the
    telegraph pattern behind her. And so this
  • 10:45 - 10:53
    control over technology is part of how
    white settler, you know, newly arrived
  • 10:53 - 10:59
    Americans are maintaining or sort of
    promoting and maintaining dominance over
  • 10:59 - 11:03
    their new continent, their new continent.
    And you can actually see, so we've
  • 11:03 - 11:08
    got these white settler folks in the
    center of the painting. All the way in the
  • 11:08 - 11:12
    dark are indigenous people. And there's
    also actually a bear. So they're sort of,
  • 11:12 - 11:20
    again, a biblical hierarchy of man over
    the beasts. And you can tell that the
  • 11:20 - 11:23
    indigenous subjects and the bear are
    probably either going to get run out of
  • 11:23 - 11:30
    the frame or sort of forced to become
    civilized. So this is very deep in how
  • 11:30 - 11:39
    American sort of hierarchy and notions of
    dominance get promoted and, you know, sort
  • 11:39 - 11:46
    of renewed over time. And this is
    interesting because this ideology is so
  • 11:46 - 11:52
    strong that it's actually succeeded in
    basically erasing some of the historical
  • 11:52 - 11:58
    record. Like, for instance, we know that
    there were women, highly skilled women
  • 11:58 - 12:05
    operators in World War 2 operating the
    first electronic computers. This is ENIAC
  • 12:05 - 12:11
    in the US. But they were still, they were
    sort of written out of the record and
  • 12:11 - 12:20
    computing, once it became popular and moved
    out of a top secret military project, the
  • 12:20 - 12:28
    womens' roles were basically effaced and
    credit for dominance over and sort of
  • 12:28 - 12:34
    control over the new technology publicly
    went to men. And again, so we see this
  • 12:34 - 12:38
    sort of sorting happening in all these
    different ways, even in defiance of the
  • 12:38 - 12:46
    actual historical record. Another
    instance, which may be kind of surprising
  • 12:46 - 12:52
    is this is a really wonderful article by
    Lisa Nakamura that I'm drawing from here.
  • 12:52 - 13:02
    This is a Fairchild Semiconductor, so
    they're based in Silicon Valley, they used
  • 13:02 - 13:08
    to make microchips and associated
    equipment in Silicon Valley, but they had
  • 13:08 - 13:14
    an intermediate period before outsourcing
    that stuff to Asia, where they opened
  • 13:14 - 13:21
    operations on a Navajo reservation in the
    American Southwest. And so there's really
  • 13:21 - 13:28
    interesting ways in which race and gender
    basically become resources for valuing the
  • 13:28 - 13:34
    labor of some kind of people more and
    other kinds of people less. So this
  • 13:34 - 13:40
    reservation is attractive because regular
    American labor laws didn't obtain and they
  • 13:40 - 13:48
    also, managers in their minds, thought, oh
    there's this history of Navajo weaving and
  • 13:48 - 13:55
    sort of fine fabrication work. And so
    there's a sort of stereotype that nonwhite
  • 13:55 - 14:03
    people, particularly women, particularly
    in this day and age, Asian, have "nimble
  • 14:03 - 14:08
    fingers" and are going to be really good
    and diligent at something that we need,
  • 14:08 - 14:13
    like electronics assembly, to be really
    sort of diligently done. And so what we've
  • 14:13 - 14:22
    got here is the sort of overlay of Navajo
    weaving and microchip. So Nakamura calls
  • 14:22 - 14:28
    this insourcing, sort of outsourcing
    before outsourcing. And, you know, now
  • 14:28 - 14:32
    those laboratories and factories have
    mostly moved to Asia. But this sort of
  • 14:32 - 14:39
    period of experimentation with trying to,
    like, alienate the labor from the sort of
  • 14:39 - 14:43
    managerial home. And so now we would
    think, like, you know, your Apple products
  • 14:43 - 14:48
    as assembled in China, designed in
    Cupertino or whatever. But that kind of
  • 14:48 - 14:55
    thing, this is a sort of early moment of
    that. And so, again, I want to sort of
  • 14:55 - 14:59
    underscore that race and gender are a
    resource for global capitalism to assign
  • 14:59 - 15:05
    worth to some people's bodies and work and
    not to others. Another way that this
  • 15:05 - 15:10
    works, I don't know how much people in the
    US will remember this, let alone outside
  • 15:10 - 15:15
    of the US, but this is a student, a high
    school student who is a Sudanese American,
  • 15:15 - 15:23
    I believe, who was, you know, a geek. And
    he was enthusiastic about doing a DIY
  • 15:23 - 15:29
    electronics assembly at home where he
    built a clock and he brought it to school
  • 15:29 - 15:35
    and the school called police. And so here
    we can see that whiteness has been a
  • 15:35 - 15:41
    resource for avoiding criminalization for
    certain kinds of sort of hacky
  • 15:41 - 15:46
    activities. I'm certainly not saying that
    no white people have been criminalized for
  • 15:46 - 15:52
    hacking because that's not true. But
    certain activities get more of a pass
  • 15:52 - 15:57
    based on who's participating in them. And
    I also want to point out that this legacy
  • 15:57 - 16:06
    of division and this system of social
    sorting is flexible. In 2015, it
  • 16:06 - 16:15
    could easily be turned to islamophobic
    purposes, which is what happened here. And
  • 16:15 - 16:20
    so what I want to point out is there's
    a sort of like, you know, history of
  • 16:20 - 16:26
    division and really sort of policing who's
    in bounds and who's out of bounds for the
  • 16:26 - 16:34
    most celebrated category of technological
    agent, but I also want to sort of
  • 16:34 - 16:41
    introduce the idea that this is not
    inconsistent in a way with diversity as a
  • 16:41 - 16:49
    market value. Capitalism is actually happy
    to affirm difference if it can help sell
  • 16:49 - 16:54
    something, even though here we also see
    the sort of, you know, cultural and even
  • 16:54 - 17:03
    legal system being brought to bear to
    punish certain forms of difference. OK, so
  • 17:03 - 17:06
    at this point, this kind of statement is
    really ubiquitous. This is from 2012 from
  • 17:06 - 17:13
    a TechCrunch post. In my mind, the
    women in tech discussion should really be
  • 17:13 - 17:17
    framed as having different people with
    different experiences and different
  • 17:17 - 17:23
    outlooks helps you build a better product.
    So this is a pretty different framing of
  • 17:23 - 17:30
    difference than the one I just showed you.
    But the point is capitalism is
  • 17:30 - 17:36
    actually able to sort of reconcile these
    in these contradictions in a way. And you
  • 17:36 - 17:41
    can also see this is my name tag from a
    Google sponsored event I attended for work
  • 17:41 - 17:47
    for this book. And they're not only saying
    we need women to help us build a better
  • 17:47 - 17:53
    product, they're also reflecting back this
    sort of symbol of femininity, you know, the
  • 17:53 - 17:57
    pink Venus sign, which, of course, turns a
    lot of people off. But it's you know, if
  • 17:57 - 18:03
    you're thinking about marketing, it's a
    way to symbolize this inclusion. Right?
