<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/1323889.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Hacker Cultures: The Conference Podcast</title>

  <lastBuildDate>Tue, 07 Apr 2026 17:31:07 -0400</lastBuildDate>
  <link>https://www.buzzsprout.com/1323889</link>
  <language>en-us</language>
  <copyright>© 2026 Hacker Cultures: The Conference Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>f5b71244-32b2-51f2-b199-915418047a7f</podcast:guid>
  <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>As Covid-19 turned most conferences virtual, so to combat Zoom-fatigue, at 4S/EASST 2020 we decided to try another format and turn a conference session into a podcast. Among hundreds of panels, papers and sessions, our panels rounded up all sorts of researchers who study what it is to be a hacker, and what hacking, programming, tinkering and working with computers is all about. We have continued biennally for full three seasons.<br><br>The newest season comes to you from the 2024 join Society for Social Studies of Science/European Association for the Study of Science and Technology conference (4S/EASST) in Amsterdam, titled "Making and Doing Transformations".<br><br>The second series was from EASST 2022 titled "The Politics of Technoscientific Futures" held in Madrid in July 2022. Our panel was titled "Hacking Everything. The cultures and politics of hackers and software workers". The first series was from 4S/EASST in "virtual Prague" in August 2020, titled "Locating and Timing Matters: Significance and agency of STS in emerging worlds".<br><br>We the hosts are Paula Bialski, who is an Associate Professor at the University of St. Gallen, Andreas Bischof who is a Research Group Leader at Chemnitz University of Technology, and Mace Ojala, a PhD scholar at Ruhr-University Bochum. Audio production by Heights Beats at Hotmilk Records. The theme track of first series is "Rocky" by Paula &amp; Karol. Heights Beats produced the theme track of the second series. Funding for the editing of this first series comes from University of St. Gallen, the second from Chemnitz University of Technology.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>science and technology, STS, 4S, EASST, conference, hackers, cultural studies, anthropology, sociology</itunes:keywords>
  <itunes:owner>
    <itunes:name>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/ivpf8lipslilyvodvor3ubk5t0r5?.jpg</url>
     <title>Hacker Cultures: The Conference Podcast</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/ivpf8lipslilyvodvor3ubk5t0r5?.jpg" />
  <itunes:category text="Science">
    <itunes:category text="Social Sciences" />
  </itunes:category>
  <item>
    <itunes:title>Extra episode (2024) Paula, Andreas and Mace talk about the podcast</itunes:title>
    <title>Extra episode (2024) Paula, Andreas and Mace talk about the podcast</title>
    <itunes:summary><![CDATA[Your hosts Paula Bialski, Andreas Bischof and Mace Ojala look back on three seasons of this podcast panel format. How did this get started, how does it work, and what has been fun so far?  This episode is a live recording from Hacker Cultures! The Podcast Panel Season 3 panel organized at the European Association for the study of Science and Technology and Society for Social Studies of Science EASST/4S 2024 conference in Amsterdam on 2024-07-16. The hosts are Paula Bialski, Andreas Bischof an...]]></itunes:summary>
    <description><![CDATA[<p>Your hosts Paula Bialski, Andreas Bischof and Mace Ojala look back on three seasons of this podcast panel format. How did this get started, how does it work, and what has been fun so far?<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>Your hosts Paula Bialski, Andreas Bischof and Mace Ojala look back on three seasons of this podcast panel format. How did this get started, how does it work, and what has been fun so far?<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/15902381-extra-episode-2024-paula-andreas-and-mace-talk-about-the-podcast.mp3" length="22744332" type="audio/mpeg" />
    <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-15902381</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
    <itunes:duration>1893</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2024</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 4 (2024) Victoria Neumann and Ana Custura: What does it mean to be part of a network? From silent contributor to engaged activist: the volunteer relay operators behind the Tor Project</itunes:title>
    <title>Episode 4 (2024) Victoria Neumann and Ana Custura: What does it mean to be part of a network? From silent contributor to engaged activist: the volunteer relay operators behind the Tor Project</title>
    <itunes:summary><![CDATA[Who is operating the Tor network, and why? Victoria Neumann from Lancaster University tells us.  Tor (acronym for The Onion Router) is one of the most famous projects focusing on online privacy and anonymity. Using the Tor Browser, one can access clear net websites without being tracked or traced or so-called "onion services (formerly hidden services)," which can only be accessed via the Tor network. Nowadays widely known for darknet marketplaces, it is also used by journalists, human rights ...]]></itunes:summary>
    <description><![CDATA[<p>Who is operating the Tor network, and why? Victoria Neumann from Lancaster University tells us.<br/><br/>Tor (acronym for The Onion Router) is one of the most famous projects focusing on online privacy and anonymity. Using the Tor Browser, one can access clear net websites without being tracked or traced or so-called &quot;onion services (formerly hidden services),&quot; which can only be accessed via the Tor network. Nowadays widely known for darknet marketplaces, it is also used by journalists, human rights and digital activists, spies, hackers, and ordinary people to circumvent state surveillance, internet blockades and to stay anonymous. </p><p>Originating from military research, the Tor Project is non-profit and open source after being taken over by hacktivists in the in the early 00s. Today the network has 6,000+ volunteer-run nodes called &quot;relays.&quot; When the network began, relay operators were friends, colleagues, and collaborators of the original Tor developers. Over the years, grown beyond trusted/known collaborators to thousands of people and organizations, many of whom the Tor Project does not know. This has led both to a more diverse and hence resilient network, but it also made it easier for malicious actors to join. </p><p>Who are the volunteers behind the network and what motivates them? Very little research has been conducted so far focusing on Tor relay operators. We conducted two surveys and 20 interviews to find out more about demographics, privacy values, trust, network health and community.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>Who is operating the Tor network, and why? Victoria Neumann from Lancaster University tells us.<br/><br/>Tor (acronym for The Onion Router) is one of the most famous projects focusing on online privacy and anonymity. Using the Tor Browser, one can access clear net websites without being tracked or traced or so-called &quot;onion services (formerly hidden services),&quot; which can only be accessed via the Tor network. Nowadays widely known for darknet marketplaces, it is also used by journalists, human rights and digital activists, spies, hackers, and ordinary people to circumvent state surveillance, internet blockades and to stay anonymous. </p><p>Originating from military research, the Tor Project is non-profit and open source after being taken over by hacktivists in the in the early 00s. Today the network has 6,000+ volunteer-run nodes called &quot;relays.&quot; When the network began, relay operators were friends, colleagues, and collaborators of the original Tor developers. Over the years, grown beyond trusted/known collaborators to thousands of people and organizations, many of whom the Tor Project does not know. This has led both to a more diverse and hence resilient network, but it also made it easier for malicious actors to join. </p><p>Who are the volunteers behind the network and what motivates them? Very little research has been conducted so far focusing on Tor relay operators. We conducted two surveys and 20 interviews to find out more about demographics, privacy values, trust, network health and community.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/15902373-episode-4-2024-victoria-neumann-and-ana-custura-what-does-it-mean-to-be-part-of-a-network-from-silent-contributor-to-engaged-activist-the-volunteer-relay-operators-behind-the-tor-project.mp3" length="13733020" type="audio/mpeg" />
    <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-15902373</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
    <itunes:duration>1142</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2024</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3 (2024) Sylvain Besençon: Information security and the care of open cryptography technology</itunes:title>
    <title>Episode 3 (2024) Sylvain Besençon: Information security and the care of open cryptography technology</title>
    <itunes:summary><![CDATA[We are happy to hear back from Sylvain Besençon from University of Fribourg, who wraps up research we learned about in 2020 about caring for open source cryptography.  This paper suggests a shift from information security as a matter of war to security as matter of care. Based on my 6-year long PhD research among a community of open source hackers and developers maintaining a crypto protocol, this paper deconstructs what I call the “warlike crypto imaginary” that often represents cryptography...]]></itunes:summary>
