Главная
Study mode:
on
1
Introduction
2
Lesley Nutall
3
Abuse of Technology
4
How Big of a Problem
5
What is Deeply Worrying
6
The Role of Savior
7
Design Principles
8
Diversity
9
Privacy in Choice
10
Shared Smart Devices
11
Gaslighting
12
Single Source of Truth
13
Security and Data
14
Threat Models
15
Technical Ability
16
Challenges
17
Future work
18
Wrap up
Description:
Explore strategies to combat coercive control through open source technologies in this 36-minute Linux Foundation conference talk. Delve into the abuse of technology, its widespread impact, and the concerning trends in digital manipulation. Learn about design principles that prioritize diversity, privacy, and user choice. Examine the challenges posed by shared smart devices, gaslighting tactics, and the importance of maintaining a single source of truth. Analyze security considerations, data protection, and threat models while addressing varying levels of technical ability. Gain insights into future developments and potential solutions for curtailing coercive control in the digital age.

Curtail Coercive Control Using Open Source Applications and Services

Linux Foundation
Add to list
0:00 / 0:00