  • 18:03 - 18:10
    Now, I'm going to put up the only horribly
    academic slide I have for the whole talk.
  • 18:10 - 18:16
    This is a quote from Herman Gray who says,
    "Abstract notions of rights and freedom
  • 18:16 - 18:22
    and their expansion to new subjects elide
    the social salience of race and gender as
  • 18:22 - 18:26
    a basis of inequality even as it
    culturally recognizes and celebrates
  • 18:26 - 18:32
    differences." So here we can see the
    market is happy to recognize and celebrate
  • 18:32 - 18:40
    difference, to sort of take up, you know,
    women in tech or whatever, while sort of
  • 18:40 - 18:47
    papering over and doing nothing to unseat
    the sort of core, which is that race and
  • 18:47 - 18:53
    gender are bases of inequality. So you can
    sort of have this lip service, abstract
  • 18:53 - 19:00
    expansion of, you know, new identities.
    But what is sort of always intact is even
  • 19:00 - 19:04
    if you're sort of bringing one group over
    and saying, oh, you know, you're part of
  • 19:04 - 19:12
    the dominant group, now, in some way.
    The system of sorting is remaining intact
  • 19:12 - 19:18
    and in a less abstract way. Like in the US
    this summer, there is huge Black Lives
  • 19:18 - 19:24
    Matter protests, uprisings. And pretty
    quickly, all these companies started
  • 19:24 - 19:29
    saying, oh, yes, Black Lives Matter, we
    support this. You know, Amazon was really
  • 19:29 - 19:35
    prominent among them. And yet Amazon
    doesn't stop to question whether or not
  • 19:35 - 19:40
    it's exploiting racialized workforce
    during Covid with warehouse work and
  • 19:40 - 19:45
    delivery work. These are some of the
    lowest paid workers. They are not getting
  • 19:45 - 19:51
    health insurance. They're not getting
    consistent hazard pay or protection. And
  • 19:51 - 19:57
    they're dying at disproportionate rates.
    But Amazon is very happy to say black
  • 19:57 - 20:04
    lives matter as part of the PR. Similarly,
    they're still basically building
  • 20:04 - 20:11
    surveillance equipment, but there's no
    inconsistency between the sort of
  • 20:11 - 20:16
    recognition and celebration of difference
    while working to continue to cement that
  • 20:16 - 20:23
    difference and exploit that difference.
    So all of this is to say is that diversity
  • 20:23 - 20:32
    is, in my opinion, a rather toothless
    value to sort of attach to the work and
  • 20:32 - 20:39
    the sort of meaning for what's at stake
    with working with tech and with inclusion,
  • 20:39 - 20:44
    too. Diversity can sort of bring
    our attention to these patterns of social
  • 20:44 - 20:48
    difference. But if it ends there, it can
    actually kind of draw us in the wrong
  • 20:48 - 20:55
    directions without the tools we might need
    to, you know, actually make some of the
  • 20:55 - 20:59
    more justice affirming points that I
    think are why people are drawn to these
  • 20:59 - 21:05
    topics in the first place. OK, so after
    this digression, getting more some into
  • 21:05 - 21:11
    how this relates to hacking and free
    software. So I've established a sort of
  • 21:11 - 21:18
    legacy of division. And I want to sort of
    underscore that the hacking and free
  • 21:18 - 21:24
    software milieu has had this commitment to
    freedom and openness. That's definitely
  • 21:24 - 21:31
    been at the core pretty consistently. But
    historically, this has really had to do
  • 21:31 - 21:36
    with, the freedom and openness has been
    about controlling technology, some free
  • 21:36 - 21:43
    speech of course. It's definitely about
    the individual's exercise of freedom
  • 21:43 - 21:47
    without necessarily a lot of thought about
    who the individual is, who's maximally
  • 21:47 - 21:56
    empowered to be free, or it's been about
    individuals in collectives, but that are
  • 21:56 - 22:02
    relatively small and relatively
    homogenous. And so what I want to suggest
  • 22:02 - 22:08
    is this sat within the bigger context of
    tech and division, but without really
  • 22:08 - 22:14
    acknowledging this, because the freedom of
    the individual was presented as a sort of
  • 22:14 - 22:20
    universal value. Even though in practice
    it really, really wasn't. And I think
  • 22:20 - 22:26
    around 15 to 20 years ago that really
    started to change. When I started working
  • 22:26 - 22:32
    on this project, there was already a good
    deal of agitation forming some of these
  • 22:32 - 22:39
    groups in free software and related
    projects to especially draw attention to
  • 22:39 - 22:46
    the sort of disparities around women and
    Py Star was initially for sort of women,
  • 22:46 - 22:51
    and it was was trans-inclusive and I think
    pretty quickly this started as a women,
  • 22:51 - 22:58
    but then it became often non-binary and
    trans-inclusive, so not the sort of
  • 22:58 - 23:03
    essentialist version of women. Something
    happened in 2006 that really caused this
  • 23:03 - 23:11
    topic to really spring to the fore in a
    lot of these communities. There was an EU
  • 23:11 - 23:18
    policy report that came out. So the
    research was from 2004/2005 that showed
  • 23:18 - 23:26
    that the rate of participation by women
    and FLOSS was less than 2% and that was
  • 23:26 - 23:31
    significantly less even than academic and
    proprietary computer science. And so that,
  • 23:31 - 23:37
    I think, really shocked people who had
    maybe sort of intuitively known, oh, yeah,
  • 23:37 - 23:44
    this isn't very representative, but that
    number really galvanized a lot of
  • 23:44 - 23:51
    conversations and got people started
    talking and organizing basically in new
  • 23:51 - 23:56
    ways. And so I'm now going to show just a
    handful of sort of what this report
  • 23:56 - 24:05
    caused, which is a bunch of conversations.