    <description><![CDATA[<p>We are happy to hear back from Sylvain Besençon from University of Fribourg, who wraps up research <a href='https://www.buzzsprout.com/1323889/episodes/5257330'>we learned about in 2020</a> about caring for open source cryptography.<br/><br/>This paper suggests a shift from information security as a matter of war to security as matter of care. Based on my 6-year long PhD research among a community of open source hackers and developers maintaining a crypto protocol, this paper deconstructs what I call the “warlike crypto imaginary” that often represents cryptography as a fascinating totem pole in the form of a blue lock. This paper tackles the rhetoric of war and violence that shapes our binary understanding of information security and proposes the work of making and unmaking security as a question of care, collaboration and negotiations. In other words, rather than portraying hackers and security experts as lonely teenagers wearing hoodies and deemed to break things, brute force passwords, and penetrate systems, this paper looks at how security people keep collaborating one with another to fixing things that never cease to break.</p><p>Inspired by the feminist STS field, I look for a “different voice” (Gilligan, 1982) through an ethnographic case study focused on the maintenance of an old crypto protocol called Pretty Good Privacy (PGP). PGP was developed in 1991 by an antinuclear activist to protect emails from being spied on. Since then, and despite many controversies, different generations of coders have been maintaining this piece of technology for more than three decades. Their persistent, engaged and humble tinkering let me identify values that steer the community towards careful and dedicated practices of maintenance, long-term collaborations, negotiations of compromises, and affective attachment to the technology.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We are happy to hear back from Sylvain Besençon from University of Fribourg, who wraps up research <a href='https://www.buzzsprout.com/1323889/episodes/5257330'>we learned about in 2020</a> about caring for open source cryptography.<br/><br/>This paper suggests a shift from information security as a matter of war to security as matter of care. Based on my 6-year long PhD research among a community of open source hackers and developers maintaining a crypto protocol, this paper deconstructs what I call the “warlike crypto imaginary” that often represents cryptography as a fascinating totem pole in the form of a blue lock. This paper tackles the rhetoric of war and violence that shapes our binary understanding of information security and proposes the work of making and unmaking security as a question of care, collaboration and negotiations. In other words, rather than portraying hackers and security experts as lonely teenagers wearing hoodies and deemed to break things, brute force passwords, and penetrate systems, this paper looks at how security people keep collaborating one with another to fixing things that never cease to break.</p><p>Inspired by the feminist STS field, I look for a “different voice” (Gilligan, 1982) through an ethnographic case study focused on the maintenance of an old crypto protocol called Pretty Good Privacy (PGP). PGP was developed in 1991 by an antinuclear activist to protect emails from being spied on. Since then, and despite many controversies, different generations of coders have been maintaining this piece of technology for more than three decades. Their persistent, engaged and humble tinkering let me identify values that steer the community towards careful and dedicated practices of maintenance, long-term collaborations, negotiations of compromises, and affective attachment to the technology.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/15902369-episode-3-2024-sylvain-besencon-information-security-and-the-care-of-open-cryptography-technology.mp3" length="16556826" type="audio/mpeg" />
    <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-15902369</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
    <itunes:duration>1377</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2024</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 2 (2024) Janis Lena Meißner: From “makers-in-the-making” to “empowering hacks”</itunes:title>
    <title>Episode 2 (2024) Janis Lena Meißner: From “makers-in-the-making” to “empowering hacks”</title>
    <itunes:summary><![CDATA[Janis Lena Meißner from The Vienna University of Technology shares stories and insights from practical work with people who are usually not included in the Maker movement.  Despite its promises of technology democratization, the Maker Movement still lacks diversity. To address this disparity, we might deliberately turn to „unexpected users“ of maker tools and reimagine core hacker values for subversive practices together with them.  This episode is about hacking the ways in which Making ...]]></itunes:summary>
    <description><![CDATA[<p>Janis Lena Meißner from The Vienna University of Technology shares stories and insights from practical work with people who are usually not included in the Maker movement.<br/><br/>Despite its promises of technology democratization, the Maker Movement still lacks diversity. To address this disparity, we might deliberately turn to „unexpected users“ of maker tools and reimagine core hacker values for subversive practices together with them. </p><p>This episode is about hacking the ways in which Making is usually imagined to be performed. It offers reflections on the “Empowering Hacks” project, my long-term collaboration with two men with disabilities on fabricating their own ideas. Our project began with the mission “to produce disabled tools at a cheaper rate but with a more customisable outcome” and so we collaborated on designing, modelling and 3D-printing “wheelchair golfballs” and other assistive gadgets. Externally, “Empowering Hacks” was motivated by creating positive change for others. Internally, our processes of mentoring and production were configured around the interests and social roles of my collaborators. Disability was not perceived as an impediment but as an opportunity to reimagining Making practices. </p><p>My reflections are rooted in a key distinction between “Hacking” and “Making”. While Making encompasses a wide range of practices using digital fabrication tools, Hacking denotes self-directed technological action for chosen purposes. In “Empowering Hacks”, my collaborators did not identify as makers, however as makers-in-the-making they had freedom to figure out their own ways to make. Their hacking became a performative and material challenge to ableist assumptions about disabled people not being able to be designers or creators. The dialectic podcast is an opportunity to further unpack the subversive capacities of reimagining making through hacking.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>Janis Lena Meißner from The Vienna University of Technology shares stories and insights from practical work with people who are usually not included in the Maker movement.<br/><br/>Despite its promises of technology democratization, the Maker Movement still lacks diversity. To address this disparity, we might deliberately turn to „unexpected users“ of maker tools and reimagine core hacker values for subversive practices together with them. </p><p>This episode is about hacking the ways in which Making is usually imagined to be performed. It offers reflections on the “Empowering Hacks” project, my long-term collaboration with two men with disabilities on fabricating their own ideas. Our project began with the mission “to produce disabled tools at a cheaper rate but with a more customisable outcome” and so we collaborated on designing, modelling and 3D-printing “wheelchair golfballs” and other assistive gadgets. Externally, “Empowering Hacks” was motivated by creating positive change for others. Internally, our processes of mentoring and production were configured around the interests and social roles of my collaborators. Disability was not perceived as an impediment but as an opportunity to reimagining Making practices. </p><p>My reflections are rooted in a key distinction between “Hacking” and “Making”. While Making encompasses a wide range of practices using digital fabrication tools, Hacking denotes self-directed technological action for chosen purposes. In “Empowering Hacks”, my collaborators did not identify as makers, however as makers-in-the-making they had freedom to figure out their own ways to make. Their hacking became a performative and material challenge to ableist assumptions about disabled people not being able to be designers or creators. The dialectic podcast is an opportunity to further unpack the subversive capacities of reimagining making through hacking.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/15902364-episode-2-2024-janis-lena-meissner-from-makers-in-the-making-to-empowering-hacks.mp3" length="16142078" type="audio/mpeg" />
    <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-15902364</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