    This is from the hackers on planet Earth
  • 24:05 - 24:12
    Hope Conference in New York in 2006. And
    it may not totally be clear what's going
  • 24:12 - 24:20
    on here, but some folks had responded to
    this statistic on the one hand and this
  • 24:20 - 24:28
    quote from this United States senator who
    had said something like, sort of gibberish
  • 24:28 - 24:33
    about he was supposed to be considering
    net neutrality and internet regulation,
  • 24:33 - 24:37
    and he said something like, the internet
    is a series of tubes. It's not a truck
  • 24:37 - 24:42
    that you dump something on. And everybody
    was making fun of him for not even, you
  • 24:42 - 24:48
    know, understanding networked computing at
    all. But these activists sort of put these
  • 24:48 - 24:53
    together in a sort of mash-up. And they
    were selling t-shirts, actually, that said
  • 24:53 - 24:58
    "The Internet: A Series of Tubes". And as
    you can see, that's a sort of textbook
  • 24:58 - 25:03
    representation of a female reproductive
    system. And so they just sort of brought
  • 25:03 - 25:08
    this to the conference and they were
    trying to force a conversation about it
  • 25:08 - 25:12
    because they estimated, this is not an
    official count, but they estimated that
  • 25:12 - 25:19
    there were maybe, the ratio of women to
    men at Hope was like 1:40. And so they
  • 25:19 - 25:25
    just wanted to force a conversation about
    this. This is an artifact from a little bit
  • 25:25 - 25:33
    later, 2014, about the rise of explicitly
    dedicated feminist hacker spaces, and this
  • 25:33 - 25:40
    is from the US and it's just a flyer for a
    Zine-making workshop, which is again, a
  • 25:40 - 25:47
    pretty mundane thing, but just the sort of
    difference between the 2006 sort of flag
  • 25:47 - 25:51
    planting and something a bit later where
    there's actually a separate space here.
  • 25:51 - 25:58
    And crucially, Zine-making isn't
    necessarily in bounds with traditional
  • 25:58 - 26:06
    hacking, but it is closer to sort of
    strands of feminist consciousness raising
  • 26:06 - 26:12
    and riot grrrl. And so there's a sort of
    intermingling of these different kind of
  • 26:12 - 26:19
    threads of DIY, basically. This is another
    artifact from someone in Philadelphia who
  • 26:19 - 26:26
    was an artist and a designer and was
    trying to find a way from the stuff that
  • 26:26 - 26:34
    she knew how to do with craft and sewing
    and find a way into electronics and soft
  • 26:34 - 26:43
    circuits and doing new things. And so she,
    kind of for her own exploration, knitted a
  • 26:43 - 26:50
    scarf using Ethernet cables. And for
    her this was a kind of speculative object
  • 26:50 - 26:55
    that was meant to help her find her way
    into electronics, but also to kind of
  • 26:55 - 27:02
    start conversations about why haven't
    these things gotten together. Also seeing
  • 27:02 - 27:12
    gatherings like this one, a more sort of
    explicitly radicalized feminist hacking
  • 27:12 - 27:16
    convergence. And I don't know if everybody
    can read all the text, but it says
  • 27:16 - 27:21
    "Trans Futuristic Cyborgs, anti-racist,
    anti-sexist, gynepunk, DIY-DiWO - so taking
  • 27:21 - 27:33
    DIY of a sort of heroic individualist to
    doing it with others, making it more
  • 27:33 - 27:39
    self-consciously collective and less
    individualist self-reliant. It also says
  • 27:39 - 27:44
    gender-hacking, anti-capitalism, libre
    culture, technologies, bio-hacking. So
  • 27:44 - 27:53
    again a sort of spectrum of politics and
    interventions around hacking and feminist
  • 27:53 - 28:01
    hacking. And I'm going to dwell for a
    moment on feminist servers. Haven't spent
  • 28:01 - 28:07
    too much, haven't had too much text on
    slides. But this one is. So these are
  • 28:07 - 28:12
    artifacts that were on the one hand,
    basically, like an independently
  • 28:12 - 28:18
    maintained server run primarily by women-
    identifying folks or non-masculine
  • 28:18 - 28:25
    identifying folks running free software,
    but they're also a sort of list of
  • 28:25 - 28:31
    networking principles that gets out of
    that more kind of literal artifactual mode
  • 28:31 - 28:42
    into a more sort of speculative and
    aspirational sort of politics of what it
  • 28:42 - 28:47
    means to be doing this. And so the first
    couple- it's actually a very long list and
  • 28:47 - 28:51
    I only have a handful up here - the first
    couple, I think, are very consonant with
  • 28:51 - 28:59
    kind of mainstream hacking, wants networks
    to be mutable and read-write accessible,
  • 28:59 - 29:02
    and radically questions the conditions for
    serving and service experiments with
  • 29:02 - 29:08
    changing client-server relations. Those,
    again, seem kind of axiomatic for
  • 29:08 - 29:14
    mainstream hacking. But then the feminist
    server starts to go in some other
  • 29:14 - 29:19
    directions; is autonomous in the sense
    that she decides her own dependencies. I
  • 29:19 - 29:23
    think this one's really interesting and
    important. It's again, it's getting away
  • 29:23 - 29:31
    from this kind of heroic, individualistic
    or almost sort of libertarian sense of
  • 29:31 - 29:36
    autonomy. It's just the autonomy is about
    deciding where you're dependent and being
  • 29:36 - 29:43
    sort of transparent and open about that.
    It's not about bootstrapping or being
  • 29:43 - 29:49
    individually self-sufficient; does not
    strive for seamlessness, division of
  • 29:49 - 29:54
    labor; the not so fun stuff is made by
    people. That's a feminist issue. That one,
  • 29:54 - 29:59
    I think is really important. A lot of
    hacking that goes on in, say, a Global
  • 29:59 - 30:08
    North context is about the artifacts and
    the practices in that moment. But here
  • 30:08 - 30:13
    this is, if it's not clear, drawing
    attention to where did that come from, it
  • 30:13 - 30:19
    shouldn't be a seamless experience for you
    not thinking about the pre-history, the
  • 30:19 - 30:24
    supply chain of this artifact, which
    actually started with mining and
  • 30:24 - 30:33
    fabrication and assembly and shipping. And
    will also have a post-use life, which
  • 30:33 - 30:41
    might be recycling, might be very
    hazardous reclaiming of precious metals
  • 30:41 - 30:47
    by people without good labor protections,
    or might not. But sort of instead of
  • 30:47 - 30:53
    having this all be invisible, sort of
    drawing it forward treats technology as
  • 30:53 - 30:56
    part of a social reality. This is a big
    one, but it's really just sort of opening
  • 30:56 - 31:02
    up the space to acknowledge that legacy of
    division that I was talking about earlier.