    <itunes:duration>1343</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2024</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 1 (2024) Charles Berret: Metis and the hacker</itunes:title>
    <title>Episode 1 (2024) Charles Berret: Metis and the hacker</title>
    <itunes:summary><![CDATA[In this episode we hear Charles Berret from Linköping University characterize the cunning and craftiness via a concept from ancient Greek.  The concept of 'metis' offers an especially effective means of characterizing the intelligence and technical practice of hackers. Metis, for the ancient Greeks, denoted the improvisational craftiness of a figure like Odysseus, whose intuitive understanding of the regularities in a particular system or situation facilitates acts of subversive cleverness. A...]]></itunes:summary>
    <description><![CDATA[<p>In this episode we hear Charles Berret from Linköping University characterize the cunning and craftiness via a concept from ancient Greek.<br/><br/>The concept of &apos;metis&apos; offers an especially effective means of characterizing the intelligence and technical practice of hackers. Metis, for the ancient Greeks, denoted the improvisational craftiness of a figure like Odysseus, whose intuitive understanding of the regularities in a particular system or situation facilitates acts of subversive cleverness. After all, it was Odysseus who devised the Trojan Horse, perhaps the first hack recorded in Western literature, and later the namesake of an actual variety of malware. This is a revealing affinity, and the connections between metis and hacking run deep. Metis is an especially useful concept for understanding hackers because it is a form of practical knowledge distinct from episteme and techne. Whereas episteme denotes the pursuit of factual regularities in the natural world, and techne implies the application of episteme for engineering, craft, and material production, both episteme and techne are inherently systematic. In contrast, the essential characteristic of metis is its subversion of systems and regularities, finding surprising sources of flexibility where others see only patterns and rigidity. To view hackers through the lens of metis also helps explain why hacking thrives in settings characterized by what James C. Scott calls &quot;seeing like a state,&quot; that is, where an excessively schematic reduction of a system&apos;s natural complexity leads to the concealment of idiosyncrasies that become ideal sites for a hacker&apos;s exploitation. Developing an account of metis offers a new framework to explain why hackers thrive in infrapolitical practices that are inherently opposed to seeing like a state.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode we hear Charles Berret from Linköping University characterize the cunning and craftiness via a concept from ancient Greek.<br/><br/>The concept of &apos;metis&apos; offers an especially effective means of characterizing the intelligence and technical practice of hackers. Metis, for the ancient Greeks, denoted the improvisational craftiness of a figure like Odysseus, whose intuitive understanding of the regularities in a particular system or situation facilitates acts of subversive cleverness. After all, it was Odysseus who devised the Trojan Horse, perhaps the first hack recorded in Western literature, and later the namesake of an actual variety of malware. This is a revealing affinity, and the connections between metis and hacking run deep. Metis is an especially useful concept for understanding hackers because it is a form of practical knowledge distinct from episteme and techne. Whereas episteme denotes the pursuit of factual regularities in the natural world, and techne implies the application of episteme for engineering, craft, and material production, both episteme and techne are inherently systematic. In contrast, the essential characteristic of metis is its subversion of systems and regularities, finding surprising sources of flexibility where others see only patterns and rigidity. To view hackers through the lens of metis also helps explain why hacking thrives in settings characterized by what James C. Scott calls &quot;seeing like a state,&quot; that is, where an excessively schematic reduction of a system&apos;s natural complexity leads to the concealment of idiosyncrasies that become ideal sites for a hacker&apos;s exploitation. Developing an account of metis offers a new framework to explain why hackers thrive in infrapolitical practices that are inherently opposed to seeing like a state.<br/><br/><em>This episode is a live recording from </em><b><em>Hacker Cultures! The Podcast Panel Season 3</em></b><em> panel organized at the European Association for the study of Science</em> and <em>Technology and Society for Social Studies of Science </em><b><em>EASST/4S</em></b><em> </em><b><em>2024</em></b><em> conference in Amsterdam on 2024-07-16. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/15902358-episode-1-2024-charles-berret-metis-and-the-hacker.mp3" length="14406332" type="audio/mpeg" />
    <itunes:author>Paula Bialski, Andreas Bischof and Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-15902358</guid>
    <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
    <itunes:duration>1198</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2024</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 7 (2022) Ola Michalec - Engineer-as-a-service. What is the future of engineering professionals in the digital world?</itunes:title>
    <title>Episode 7 (2022) Ola Michalec - Engineer-as-a-service. What is the future of engineering professionals in the digital world?</title>
    <itunes:summary><![CDATA[We have the pleasure to chat with Ola Michalec, a Senior Research Associate at University of Bristol. Don't miss on our discussion with Ola in 2020.  For decades, nuclear plants, power stations, or wastewater facilities were safe from the hype of digital innovations. These industries have traditionally been operated by industrial control systems fairly simple computers using binary logics to enable the movement and sensing of engineering machinery. Such technologies were disconnected from the...]]></itunes:summary>
    <description><![CDATA[<p>We have the pleasure to chat with Ola Michalec, a Senior Research Associate at University of Bristol. <a href='https://www.buzzsprout.com/1323889/episodes/5257378'>Don&apos;t miss on our discussion with Ola in 2020</a>.<br/><br/>For decades, nuclear plants, power stations, or wastewater facilities were safe from the hype of digital innovations. These industries have traditionally been operated by industrial control systems fairly simple computers using binary logics to enable the movement and sensing of engineering machinery. Such technologies were disconnected from the internet and operated on-site by manual workers. With the advent of the Fourth Industrial Revolution (Schilin, 2020) engineering processes are about to gain sophisticated computing capabilities, from remote control enabled by the cloud or predictive maintenance thanks to ML algorithms. Moreover, industry experts (Cisco, 2018) have already announced that modern computing is blending with legacy engineering technologies. But who is doing the blending and revolutionising? Drawing from the approaches in STS and Computer-Supported-Cooperative Work (Slayton and Clark-Ginsberg, 2018; Jenkins et al., 2020), our research looks at the collaborative practices between engineers and software workers (Michalec et al., 2020; Michalec et al, 2021). Based on the case study of the implementation of cyber security regulations in critical infrastructures, we investigate how practitioners navigate tensions between the priorities of modern computing (security, connectivity, innovations, interoperability) and traditional engineering (safety, reliability, availability). Ultimately, we argue that digital innovations entering the world of critical infrastructures will reconfigure the responsibilities and training needs for engineers to come. This, in turn, creates novel ethical and political considerations for the profession, which should inform the future STS research agenda.</p><p><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We have the pleasure to chat with Ola Michalec, a Senior Research Associate at University of Bristol. <a href='https://www.buzzsprout.com/1323889/episodes/5257378'>Don&apos;t miss on our discussion with Ola in 2020</a>.<br/><br/>For decades, nuclear plants, power stations, or wastewater facilities were safe from the hype of digital innovations. These industries have traditionally been operated by industrial control systems fairly simple computers using binary logics to enable the movement and sensing of engineering machinery. Such technologies were disconnected from the internet and operated on-site by manual workers. With the advent of the Fourth Industrial Revolution (Schilin, 2020) engineering processes are about to gain sophisticated computing capabilities, from remote control enabled by the cloud or predictive maintenance thanks to ML algorithms. Moreover, industry experts (Cisco, 2018) have already announced that modern computing is blending with legacy engineering technologies. But who is doing the blending and revolutionising? Drawing from the approaches in STS and Computer-Supported-Cooperative Work (Slayton and Clark-Ginsberg, 2018; Jenkins et al., 2020), our research looks at the collaborative practices between engineers and software workers (Michalec et al., 2020; Michalec et al, 2021). Based on the case study of the implementation of cyber security regulations in critical infrastructures, we investigate how practitioners navigate tensions between the priorities of modern computing (security, connectivity, innovations, interoperability) and traditional engineering (safety, reliability, availability). Ultimately, we argue that digital innovations entering the world of critical infrastructures will reconfigure the responsibilities and training needs for engineers to come. This, in turn, creates novel ethical and political considerations for the profession, which should inform the future STS research agenda.</p><p><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330684-episode-7-2022-ola-michalec-engineer-as-a-service-what-is-the-future-of-engineering-professionals-in-the-digital-world.mp3" length="9737908" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ld3pqcbohrw1mimlskpbjtifb12t?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Ola Michalec</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330684</guid>