  • 31:02 - 31:08
    And takes the risk of exposing her
    insecurity. I like this one so much. It's
  • 31:08 - 31:13
    it's really evocative on a few levels. But
    at the most sort of basic level, what I
  • 31:13 - 31:18
    want to point out is that it's very
    different than, again, a sort of threat or
  • 31:18 - 31:24
    a strand of hacking that's about owning
    hard, or mastery or something. Instead,
  • 31:24 - 31:34
    it's being, you know, sort of present with
    oneself and with others and disclosing
  • 31:34 - 31:41
    insecurities, which could be network
    insecurities or personal ones. Right. So
  • 31:41 - 31:46
    it's taking what it means to be engaging
    in hacking and all these new and sort of
  • 31:46 - 31:52
    mutated directions. One more example from
    the sort of feminist hacking that I want
  • 31:52 - 31:59
    to just tell you about for a second was
    this exercise. I was at a feminist hacking
  • 31:59 - 32:06
    convergence in Montreal in 2016 and people
    did a exercise in understanding public key
  • 32:06 - 32:14
    cryptography as a dance where, you know,
    instead of learning about this theory,
  • 32:14 - 32:19
    people actually tried to embody it. So
    placing your body in the relationship with
  • 32:19 - 32:25
    tech and often some of these things happen
    in kind of explicitly separate spaces, but
  • 32:25 - 32:31
    going through the principles of
    cryptography in a spontaneously
  • 32:31 - 32:37
    choreographed dance and then performing it
    all together. OK, so these are some of the
  • 32:37 - 32:42
    ways, the mutant strains of feminist
    hacking. I don't want to suggest that this
  • 32:42 - 32:48
    has been just a very linear and conflict-
    free progression. And so I do want to
  • 32:48 - 32:55
    dwell for a moment on just a single
    instance of conflict, which probably
  • 32:55 - 32:58
    the details will be unfamiliar, but there
    might be a sort of wider recognition
  • 32:58 - 33:07
    I think. So this is from a hackerspace in
    Philadelphia in 2011 and a handful of
  • 33:07 - 33:16
    members of the space proposed holding an
    event to hack sex toys, and they thought
  • 33:16 - 33:24
    it was a pretty uncontroversial suggestion,
    the same as having an Arduino night or a
  • 33:24 - 33:29
    ... you know, I'm making stuff up. But
    they sort of put it out there as this:
  • 33:29 - 33:34
    well, let's do this on the Saturday. And
    they were really surprised when a bunch of
  • 33:34 - 33:39
    other members of the space were very
    opposed to it. And this is in the book.
  • 33:39 - 33:47
    It's a design for a DIY flogger made from
    a bicycle tube. And this was on the
  • 33:47 - 33:53
    proposed sort of flier for the event. And
    so what happened was they were really
  • 33:53 - 33:57
    surprised that other people in the space
    were sort of like, no, no, we don't want
  • 33:57 - 34:01
    to have this here. We don't think it's
    appropriate. And so here's a quote from
  • 34:01 - 34:09
    one of the people who was opposing the
    event. And he says: "A lot of the hackers
  • 34:09 - 34:14
    here at the space are the Make Magazine/
    Instructables type, not the Julian
  • 34:14 - 34:19
    Assange HOPEconference attending type or
    even the kind that cares much about a
  • 34:19 - 34:26
    global movement of hacker spaces. I'm not
    sure what category dildo-hacking falls in.
  • 34:26 - 34:34
    For a lot of people, DIY has to do with
    the sort of father-son nostalgia", end
  • 34:34 - 34:45
    quote. So this is really interesting,
    because we've got this acknowledgment of
  • 34:45 - 34:52
    hacking being a variety of things, and
    maybe again, for some people in a European
  • 34:52 - 34:57
    context where hacker spaces are often
    more political, maybe this Make Magazine
  • 34:57 - 35:07
    sort of home-project, personal fabrication
    will be a little bit unrecognizable or
  • 35:07 - 35:13
    even disappointing, but it is part of
    hacking and making in the US. And then, of
  • 35:13 - 35:20
    course, there's the "information wants to
    be free" HOPE-conference, lock-picking all
  • 35:20 - 35:26
    these kinds of things, hacking that he
    acknowledges. But he he says, I'm not sure
  • 35:26 - 35:33
    what dildo-hacking is, maybe suggesting
    it's not even hacking at all. And then he
  • 35:33 - 35:37
    says, for a lot of people, DIY has to do
    with this father-son nostalgia, which I
  • 35:37 - 35:42
    hope might make you think of the picture
    I had up at the very beginning of the
  • 35:42 - 35:51
    father-son with the radio apparatus. And
    so it's really interesting that this sort
  • 35:51 - 35:55
    of proposal that these people didn't think
    of as being controversial turned into
  • 35:55 - 36:02
    this, pretty full on argument about what
    even hacking is in the sort of essential
  • 36:02 - 36:10
    way. And so here's a reply from one of the
    people who had proposed the workshop, and
  • 36:10 - 36:16
    she says: "So my concern here is that it's
    a hackerspace. Initiative shouldn't be
  • 36:16 - 36:21
    punished, particularly initiative that
    shakes up old patterns. Our space is
  • 36:21 - 36:26
    really stratifying into hardware-tinkering
    as the core interest , and white males as
  • 36:26 - 36:33
    the demographic. I'm really frustrated.",
    end quote. And so this again, I assume
  • 36:33 - 36:42
    that this is fairly recognizable to folks.
    Right? If the core of what hacking is, is
  • 36:42 - 36:48
    taking it upon yourself to take artifacts
    and practices that you already know how to
  • 36:48 - 36:55
    do in a new direction; like that's what
    hacking is, according to a lot of people.
  • 36:55 - 36:58
    And so she's really surprised and really
    dismayed and really, I think felt very
  • 36:58 - 37:09
    hurt and rejected that this was flaring as
    controversy, and was really surprised that
  • 37:09 - 37:16
    people were sort of raising the prospect
    that dildo-hacking was interruption of
  • 37:16 - 37:25
    a nostalgic father-son tech practice, that
    was somehow offensive. Certainly, it seems
  • 37:25 - 37:31
    like part of the problem might have been
    the introduction of sexuality and maybe
  • 37:31 - 37:34
    questions about whose sexuality;
    sexuality that didn't seem to center
  • 37:34 - 37:41
    straight men. What happened was this
    didn't get resolved. The people who had
  • 37:41 - 37:48
    proposed the workshop - included women,
    men and non-binary people - actually left.
  • 37:48 - 37:56
    They decamped to a new space that was
    forming, that was forming with more kind
  • 37:56 - 38:01
    of feminist hacking principles and
    welcomed them there. And the first space
  • 38:01 - 38:08
    stayed how they were and didn't have to
    keep having conflicts and grapple with
  • 38:08 - 38:12
    this kind of controversy anymore because
    the people - and they weren't kicked out -
  • 38:12 - 38:23
    but they decided to leave. And so, I know
    these conflicts have been very painful and
  • 38:23 - 38:27
    and alienating for people who have
    experienced them, even though maybe the
  • 38:27 - 38:32
    content of this one seems almost funny or
    something in hindsight. But what I want to
  • 38:32 - 38:40
    propose is that part of why this has been
    so difficult for people in these spaces is
  • 38:40 - 38:46
    that people are actually wrestling with
    this whole legacy of division that I laid
  • 38:46 - 38:51
    out in the first part of the talk. So it
    may feel like you're just having an
  • 38:51 - 38:57
    argument with your fellow group members
    who are a lot like you, but then you're
  • 38:57 - 39:03
    breaking down along some kind of line that
    you both can't cross over to with the
  • 39:03 - 39:13
    other one. But there's a sort of really
    deep sedimentary layer of who has been
  • 39:13 - 39:22
    anointed the sort of power of agency over
    tech and for whom that has been sort of
  • 39:22 - 39:26
    a taken for granted tacit assumption and
    who's had to sort of assert their presence
  • 39:26 - 39:30
    or their right to be there in different
    ways. And so when there are these
  • 39:30 - 39:34
    conflicts and flashpoints, all of that
    stuff is there. And that's actually really
  • 39:34 - 39:42
    hard to solve anywhere. But it's very,
    very hard to solve in elective
  • 39:42 - 39:47
    volunteeristic associations, I think, also
    so not not to say impossible, but there's
  • 39:47 - 39:57
    a reason these conflicts are difficult.