    <pubDate>Tue, 04 Oct 2022 07:00:00 +0000</pubDate>
    <itunes:duration>808</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 6 (2022) Annika Richterich - Chaos reigns. Hacktivism as health data activism</itunes:title>
    <title>Episode 6 (2022) Annika Richterich - Chaos reigns. Hacktivism as health data activism</title>
    <itunes:summary><![CDATA[We speak with Annika Richterich from Maastricht University where she works as an Assistant Professor in Digital Cultures at the Faculty of Arts &amp; Social Sciences. Annika was with us earlier in 2020, check out that episode too.  This paper discusses how the Chaos Computer Club, a German hacker association, engaged in health data activism during the first two years of the COVID-19 pandemic (2020-2021).[1] Hackers technopolitical activism tends to be neglected in public debate, partly since ...]]></itunes:summary>
    <description><![CDATA[<p>We speak with Annika Richterich from Maastricht University where she works as an Assistant Professor in Digital Cultures at the Faculty of Arts &amp; Social Sciences. <a href='https://www.buzzsprout.com/1323889/episodes/5257522'>Annika was with us earlier in 2020, check out that episode too</a>.<br/><br/>This paper discusses how the Chaos Computer Club, a German hacker association, engaged in health data activism during the first two years of the COVID-19 pandemic (2020-2021).[1] Hackers technopolitical activism tends to be neglected in public debate, partly since hacking is often equated with cybercrime. Yet, civic hacking communities have shown a longstanding dedication to activism relevant to public interests and technopolitics. In early 2020, hacker communities therefore also started scrutinising technology meant to tackle issues emerging during the COVID pandemic, often by collecting health-related data. The paper methodologically draws on a case study approach: it focuses on the Chaos Computer Club (CCC), analysing public statements, open letters, and reports. Conceptually, it frames the CCCs practices as data activism, specifically health data activism. It notably expands on Milan and van der Veldens (2016) continuum of proactive and reactive data activism. Within the proactive/reactive continuum, it stresses the CCCs interventional-regulative activism. The latter notion refers to practices of data activism involving interventional, technical assessments of data-intensive technology, using these to critically yet constructively articulate regulative requirements and demands. I argue that the CCCs health data activism oscillates between reactive and proactive data activism, by engaging in interventional-regulative practices: the association intervenes in public debate concerning the politics of covid-technology, while also directly interacting with and holding policy makers as well as technology corporations accountable. Thereby, this paper lends further weight to the importance of civic technology expertise and engagement - especially during public health crises, when tech-solutionist approaches are being promoted by appealing to the hope of them contributing to the greater good.<br/><br/>[1]Formally, the CCC is an association registered in Germany (eingetragener Verein). However, while its central office is in Hamburg, there are also 25 regional chapters plus multiple local groups (Chaos-Treffs) in Germany, Austria, and Switzerland.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We speak with Annika Richterich from Maastricht University where she works as an Assistant Professor in Digital Cultures at the Faculty of Arts &amp; Social Sciences. <a href='https://www.buzzsprout.com/1323889/episodes/5257522'>Annika was with us earlier in 2020, check out that episode too</a>.<br/><br/>This paper discusses how the Chaos Computer Club, a German hacker association, engaged in health data activism during the first two years of the COVID-19 pandemic (2020-2021).[1] Hackers technopolitical activism tends to be neglected in public debate, partly since hacking is often equated with cybercrime. Yet, civic hacking communities have shown a longstanding dedication to activism relevant to public interests and technopolitics. In early 2020, hacker communities therefore also started scrutinising technology meant to tackle issues emerging during the COVID pandemic, often by collecting health-related data. The paper methodologically draws on a case study approach: it focuses on the Chaos Computer Club (CCC), analysing public statements, open letters, and reports. Conceptually, it frames the CCCs practices as data activism, specifically health data activism. It notably expands on Milan and van der Veldens (2016) continuum of proactive and reactive data activism. Within the proactive/reactive continuum, it stresses the CCCs interventional-regulative activism. The latter notion refers to practices of data activism involving interventional, technical assessments of data-intensive technology, using these to critically yet constructively articulate regulative requirements and demands. I argue that the CCCs health data activism oscillates between reactive and proactive data activism, by engaging in interventional-regulative practices: the association intervenes in public debate concerning the politics of covid-technology, while also directly interacting with and holding policy makers as well as technology corporations accountable. Thereby, this paper lends further weight to the importance of civic technology expertise and engagement - especially during public health crises, when tech-solutionist approaches are being promoted by appealing to the hope of them contributing to the greater good.<br/><br/>[1]Formally, the CCC is an association registered in Germany (eingetragener Verein). However, while its central office is in Hamburg, there are also 25 regional chapters plus multiple local groups (Chaos-Treffs) in Germany, Austria, and Switzerland.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330681-episode-6-2022-annika-richterich-chaos-reigns-hacktivism-as-health-data-activism.mp3" length="11614581" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v4fff2vu9y05qge28l113lz93ext?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Annika Richterich</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330681</guid>
    <pubDate>Tue, 04 Oct 2022 06:00:00 +0000</pubDate>
    <itunes:duration>964</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 5 (2022) Maja Urbanczyk - Hacking decision-making</itunes:title>
    <title>Episode 5 (2022) Maja Urbanczyk - Hacking decision-making</title>
    <itunes:summary><![CDATA[This episode brings us Maja Urbanczyk who is a PhD Candidate at Norwegian University of Science and Technology.  On more and more occasions, political decision-makers decide over software that is to be used by the public. In these situations, decision-makers rely on expert knowledge and risk assessment, in order to make informed decisions. For software decisions, the needed expertise comes from IT and IT-security experts and software developers also known as: hackers. The degree of trust that...]]></itunes:summary>
    <description><![CDATA[<p>This episode brings us Maja Urbanczyk who is a PhD Candidate at Norwegian University of Science and Technology.<br/><br/>On more and more occasions, political decision-makers decide over software that is to be used by the public. In these situations, decision-makers rely on expert knowledge and risk assessment, in order to make informed decisions. For software decisions, the needed expertise comes from IT and IT-security experts and software developers also known as: hackers. The degree of trust that IT expertise receives from political decision makers is highly dependent on the contextual framing of the people holding the expertise: IT-experts are regarded as significantly more trustworthy than hackers by the public as well as politics. At the same time, political decision-makers need to acquire trust from the public. This is likely to be more complex when more information and opinions on a topic are available. With knowledgeable lay-persons posing themselves as experts within the discussions, acknowledged experts being vilified as so called black-hats (hackers with little ethics) and decision-makers walking on a thin line between technocracy/scientism, the greater good and their own interests. It is complex for anyone to decide, which expertise to follow and whom to trust. In some cases this even ends in expertise being disregarded or even discarded by decision makers. Interestingly, it happens that they frame it afterwards as not having known about a technologys downsides. In order to understand the many layers of construction and attribution of non-knowledge and ignorance, I deconstruct these kinds of situations and what I call the network of trust in a qualitative, discursive study. Deconstructing and analyzing decision-making processes with a focus on the role of non-knowledge and ignorance will help to shed more light on the complexity of technological governance. Additionally, this novel approach shows how ignorance is not only a reason for subordination, but also potentially a source of power.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>This episode brings us Maja Urbanczyk who is a PhD Candidate at Norwegian University of Science and Technology.<br/><br/>On more and more occasions, political decision-makers decide over software that is to be used by the public. In these situations, decision-makers rely on expert knowledge and risk assessment, in order to make informed decisions. For software decisions, the needed expertise comes from IT and IT-security experts and software developers also known as: hackers. The degree of trust that IT expertise receives from political decision makers is highly dependent on the contextual framing of the people holding the expertise: IT-experts are regarded as significantly more trustworthy than hackers by the public as well as politics. At the same time, political decision-makers need to acquire trust from the public. This is likely to be more complex when more information and opinions on a topic are available. With knowledgeable lay-persons posing themselves as experts within the discussions, acknowledged experts being vilified as so called black-hats (hackers with little ethics) and decision-makers walking on a thin line between technocracy/scientism, the greater good and their own interests. It is complex for anyone to decide, which expertise to follow and whom to trust. In some cases this even ends in expertise being disregarded or even discarded by decision makers. Interestingly, it happens that they frame it afterwards as not having known about a technologys downsides. In order to understand the many layers of construction and attribution of non-knowledge and ignorance, I deconstruct these kinds of situations and what I call the network of trust in a qualitative, discursive study. Deconstructing and analyzing decision-making processes with a focus on the role of non-knowledge and ignorance will help to shed more light on the complexity of technological governance. Additionally, this novel approach shows how ignorance is not only a reason for subordination, but also potentially a source of power.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330679-episode-5-2022-maja-urbanczyk-hacking-decision-making.mp3" length="10876299" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/essb4ijqibjb86uhxqwobbxm5xsg?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Maja Urbanczyk</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330679</guid>
    <pubDate>Tue, 04 Oct 2022 05:00:00 +0000</pubDate>
    <itunes:duration>902</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 4 (2022) Jan Schmutzler and Estrid Sørensen - Playing with fire. Re-identification hacks and organisational micro-politics</itunes:title>
    <title>Episode 4 (2022) Jan Schmutzler and Estrid Sørensen - Playing with fire. Re-identification hacks and organisational micro-politics</title>
    <itunes:summary><![CDATA[We hear from research by PhD Candidate Jan Schmutzler and Professor Estrid Sørensen, both from Ruhr University Bochum.  Data anonymisation has long been the central measure for social scientist to protect the privacy of the subjects from whom they collect data. Recent years computational methods have made it increasingly easy to combine data sets, which also makes it easier to re-identify individuals in anonymised datasets (Rocher et al, 2019). No standard procedure exists for testing if anon...]]></itunes:summary>
    <description><![CDATA[<p>We hear from research by PhD Candidate Jan Schmutzler and Professor Estrid Sørensen, both from Ruhr University Bochum.<br/><br/>Data anonymisation has long been the central measure for social scientist to protect the privacy of the subjects from whom they collect data. Recent years computational methods have made it increasingly easy to combine data sets, which also makes it easier to re-identify individuals in anonymised datasets (Rocher et al, 2019). No standard procedure exists for testing if anonymised datasets are sufficiently protected against re-identification (Emam et al, 2015). In practice the method is re-identification attacks.<br/><br/>We report from a white-hat re-identification hack conducted in collaboration with an organisation with a long tradition for hosting social science data, which provided it with good reasons to be confident that its data are sufficiently protected against re-identification. The hack was seen as a young students innocent exercise. But then the in hindsight foreseeable moment materialised, when his algorithm appeared to be able to de-anonymise the data.<br/><br/>Our contribution discusses the repercussions of the re-identification hack. Both the organisation, the student and the ethnographer had been naïve about the hack. They had been playing with fire and ignited mutual disbelieve and mistrust. The student and the ethnographer were now approached as potential criminals with one foot in jail. The organisation found measures to secure its data sets, yet the ethnographer remained disconcerted about the already published data.<br/><br/>Based on the empirical analysis, we address hacking and attacking more generally as methods for testing re-identification protection. Although the method seems technically and ethically sound, it has side-effects that are severely aggressive to social and organisational relations (cf. Schmitz-Berndt &amp; Schiffner, 2020). In the case in question, we sought to mobilise careful practices to remedy the damages done, and we discuss if careful hacking has potentials for developing less harmful re-identification testing, or if it is indeed an oxymoron.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We hear from research by PhD Candidate Jan Schmutzler and Professor Estrid Sørensen, both from Ruhr University Bochum.<br/><br/>Data anonymisation has long been the central measure for social scientist to protect the privacy of the subjects from whom they collect data. Recent years computational methods have made it increasingly easy to combine data sets, which also makes it easier to re-identify individuals in anonymised datasets (Rocher et al, 2019). No standard procedure exists for testing if anonymised datasets are sufficiently protected against re-identification (Emam et al, 2015). In practice the method is re-identification attacks.<br/><br/>We report from a white-hat re-identification hack conducted in collaboration with an organisation with a long tradition for hosting social science data, which provided it with good reasons to be confident that its data are sufficiently protected against re-identification. The hack was seen as a young students innocent exercise. But then the in hindsight foreseeable moment materialised, when his algorithm appeared to be able to de-anonymise the data.<br/><br/>Our contribution discusses the repercussions of the re-identification hack. Both the organisation, the student and the ethnographer had been naïve about the hack. They had been playing with fire and ignited mutual disbelieve and mistrust. The student and the ethnographer were now approached as potential criminals with one foot in jail. The organisation found measures to secure its data sets, yet the ethnographer remained disconcerted about the already published data.<br/><br/>Based on the empirical analysis, we address hacking and attacking more generally as methods for testing re-identification protection. Although the method seems technically and ethically sound, it has side-effects that are severely aggressive to social and organisational relations (cf. Schmitz-Berndt &amp; Schiffner, 2020). In the case in question, we sought to mobilise careful practices to remedy the damages done, and we discuss if careful hacking has potentials for developing less harmful re-identification testing, or if it is indeed an oxymoron.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330677-episode-4-2022-jan-schmutzler-and-estrid-sorensen-playing-with-fire-re-identification-hacks-and-organisational-micro-politics.mp3" length="12495235" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i8r65x32ip4jvwf7keke2i2b60io?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala, Jan Schmutzler and Estrid Sørensen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330677</guid>
    <pubDate>Tue, 04 Oct 2022 04:00:00 +0000</pubDate>
    <itunes:duration>1037</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3 (2022) Tim Cowlishaw - Tiny tools and little loops. Software art as care-ful software practice</itunes:title>
    <title>Episode 3 (2022) Tim Cowlishaw - Tiny tools and little loops. Software art as care-ful software practice</title>