    OK, so returning to diversity and this is
  • 39:57 - 40:04
    the same quote, I won't read it again, but
    the sort of idea that women in tech are
  • 40:04 - 40:10
    there to bring forward different
    experiences and build a better product.
  • 40:10 - 40:14
    Diversity is maybe necessary to start
    these conversations, or the idea of
  • 40:14 - 40:20
    diversity, but I don't think it's
    sufficient for the purposes here. It's too
  • 40:20 - 40:26
    easily sitting alongside market values,
    which I think are not what people in
  • 40:26 - 40:31
    hackerspaces are primarily most
    interested in. And that's not really why
  • 40:31 - 40:37
    they're there. And it's also very easily
    steered away from the important political
  • 40:37 - 40:43
    work that I think people in hacking
    communities often want to do. It can sort
  • 40:43 - 40:49
    of mutate into this contradictory thing
    where you've got sort of market values on
  • 40:49 - 40:54
    the one hand, and something that isn't
    what you set out to do on the other hand,
  • 40:54 - 40:58
    and I'm going to illustrate that with this
    somewhat more provocative example. This is
  • 40:58 - 41:05
    a meme I stole from the internet. But the
    point here is that you can make these
  • 41:05 - 41:11
    diversity affirming slogans. And here
    we've got "Black Lives Matter" and "Yes,
  • 41:11 - 41:19
    we can" and LGBT sort of flags or slogans
    on a bomber. You can make these diversity
  • 41:19 - 41:25
    affirming slogans fit within a system that
    is fundamentally violent, carceral,
  • 41:25 - 41:30
    militarized. It doesn't necessarily
    challenge the system itself to bring
  • 41:30 - 41:36
    forward individuals' identities as members
    of marginalized groups. In fact,
  • 41:36 - 41:41
    capitalism is actually quite happy to
    resolve what might seem like contradiction
  • 41:41 - 41:46
    here, by commodifying identity, selling
    it as a brand without resolving the
  • 41:46 - 41:52
    fundamental tensions that we know that are
    here, that have to do with social power
  • 41:52 - 41:58
    and dominance and exploitation. So coming
    back to the free software quote from the
  • 41:58 - 42:05
    beginning, as I said, this sort of hit
    consensus, but I'm actually going to argue
  • 42:05 - 42:10
    it's not really going far enough. Diverse
    participation and making proprietary
  • 42:10 - 42:16
    software extinct are fine, but I think
    they actually do not fully capture what's
  • 42:16 - 42:22
    at stake in these very tough conversations
    that have been happening in hacking and
  • 42:22 - 42:31
    free software groups. And so, we might
    think of this as, again, a point of entry,
  • 42:31 - 42:35
    but we might want to take it a bit
    farther. And this is as far as I'll go
  • 42:35 - 42:44
    with prescriptions or how-to. So specific
    in local voluntaristic communities that
  • 42:44 - 42:50
    are either your hackerspace in the city
    you live in or the the project that you...
  • 42:50 - 42:56
    that's distributed, but that you work on.
    So articulate values and politics.
  • 42:56 - 43:02
    Diversity is a good one. But I'm going to
    say it's necessary and not sufficient. And
  • 43:02 - 43:06
    some of the things that I talk about in
    the book include like other forms of
  • 43:06 - 43:14
    political beliefs, like decolonization or
    attention to militarism that can actually
  • 43:14 - 43:19
    sort of force you to have sometimes harder
    conversations, but ones that can clarify
  • 43:19 - 43:26
    values and goals. Obviously, I don't need
    to tell hacking groups, but keep
  • 43:26 - 43:33
    theorizing and keep experimenting. That is
    a way, whether it's crypto dancing or not,
  • 43:33 - 43:39
    it's a way to sort of like walk yourself
    through what you're trying to sort of
  • 43:39 - 43:43
    build and iterate. And within spaces - I
    think at this point this is fairly
  • 43:43 - 43:47
    uncontroversial, but I do chronicle in the
    book how people got here - making and
  • 43:47 - 43:54
    enforcing rules, having conversations
    sometimes one on one, not a sort of public
  • 43:54 - 44:01
    conflagration, flame war. But if people
    feel safe, respect each other enough
  • 44:01 - 44:08
    to actually talk through what is the sort
    of point of contention or difference and
  • 44:08 - 44:13
    see if you can understand one another. The
    other thing I want to point out though, is
  • 44:13 - 44:19
    that there's a whole lot of stuff going on
    here that is much, much bigger than the
  • 44:19 - 44:25
    spaces and communities that you're in. And
    so it is kind of a mistake and no one's
  • 44:25 - 44:31
    fault that you can't solve all of this in
    the groups that you're in. And so there
  • 44:31 - 44:38
    also has to be much bigger society-wide
    goals that we all have our eyes on,
  • 44:38 - 44:44
    because if we solve some of this stuff,
    then, lo and behold, quote, "diversity in
  • 44:44 - 44:48
    tech" would be a lot easier and probably
    less fraught and contentious. But things
  • 44:48 - 44:55
    like demilitarization, supply chain
    justice, basic social equity, workplace
  • 44:55 - 45:01
    fairness, public reconciliation - I'm
    giving US examples here - reparations,
  • 45:01 - 45:08
    land back. And obviously the one that's
    coming for all of us, climate, is going to
  • 45:08 - 45:13
    be the biggest problem. It already is the
    biggest problem in terms of, you know,
  • 45:13 - 45:20
    racial and economic and environmental
    justice worldwide. So in conclusion, my
  • 45:20 - 45:25
    little take home slogan is that there's no
    hack or tech audit for justice, but there
  • 45:25 - 45:31
    are these different levels and you can work
    on one and work on another, but you can't
  • 45:31 - 45:37
    solve the really big stuff in the sort of
    tech domain. And that's not a shortcoming,
  • 45:37 - 45:43
    and it's not for lack of trying. That is
    all. I'm very happy to quit talking so
  • 45:43 - 45:48
    much and move to Q&A. Thank you so much
    for your attention. Thanks.
  • 45:48 - 45:52
    Herald: All right. Thank you.
    Dunbar-Hester: Thank you.
  • 45:52 - 46:02
    Herald: All right, everyone, questions on
    Twitter, Mastodon, #rc3-two on IRC. We
  • 46:02 - 46:06
    wait for a little bit and ask the
    questions in the meantime. So this
  • 46:06 - 46:12
    research for this book, when
    did you actually do it, like timewise?
  • 46:12 - 46:18
    Dunbar-Hester: Yeah, it started, it
    actually, we were talking before we had an
  • 46:18 - 46:23
    audience a little bit about radio. And my
    earlier project was about people building
  • 46:23 - 46:30
    radio stations and - try to be brief - but
    they had a very emancipatory set of ideas
  • 46:30 - 46:35
    about what it meant to teach people how to
    build electronics or solder a transmitter
  • 46:35 - 46:40
    board or something. But they kept running
    into some of these patterns of exclusion
  • 46:40 - 46:47
    that I mentioned. And so it was actually
    through them that I heard about these
  • 46:47 - 46:51
    conversations that were starting to happen
    in and hacking and open source communities
  • 46:51 - 46:57
    where people were trying to directly head-
    on confront some of this stuff. So I think
  • 46:57 - 47:03
    I heard about it in around the 2006 era,
    started working on it, maybe... It's about
  • 47:03 - 47:09
    2010 to about 2015, is the period
    that I was actively, you know, going to
  • 47:09 - 47:14
    conferences and meet-ups and spaces and
    interviewing people. So it's this sort of
  • 47:14 - 47:18
    snapshot. Yeah, that's the shortest
    answer. Thanks.
  • 47:18 - 47:23
    Herald: All right. That's very interesting
    because I kept thinking if you had
  • 47:23 - 47:27
    encountered this sort of rise of the alt-
    right or something like this, because I
  • 47:27 - 47:31
    feel like in the last couple of years,
    these discussions have just become so much
  • 47:31 - 47:35
    more radicalized and not from the left,
    but from the right, like where you can
  • 47:35 - 47:40
    basically no longer talk about this
    without just all hell breaking loose.
  • 47:40 - 47:42
    Right?
    Dunbar-Hester: I think that's a really
  • 47:42 - 47:47
    interesting point. And I think you're
    right. This does, I mean, I was finishing
  • 47:47 - 47:51
    the book during the Trump era over here,
    and I know you've got your own counterparts
  • 47:51 - 47:58
    in Europe, but this is all very much within
    that kind of Obama liberal, neo liberal
  • 47:58 - 48:03
    framing. And actually something I wrote
    about, I think it's in the intro of the
  • 48:03 - 48:11
    book, is the Obama White House had a women
    in STEM, as part of a women and people of
  • 48:11 - 48:17
    color in STEM, as part of a kind of
    national security and a nationalist agenda
  • 48:17 - 48:23
    basically on their page. And the Trump
    administration took it down. So I think,
  • 48:23 - 48:33
    and also in the book, there's a discussion
    of a channel for Polish Python users where
  • 48:33 - 48:39
    they were like fretting about how to ban
    Nazis from the channel and whether Nazis
  • 48:39 - 48:45
    were just people showing up and throwing
    swastikas all over the IRC channel,
  • 48:45 - 48:50
    whether that was "trolling" or whether it
    was real Nazis. And, yes, I think the sort
  • 48:50 - 49:00
    of stakes of some of this has gotten a lot
    more stark. And so in certain ways,
  • 49:00 - 49:04
    the sort of "which side are you on?"-
    questions are easier, but the sort of
  • 49:04 - 49:11
    depth of what's at stake and what's being
    defended is maybe harder. So, yeah, the
  • 49:11 - 49:17
    political context is sort of
    temporal is really is part of this, yeah.
  • 49:17 - 49:23
    Herald: All right. Now we turn to the IRC.
    Have you looked into the woman in FLOSS as
  • 49:23 - 49:28
    perhaps being one with predominantly
    engineers as mothers/fathers?
  • 49:28 - 49:33
    Dunbar-Hester: Sorry, could you repeat
    women in FLOSS ...?
  • 49:33 - 49:37
    Herald: I think the question is whether
    you have sort of noticed a pattern that
  • 49:37 - 49:42
    women that get into these spaces, sort of,
    by their parents, have encountered
  • 49:42 - 49:46
    engineering, I think it's a familiar
    context.
  • 49:46 - 49:53
    Dunbar-Hester: Yes, I have not personally
    done research on that, but it does,
  • 49:53 - 50:03
    y'know, sort of other historical and
    sociological research shows that people
  • 50:03 - 50:12
    who are exposed at a young age,
    that's part of the differential. And even,
  • 50:12 - 50:18
    even in households where, say, a computer
    came home early on, we're talking about a
  • 50:18 - 50:24
    slightly older generation. A computer came
    home early on because parents brought it
  • 50:24 - 50:31
    into the house. You know, boys were more
    likely to sort of claim it as theirs or
  • 50:31 - 50:35
    take time on it or start playing with it
    even a couple or a few years earlier than
  • 50:35 - 50:40
    girls. And so, yeah, I haven't looked at
    that, the sort of life narratives
  • 50:40 - 50:44
    directly, but other people have. And I
    draw on that. And that's also something I
  • 50:44 - 50:50
    am hearing now from people who are adults
    and are thinking about these problems and
  • 50:50 - 50:59
    how they want to not have their own kids
    encounter the same problems or sort of
  • 50:59 - 51:02
    legacy of division. You definitely hear
    people saying, "I want this to get solved
  • 51:02 - 51:07
    so my daughter doesn't have a hard time."
    But that's a little outside of what
  • 51:07 - 51:13
    I've looked at, but it feeds in, yeah.
    Herald: All right. All right. This is a
  • 51:13 - 51:16
    slightly longer question. I'll try to do
    my best: I've witnessed a lot of white
  • 51:16 - 51:24
    feminism in FOSS, that's free open source
    software, right? And FOSS diversity, equity
  • 51:24 - 51:30
    and inclusions. DEI Spaces. Is
    intersectionality sufficiently recognized
  • 51:30 - 51:36
    as an issue in FOSS feminism, or is it
    actually worse off due to the low number
  • 51:36 - 51:39
    of women in FOSS, around 2%.
  • 51:39 - 51:46
    Dunbar-Hester: Great. Yeah. So I couldn't.
    At first I would flag that the numbers in
  • 51:46 - 51:52
    FOSS have started to change. There's later
    research that shows that they're up some.
  • 51:52 - 51:57
    The question about white feminism is a
    really good one. And I do write in the
  • 51:57 - 52:08
    book about people sort of grappling with
    that. And so the sort of trajectory was
  • 52:08 - 52:18
    the first category that people started to
    notice of exclusion was women, and I think
  • 52:18 - 52:27
    I discussed how women opened up pretty
    quickly to being non essentialist and
  • 52:27 - 52:32
    again, inclusive of trans and non binary
    sorts of identities. But I think that the
  • 52:32 - 52:40
    race and the what I sometimes talk about
    is sort of global positioning, the Global
  • 52:40 - 52:47
    North hackers in Europe and North America.