    <itunes:summary><![CDATA[We speak with Tim Cowlishaw, BAU, Doctoral Candidate at College of Arts &amp; Design Barcelona.  Whether as part of giant technology corporations or open-source software projects, software developers are increasingly responsible for defining, building, and maintaining the infrastructure of our social world, and much critical and anthropological attention has been paid to the ways in which the cultures and practices of software development influence the materiality and embedded politics of the...]]></itunes:summary>
    <description><![CDATA[<p>We speak with Tim Cowlishaw, BAU, Doctoral Candidate at College of Arts &amp; Design Barcelona.<br/><br/>Whether as part of giant technology corporations or open-source software projects, software developers are increasingly responsible for defining, building, and maintaining the infrastructure of our social world, and much critical and anthropological attention has been paid to the ways in which the cultures and practices of software development influence the materiality and embedded politics of these infrastructures. However, less critical attention has been paid to software development deployed to less instrumental ends, in particular, creative and artistic practices that use software as a medium. We claim, building on Nick Seaver (2021)s work on care and scale as contrasting values in the development of software systems, that paying attention to such personal, creative software practices provides a valuable opportunity for a deepened understanding of cultures of software development in general, by articulating and making visible the differences between the development of aesthetic and instrumental software objects - a distinction which is elided when software development is studied in more general undifferentiated terms. In addition, we argue that software art and the creative practice of software development offer a useful means of interrogating the ontology of software and digital artefacts, arguing that such practices are a form of ontological designing (Willis 2006) producing digital objects (Hui 2016) which serve to expose the ontology and embedded politics of software artefacts and systems more generally. Finally, we argue that such creative practices constitute a care-ful (Puig de la Bellacasa 2017) approach to software development, building on the Critical Technical Practice of Philip Agre (1997), offering one example of how critical and ethical considerations might be usefully incorporated into professional software development practices.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>We speak with Tim Cowlishaw, BAU, Doctoral Candidate at College of Arts &amp; Design Barcelona.<br/><br/>Whether as part of giant technology corporations or open-source software projects, software developers are increasingly responsible for defining, building, and maintaining the infrastructure of our social world, and much critical and anthropological attention has been paid to the ways in which the cultures and practices of software development influence the materiality and embedded politics of these infrastructures. However, less critical attention has been paid to software development deployed to less instrumental ends, in particular, creative and artistic practices that use software as a medium. We claim, building on Nick Seaver (2021)s work on care and scale as contrasting values in the development of software systems, that paying attention to such personal, creative software practices provides a valuable opportunity for a deepened understanding of cultures of software development in general, by articulating and making visible the differences between the development of aesthetic and instrumental software objects - a distinction which is elided when software development is studied in more general undifferentiated terms. In addition, we argue that software art and the creative practice of software development offer a useful means of interrogating the ontology of software and digital artefacts, arguing that such practices are a form of ontological designing (Willis 2006) producing digital objects (Hui 2016) which serve to expose the ontology and embedded politics of software artefacts and systems more generally. Finally, we argue that such creative practices constitute a care-ful (Puig de la Bellacasa 2017) approach to software development, building on the Critical Technical Practice of Philip Agre (1997), offering one example of how critical and ethical considerations might be usefully incorporated into professional software development practices.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330676-episode-3-2022-tim-cowlishaw-tiny-tools-and-little-loops-software-art-as-care-ful-software-practice.mp3" length="13900117" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h6t2ockrr6gpf2n9wtmc6lwslzm1?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Tim Cowlishaw</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330676</guid>
    <pubDate>Tue, 04 Oct 2022 03:00:00 +0000</pubDate>
    <itunes:duration>1154</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 2 (2022) Cansu Güner - Hack the house! Reconfiguring domesticity in co-living spaces</itunes:title>
    <title>Episode 2 (2022) Cansu Güner - Hack the house! Reconfiguring domesticity in co-living spaces</title>
    <itunes:summary><![CDATA[This episode is with Doctoral Candidate Cansu Güner from School of Social Sciences and Technology at Technical University of Münich.  This podcast is about hacking houses. Entrepreneurs with engineering backgrounds who live in co-living spaces tend to hack their houses either as part of a hackathon or via self-initiated hacking practices. Drawing from a one-year-long ethnography on hacking practices in co-living spaces in the Bay Area and Munich, I aim to answer the following questions: what ...]]></itunes:summary>
    <description><![CDATA[<p>This episode is with Doctoral Candidate Cansu Güner from School of Social Sciences and Technology at Technical University of Münich.<br/><br/>This podcast is about hacking houses. Entrepreneurs with engineering backgrounds who live in co-living spaces tend to hack their houses either as part of a hackathon or via self-initiated hacking practices. Drawing from a one-year-long ethnography on hacking practices in co-living spaces in the Bay Area and Munich, I aim to answer the following questions: what would happen if the subjects of domestic work would also be equipped with the technological know-how and expertise that would potentially reconfigure the domestic ideology? Would then they position domesticity as their domain of innovation and intervention? What kind of domestic ideal would they have? What kind of technological interventions would they make or not make?<br/><br/>Specifically, I would like to compare two home automation systems, namely the Weekly Task Planner (WTP) and the Hidden Camera, which had been created as a result of hacking practices in co-living spaces. In Munich, the WTP was created to help residents to keep track of predefined domestic tasks, e. g., cleaning, by automatically assigning them to people every week. In the Bay Area, one of the residents hacked the problem of dirty dishes by installing a hidden camera in the kitchen to surveil and shame the irresponsible residents who fail to fulfill their chores not for accustomed reasons such as safety and security purposes.<br/><br/>Drawing on feminist STS (Schwartz-Cowan 1976; Cockburn 1997; Naulin and Jourdain, 2020; Fraiman 2017; Kleif and Faulkner, 2003; Suchmann 2007), I would like to shed light on how hackathons and hacking practices have been utilized as ways of remaking domestic culture(s). I argue that co-living as a technosocial project is subjected to the entreprenurialization of domesticity in which the domestic activities become dominated by entrepreneurial ambitions like hacking. Situational analysis, in-depth interviews, and ethnography are employed as the main methods.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (EASST) 2022 conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski<em>, </em>Andreas Bischof<em> and </em>Mace Ojala<em>. Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>This episode is with Doctoral Candidate Cansu Güner from School of Social Sciences and Technology at Technical University of Münich.<br/><br/>This podcast is about hacking houses. Entrepreneurs with engineering backgrounds who live in co-living spaces tend to hack their houses either as part of a hackathon or via self-initiated hacking practices. Drawing from a one-year-long ethnography on hacking practices in co-living spaces in the Bay Area and Munich, I aim to answer the following questions: what would happen if the subjects of domestic work would also be equipped with the technological know-how and expertise that would potentially reconfigure the domestic ideology? Would then they position domesticity as their domain of innovation and intervention? What kind of domestic ideal would they have? What kind of technological interventions would they make or not make?<br/><br/>Specifically, I would like to compare two home automation systems, namely the Weekly Task Planner (WTP) and the Hidden Camera, which had been created as a result of hacking practices in co-living spaces. In Munich, the WTP was created to help residents to keep track of predefined domestic tasks, e. g., cleaning, by automatically assigning them to people every week. In the Bay Area, one of the residents hacked the problem of dirty dishes by installing a hidden camera in the kitchen to surveil and shame the irresponsible residents who fail to fulfill their chores not for accustomed reasons such as safety and security purposes.<br/><br/>Drawing on feminist STS (Schwartz-Cowan 1976; Cockburn 1997; Naulin and Jourdain, 2020; Fraiman 2017; Kleif and Faulkner, 2003; Suchmann 2007), I would like to shed light on how hackathons and hacking practices have been utilized as ways of remaking domestic culture(s). I argue that co-living as a technosocial project is subjected to the entreprenurialization of domesticity in which the domestic activities become dominated by entrepreneurial ambitions like hacking. Situational analysis, in-depth interviews, and ethnography are employed as the main methods.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (EASST) 2022 conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski<em>, </em>Andreas Bischof<em> and </em>Mace Ojala<em>. Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330672-episode-2-2022-cansu-guner-hack-the-house-reconfiguring-domesticity-in-co-living-spaces.mp3" length="13920153" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fx8mcmxtm8x7yr4hd4xl5abc3z8e?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Cansu Güner</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330672</guid>