    It is harder, I think, for them to sort of
  • 52:47 - 52:56
    deal as head on with, you know, race. And
    I mean, these are fundamental questions of
  • 52:56 - 53:04
    racial capitalism. And so being positioned
    within fairly well advantaged Global North
  • 53:04 - 53:10
    communities, it is harder to confront some
    of those issues. I think there's a
  • 53:10 - 53:15
    consciousness of it, but I would say it's
    a lot. What I observed was a lot greater
  • 53:15 - 53:23
    awareness and sort of development of
    potential solutions for being inclusive of
  • 53:23 - 53:32
    women than a sort of really broadly
    intersectional notion of women, including
  • 53:32 - 53:38
    people in Global South positions and in
    racialized categories in the Global North.
  • 53:38 - 53:43
    And again, I think there's been a
    sort of probably a shift in attention to
  • 53:43 - 53:50
    that, some of which postdates the
    period in the book. But I also think that
  • 53:50 - 53:55
    that it's uniquely hard, I think, to
    solve in volunturistic groups because the
  • 53:55 - 54:00
    forces, at least in the US and I would
    speculate in Europe as well, like the
  • 54:00 - 54:10
    forces that cause inequality and
    segregation. And, you know, like the tech
  • 54:10 - 54:13
    industry is a really good place to see
    these contradictions, like what's going on
  • 54:13 - 54:22
    now with, like Google and the firing of Dr
    Timnit Gebru is. You know, places where
  • 54:22 - 54:30
    there's a sort of capitalistic incentive
    are not going to be able to solve these
  • 54:30 - 54:35
    problems of inequality because the profit
    motive is always going to be there to
  • 54:35 - 54:43
    build surveillance tech, to assist
    countries and that want to
  • 54:43 - 54:49
    build prisons. Again, this is what's
    coming with climate stuff. And so saying,
  • 54:49 - 54:55
    oh, you need to hire more black women or
    something is like running smack into these
  • 54:55 - 54:59
    contradictions. And this is part of why I
    say this really can't be solved within
  • 54:59 - 55:03
    tech. And these are very big, thorny
    issues. Another thing the final thing I'll
  • 55:03 - 55:10
    point out this is sort of rambling is for
    a voluntaristic group, it's gonna be
  • 55:10 - 55:16
    easier to make fairly small interventions.
    And so I think that that's. I actually
  • 55:16 - 55:20
    have somebody talking about this, like if
    we make the space more inclusive to
  • 55:20 - 55:28
    anybody and say bad behavior isn't here or
    isn't welcome here, you know, that can hit
  • 55:28 - 55:33
    a note where it might cause there to be a
    sort of more inclusive community that
  • 55:33 - 55:36
    would be welcoming to a bunch of different
    kinds of folks. But it's not necessarily
  • 55:36 - 55:44
    realistic to tailor in a voluntaristic group
    that's more a response to the sort of forms
  • 55:44 - 55:50
    of exclusion all the kinds of
    different people have experienced. And so,
  • 55:50 - 55:55
    again, I think this is kind of a question
    of scale, but I really do think that the
  • 55:55 - 56:00
    sort of way that voluntaristic groups,
    i.e. not the market, not workplaces,
  • 56:00 - 56:06
    articulate, you know, what they think the
    problems are and how
  • 56:06 - 56:10
    they can sort of begin to talk about
    solutions are really important precisely
  • 56:10 - 56:19
    because they're not hamstrung by the same
    contradictions that for profit spaces are.
  • 56:19 - 56:24
    That was a long ... That's a really great
    question. I do take it up. Some are the
  • 56:24 - 56:27
    people I was writing about. I think we're
    starting to take it up. It's probably
  • 56:27 - 56:31
    more full throated now. And it's very
    complicated.
  • 56:31 - 56:34
    Herald: Yes, all of these things.
    Dunbar-Hester: Yeah.
  • 56:34 - 56:39
    Herald: Alright, we do have an interesting
    question: "Would you advise people to try
  • 56:39 - 56:46
    to change communities from within or just
    start new structures with more intersexual
  • 56:46 - 56:48
    spaces?"
    Dunbar-Hester: I don't have a great answer
  • 56:48 - 56:58
    to that. I think it is kind of the
    pressing question of the day, I think in a
  • 56:58 - 57:11
    lot of a lot of spaces, and I see good
    answers on both sides, and I think it
  • 57:11 - 57:23
    depends perhaps. I do see a virtue in
    some space being set aside, but how that a
  • 57:23 - 57:31
    separate space chooses to interface with a
    sort of wider space is going to vary. And
  • 57:31 - 57:34
    I don't think, I don't think it's
    necessarily a binary like you're either
  • 57:34 - 57:40
    totally outside or you're within having a,
    you know, a big discussion about how to be
  • 57:40 - 57:45
    maximally inclusive. I think those things
    are always kind of dialogically happening.
  • 57:45 - 57:50
    But I've seen people argue both sides of
    it, and I've seen, I think, compelling
  • 57:50 - 57:59
    answers on both sides of it. But, yeah, it
    is kind of the place where the idea that
  • 57:59 - 58:06
    we're sort of all taking up this project
    together can start to, you know, break
  • 58:06 - 58:10
    down. And some people think you're really
    losing. A lot of people go off and stop,
  • 58:10 - 58:19
    you know, working together as some sort of
    unified group. And so, yeah, I don't
  • 58:19 - 58:23
    have a great answer that. I do write
    about it in the book. And I would say it
  • 58:23 - 58:26
    depends on what the goals are. I think
    having some separate space is probably
  • 58:26 - 58:30
    important in any event.
    Herald: Yeah, it seems like it is like
  • 58:30 - 58:35
    these kind of hackerspace have at least
    the advantage of being able to accommodate
  • 58:35 - 58:40
    sort of subgroups, right. So you can have
    these certain events, certain working
  • 58:40 - 58:45
    groups that can focus on these issues. For
    example, I think our host today, the xHain
  • 58:45 - 58:50
    hackerspace in Berlin, just started this
    talk series "Gespräch unter Bäumen", which
  • 58:50 - 58:55
    is just "Talks below the trees", they have
    a LED tree in their hackerspace, and it
  • 58:55 - 58:58
    just sort of naturally happened that it
    had only women as speakers and it was just
  • 58:58 - 59:02
    this lovely natural evolution of just
    having much more interesting topics and
  • 59:02 - 59:08
    not just, you know, the traditional male
    hacker kind of topics. So I think it's
  • 59:08 - 59:11
    really cool. And you just have this
    ability to have these initiatives inside
  • 59:11 - 59:21
    existing spaces somehow, but - just a rant
    from my side. Someone had a question, the
  • 59:21 - 59:24
    title of the book is just "Hacking
    Diversity", right? I think we mentioned
  • 59:24 - 59:27
    this at the beginning.