    <pubDate>Tue, 04 Oct 2022 02:00:00 +0000</pubDate>
    <itunes:duration>1156</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 1 (2022) Maja-Lee Voigt - CTRL + F_eminist futures_. Hacking algorithmic architectures of cities to come</itunes:title>
    <title>Episode 1 (2022) Maja-Lee Voigt - CTRL + F_eminist futures_. Hacking algorithmic architectures of cities to come</title>
    <itunes:summary><![CDATA[In this episode we are joined by Maja-Lee Voigt, a Research Associate at the Centre for Digital Cultures at Leuphana University of Lüneburg.  To this day it remains a question of power who is granted the right to visibly take up and claim urban space; both physically and virtually. A societal and literal Room of One's Own" (Woolf 1929) is still not a given for people who define as women and/or queer. Rather, it is not only floor plans and cityscapes in which gendered bodies hardly find unconf...]]></itunes:summary>
    <description><![CDATA[<p>In this episode we are joined by Maja-Lee Voigt, a Research Associate at the Centre for Digital Cultures at Leuphana University of Lüneburg.<br/><br/>To this day it remains a question of power who is granted the right to visibly take up and claim urban space; both physically and virtually. A societal and literal Room of One&apos;s Own&quot; (Woolf 1929) is still not a given for people who define as women and/or queer. Rather, it is not only floor plans and cityscapes in which gendered bodies hardly find unconfined spaces or representation; discursive and online realms often turn out to be equally restrictive, patriarchally dominated, and misogynic. Additionally, as urban automation advances in an increasingly &apos;smarter&apos; city, everyday processes are more and more controlled by privatized algorithmic architectures of oppression.<br/><br/>Yet feminist hackspaces resist these heteronormatively programed technologies. Following five months of ethnographic research on cyberfeminist collectives and their resistive practices in Germany and Austria in 2021, my contribution askes how digitized cities become technologically, culturally, and spatially hacked toward representing more diverse realities. My analysis shows how feminist hackspaces attempt to increase accessibility to interfaces, (digital) spaces, and decision-making processes by sharing their tech-knowledge through open source solutions, educative illustrations, and visions of otherwise urban futures. Their activism demonstrates how (urban) hacking is a crucial practice to break with non-democratically controlled digitalization processes: playing with the uncertainty, incalculable openness, and scope for design of possible futures within software spaces makes hackfeminists essential actors in imagining cities to come. Often unnoticed and underestimated, their trial-and-error approach and understanding of hacking as a glitching cultural technique as well as refusal of pre-programmed patriarchal orders embodies the radical presence of potential tomorrows: a future filled with literally uncoded uncertainties and heterogenous hopes in favor of a hackable, thus accessible algorithmic anarchitecture in a cyber_feminist_city for all.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode we are joined by Maja-Lee Voigt, a Research Associate at the Centre for Digital Cultures at Leuphana University of Lüneburg.<br/><br/>To this day it remains a question of power who is granted the right to visibly take up and claim urban space; both physically and virtually. A societal and literal Room of One&apos;s Own&quot; (Woolf 1929) is still not a given for people who define as women and/or queer. Rather, it is not only floor plans and cityscapes in which gendered bodies hardly find unconfined spaces or representation; discursive and online realms often turn out to be equally restrictive, patriarchally dominated, and misogynic. Additionally, as urban automation advances in an increasingly &apos;smarter&apos; city, everyday processes are more and more controlled by privatized algorithmic architectures of oppression.<br/><br/>Yet feminist hackspaces resist these heteronormatively programed technologies. Following five months of ethnographic research on cyberfeminist collectives and their resistive practices in Germany and Austria in 2021, my contribution askes how digitized cities become technologically, culturally, and spatially hacked toward representing more diverse realities. My analysis shows how feminist hackspaces attempt to increase accessibility to interfaces, (digital) spaces, and decision-making processes by sharing their tech-knowledge through open source solutions, educative illustrations, and visions of otherwise urban futures. Their activism demonstrates how (urban) hacking is a crucial practice to break with non-democratically controlled digitalization processes: playing with the uncertainty, incalculable openness, and scope for design of possible futures within software spaces makes hackfeminists essential actors in imagining cities to come. Often unnoticed and underestimated, their trial-and-error approach and understanding of hacking as a glitching cultural technique as well as refusal of pre-programmed patriarchal orders embodies the radical presence of potential tomorrows: a future filled with literally uncoded uncertainties and heterogenous hopes in favor of a hackable, thus accessible algorithmic anarchitecture in a cyber_feminist_city for all.<br/><br/><em>This episode is a live recording from </em><b><em>Hacking Everything. The Cultures and Politics of Hackers and Software Workers</em></b><em> panel organized at the European Association for the study of Science and Technology (</em><b><em>EASST</em></b><em>) </em><b><em>2022</em></b><em> conference in Madrid on 2022-07-07. The hosts are </em>Paula Bialski,<em> </em>Andreas Bischof<em> and </em>Mace Ojala.<em> Audio production by </em>Heights Beats<em> at Hotmilk Records, who also produced the theme track. We are grateful for Chemnitz University of Technology for funding.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/11330658-episode-1-2022-maja-lee-voigt-ctrl-f_eminist-futures_-hacking-algorithmic-architectures-of-cities-to-come.mp3" length="12534349" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cji3g4npweehdecmfybpesl62kd5?.jpg" />
    <itunes:author>Paula Bialski, Andreas Bischof, Mace Ojala and Maja-Lee Voigt</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11330658</guid>
    <pubDate>Tue, 04 Oct 2022 01:00:00 +0000</pubDate>
    <itunes:duration>1041</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2022</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 1 (2020): Morgan G. Ames - Throwback Culture: The Role of Nostalgia in Hacker Worlds</itunes:title>
    <title>Episode 1 (2020): Morgan G. Ames - Throwback Culture: The Role of Nostalgia in Hacker Worlds</title>
    <itunes:summary><![CDATA[          This session's guest is Morgan G. Ames, who joins us from UC Berkely. There she is an assistant adjunct professor in the School of Information and interim associate director of research for the Center for Science, Technology, Medicine and Society.   The maintenance of ‘hacker’ identities often involves the discussion of one’s origin story—the nostalgic rendering of the path that one took into programming and technical tinkering, involving the technologi...]]></itunes:summary>
    <description><![CDATA[<p>          This session&apos;s guest is Morgan G. Ames, who joins us from UC Berkely. There she is an assistant adjunct professor in the <a href='http://ischool.berkeley.edu/'>School of Information</a> and interim associate director of research for the <a href='http://cstms.berkeley.edu/'>Center for Science, Technology, Medicine and Society</a>. <br/><br/>The maintenance of ‘hacker’ identities often involves the discussion of one’s origin story—the nostalgic rendering of the path that one took into programming and technical tinkering, involving the technologies and media of hackers’ childhoods. In her  paper she explores the ways in which these memories are mobilized to do cultural work in contemporary technology worlds, especially among those creating computational devices and software for children. Origin stories can serve as gatekeepers within hacker circles, delimiting who is a good “culture fit.” It can moreover shape the design process by influencing who hackers view as their primary audience and what they think this audience will find captivating.</p><p><b>  </b></p>]]></description>