    Dunbar-Hester: Yeah, I think the whole
  • 59:27 - 59:31
    title, if you look for hacking diversity,
    you'll find it. My name, Princeton
  • 59:31 - 59:39
    University Press. Yeah. I'll not be
    shameless and say it's on very deep sale
  • 59:39 - 59:44
    right now. If you were to buy it from
    Princeton directly, there's a discount
  • 59:44 - 59:53
    code and it's on my Twitter. It's I think
    it's "H - D - E - V - S" anyway - it's
  • 59:53 - 59:56
    40% percent off through like February.
    Herald: Nice.
  • 59:56 - 60:00
    Dunbar-Hester: Yeah. It's very affordable.
    Herald: Alright, can you comment on how
  • 60:00 - 60:04
    structures like GitHub that predominantly
    value codes and missions and other highly
  • 60:04 - 60:09
    formalized tasks over community building
    and less technical contributions play into
  • 60:09 - 60:16
    this nexus?
    Dunbar-Hester: Yes, absolutely. I mean,
  • 60:16 - 60:22
    historically, the focus on the
    artifact, what you could produce, the
  • 60:22 - 60:31
    code, even hardware, has taken on this
    sort of exalted, symbolic meaning, and it
  • 60:31 - 60:36
    has definitely contributed to both the
    denigration and the invisibility of people
  • 60:36 - 60:43
    who weren't doing that kind of work and
    who might be doing community building or
  • 60:43 - 60:50
    even things documentation or translation,
    right? With it's being global practices
  • 60:50 - 60:56
    that the sort of authors of the code are
    getting the sort of priesthood
  • 60:56 - 61:01
    status and everyone else is sort of lower.
    I think, again, awareness of that is
  • 61:01 - 61:09
    starting to change, but it's definitely
    contributed to again historical sense that
  • 61:09 - 61:15
    there was underrepresentation of some
    kinds of folks. And I think there are ways
  • 61:15 - 61:22
    you can, it sort of starts with raising
    awareness of this. But again, that sort of
  • 61:22 - 61:29
    signal, the celebration of the the
    technologist is coming in from all these
  • 61:29 - 61:35
    other places in the culture. And so
    deprogramming that or something, as it
  • 61:35 - 61:42
    were, is is tough, but not impossible. And
    again, I see that, I see that actually, at
  • 61:42 - 61:48
    least here as part of the sort of bigger
    cultural war. And, you know, the idea that
  • 61:48 - 61:55
    the sort of tech is the, you know, godly
    apparatus and everything else is, you
  • 61:55 - 62:02
    know, humanities and squishy soft stuff we
    don't need that's going to fall away.
  • 62:02 - 62:08
    Yeah, it doesn't have to be as big of
    a topic as that, but that's again, it's
  • 62:08 - 62:13
    all kind of in there. I don't know if
    that answered a question, but, yes, that's
  • 62:13 - 62:18
    there. And I think that's something that
    the first step in addressing it can be
  • 62:18 - 62:24
    acknowledging it and and building forms of
    collaboration and that are not just sort
  • 62:24 - 62:30
    of like nominally non hierarchical, but
    specifically raising visibility and
  • 62:30 - 62:33
    sort of credit giving to other kinds of
    contributions.
  • 62:33 - 62:38
    Herald: So do you feel as someone that is
    actually a science and technology scholar
  • 62:38 - 62:43
    that this feels as like is finally getting
    recognized as something that exists and is
  • 62:43 - 62:47
    real? Because I always have this impression
    that people just assume this doesn't exist
  • 62:47 - 62:52
    and no one thinks about this except them
    and there is an entire academic field
  • 62:52 - 62:56
    about it. Do you think this is changing or
    is it just to say?
  • 62:56 - 63:01
    Dunbar-Hester: I don't know. I mean, I
    think that there's a there's a lot of
  • 63:01 - 63:12
    visibility on the one hand and even, you
    know, something in the US with and who
  • 63:12 - 63:17
    knows what will be happening after COVID,
    but, you know, public school systems were
  • 63:17 - 63:23
    having their budgets cut after the first
    financial crisis in 2008. And one of the
  • 63:23 - 63:27
    things that was being proposed was moving
    a hackerspace into a high school and sort
  • 63:27 - 63:35
    of having that, you know, come forward and
    do things that institutions had maybe once
  • 63:35 - 63:46
    been doing. I think that that again, I'll
    keep coming back to the tension between
  • 63:46 - 63:52
    what I think some of the most interesting
    voluntaristic and politicized sort of
  • 63:52 - 63:59
    goals for these kinds of activities, them,
    versus what the market wants them to do,
  • 63:59 - 64:06
    are, are sort of in tension. And there was
    a moment where I was interviewing someone,
  • 64:06 - 64:12
    maybe and I want to say 2012, and I was
    asking him questions about free software
  • 64:12 - 64:17
    and he was very kind but he said something
    like, "Why are you asking me about free
  • 64:17 - 64:24
    software? Like that's dead.", you know,
    like Open Source 1.0 - sort of. And I'm
  • 64:24 - 64:31
    not the only person who's written about
    that at all, but I think this sort of idea
  • 64:31 - 64:38
    that there's something here that can't
    just be, you know, co-opted by a market
  • 64:38 - 64:45
    like that's the hard part and, I mean. I
    think there is a lot of there's continuing
  • 64:45 - 64:50
    to be a lot of attention to hackathons and
    coding bootcamps and these kinds of
  • 64:50 - 64:59
    things. But I don't know, I guess I'm sort
    of too inside and outside at the same time
  • 64:59 - 65:02
    to have a good answer. I think that
    there's a well-established body of
  • 65:02 - 65:10
    scholarly recognition of these activities.
    People look at me less weird talking about
  • 65:10 - 65:18
    this than a book about radio in the twenty
    first century. But I think the sort of,
  • 65:18 - 65:26
    you know, really sustained work to sort of
    disarticulate, disentangle some of this
  • 65:26 - 65:30
    from industry where it's getting the sort
    of most not just attention, but the sort
  • 65:30 - 65:37
    of celebration and the ways that that can
    kind of distort, I think, some of the
  • 65:37 - 65:40
    other intentions that is is always going
    to be tough.
  • 65:40 - 65:45
    Herald: Allright. Wonderful. I think we're
    out of time. So thank you very much.
  • 65:45 - 65:51
    Everyone, buy the book. And have a good
    night. Bye, bye.
  • 65:51 - 65:54
    Dunbar-Hester: Good day.
    Thank you so much. Thank you.
  • 65:54 - 65:56
    Herald: Thank you.
  • 65:56 - 65:58
    postroll music
  • 65:59 - 66:03
    Subtitles created by c3subtitles.de
    in the year 2021. Join, and help us!
Title:
#rC3 - Hacking Diversity: The Politics of Inclusion in Open Technology Cultures
Description:

more » « less
Video Language:
English
Duration:
01:06:35

English subtitles

Revisions