    <content:encoded><![CDATA[<p>          This session&apos;s guest is Morgan G. Ames, who joins us from UC Berkely. There she is an assistant adjunct professor in the <a href='http://ischool.berkeley.edu/'>School of Information</a> and interim associate director of research for the <a href='http://cstms.berkeley.edu/'>Center for Science, Technology, Medicine and Society</a>. <br/><br/>The maintenance of ‘hacker’ identities often involves the discussion of one’s origin story—the nostalgic rendering of the path that one took into programming and technical tinkering, involving the technologies and media of hackers’ childhoods. In her  paper she explores the ways in which these memories are mobilized to do cultural work in contemporary technology worlds, especially among those creating computational devices and software for children. Origin stories can serve as gatekeepers within hacker circles, delimiting who is a good “culture fit.” It can moreover shape the design process by influencing who hackers view as their primary audience and what they think this audience will find captivating.</p><p><b>  </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257033-episode-1-2020-morgan-g-ames-throwback-culture-the-role-of-nostalgia-in-hacker-worlds.mp3" length="13553827" type="audio/mpeg" />
    <itunes:author>Paula Bialski</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257033</guid>
    <pubDate>Wed, 02 Sep 2020 22:00:00 +0000</pubDate>
    <itunes:duration>1127</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 2 (2020): Minna Saariketo &amp; Mareike Glöss - In the grey zone of hacking? Two cases in the political economy of software and the Right to Repair</itunes:title>
    <title>Episode 2 (2020): Minna Saariketo &amp; Mareike Glöss - In the grey zone of hacking? Two cases in the political economy of software and the Right to Repair</title>
    <itunes:summary><![CDATA[Minna Saariketo is a postdoc at the Department of Computer and Systems Sciences, Stockholm University. Mareike Glöss is a lecturer Department of Computer and Systems Sciences, Stockholm University.   In their research, they address the ‘grey zone of hacking’: end users subverting software and hardware controls imposed by manufacturers. We discuss one empirical case in particular: farmers claiming the ‘right to repair’ of agricultural equipment. The ‘Right to Repair’ movement has brought toget...]]></itunes:summary>
    <description><![CDATA[<p><b><em>Minna</em></b><b> </b><b><em>Saariketo is a </em></b><b>postdoc at the </b><a href='http://www.dsv.su.se//english'><b>Department of Computer and Systems Sciences</b></a><b>, Stockholm University. </b><b><em>Mareike</em></b><b> </b><b><em>Glöss is a l</em></b><b>ecturer </b><a href='http://www.dsv.su.se//english'><b>Department of Computer and Systems Sciences</b></a><b>, Stockholm University. <br/><br/></b>In their research, they address the ‘grey zone of hacking’: end users subverting software and hardware controls imposed by manufacturers. We discuss one empirical case in particular: farmers claiming the ‘right to repair’ of agricultural equipment. The ‘Right to Repair’ movement has brought together users and developers to circumvent products that cannot be repaired or modified freely. Manufactures have responded by ‘lock-ins’ by not supplying spare parts, service manuals, disassembly and diagnostic tools, as well as forbidding modification of software in their licenses. Hackers have worked around these lock-ins, creating parallel networks of software and hardware distribution, supplying hacking tools to end users. So in their session, they will talk about the political economy of software: how the control of technical artefacts is achieved both legally and economically. Second is the issue of agency, expertise, and technological literacy. </p>]]></description>
    <content:encoded><![CDATA[<p><b><em>Minna</em></b><b> </b><b><em>Saariketo is a </em></b><b>postdoc at the </b><a href='http://www.dsv.su.se//english'><b>Department of Computer and Systems Sciences</b></a><b>, Stockholm University. </b><b><em>Mareike</em></b><b> </b><b><em>Glöss is a l</em></b><b>ecturer </b><a href='http://www.dsv.su.se//english'><b>Department of Computer and Systems Sciences</b></a><b>, Stockholm University. <br/><br/></b>In their research, they address the ‘grey zone of hacking’: end users subverting software and hardware controls imposed by manufacturers. We discuss one empirical case in particular: farmers claiming the ‘right to repair’ of agricultural equipment. The ‘Right to Repair’ movement has brought together users and developers to circumvent products that cannot be repaired or modified freely. Manufactures have responded by ‘lock-ins’ by not supplying spare parts, service manuals, disassembly and diagnostic tools, as well as forbidding modification of software in their licenses. Hackers have worked around these lock-ins, creating parallel networks of software and hardware distribution, supplying hacking tools to end users. So in their session, they will talk about the political economy of software: how the control of technical artefacts is achieved both legally and economically. Second is the issue of agency, expertise, and technological literacy. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257063-episode-2-2020-minna-saariketo-mareike-gloss-in-the-grey-zone-of-hacking-two-cases-in-the-political-economy-of-software-and-the-right-to-repair.mp3" length="16324736" type="audio/mpeg" />
    <itunes:author>Paula Bialski</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257063</guid>
    <pubDate>Wed, 02 Sep 2020 21:00:00 +0000</pubDate>
    <itunes:duration>1358</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3 (2020): Annika Richterich - Forget about the learning: On (digital) creativity and expertise in hacker-/makerspaces</itunes:title>
    <title>Episode 3 (2020): Annika Richterich - Forget about the learning: On (digital) creativity and expertise in hacker-/makerspaces</title>
    <itunes:summary><![CDATA[Annika Richterich is an assistant professor in Digital Culture at Maastricht University (NL). Her research focuses on practices of collaboration, learning and innovation in hacking communities. Annika explains that hackers and makers are curious people. They tinker, try, and team up − driven by tech-political motives, entrepreneurial interests, or just for the fun of it. Their curiosity about digital technology and crafts makes them self-driven learners in these domains. To share their enthus...]]></itunes:summary>
    <description><![CDATA[<p>Annika Richterich is an assistant professor in Digital Culture at Maastricht University (NL). Her research focuses on practices of collaboration, learning and innovation in hacking communities.</p><p>Annika explains that hackers and makers are curious people. They tinker, try, and team up − driven by tech-political motives, entrepreneurial interests, or just for the fun of it. Their curiosity about digital technology and crafts makes them self-driven learners in these domains. To share their enthusiasm as well as required machines, hackers and makers worldwide have formed communities called hack-/hackerspaces and makerspaces. These are physical places where members engage in creative DIY activities involving software and electronics. Learning is key to the social tech and craft practices cultivated in hacker-/makerspaces (HMS). Yet, the educational value of these DIY communities has been rarely acknowledged. Drawing on a mixed-methods study, her paper explores how (digital) creativity and expertise are interrelated in HMS.</p>]]></description>
    <content:encoded><![CDATA[<p>Annika Richterich is an assistant professor in Digital Culture at Maastricht University (NL). Her research focuses on practices of collaboration, learning and innovation in hacking communities.</p><p>Annika explains that hackers and makers are curious people. They tinker, try, and team up − driven by tech-political motives, entrepreneurial interests, or just for the fun of it. Their curiosity about digital technology and crafts makes them self-driven learners in these domains. To share their enthusiasm as well as required machines, hackers and makers worldwide have formed communities called hack-/hackerspaces and makerspaces. These are physical places where members engage in creative DIY activities involving software and electronics. Learning is key to the social tech and craft practices cultivated in hacker-/makerspaces (HMS). Yet, the educational value of these DIY communities has been rarely acknowledged. Drawing on a mixed-methods study, her paper explores how (digital) creativity and expertise are interrelated in HMS.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257522-episode-3-2020-annika-richterich-forget-about-the-learning-on-digital-creativity-and-expertise-in-hacker-makerspaces.mp3" length="15028829" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257522</guid>
    <pubDate>Wed, 02 Sep 2020 20:00:00 +0000</pubDate>
    <itunes:duration>1250</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 4 (2020): Alex Dean Cybulski - Hacker Culture Is Everything You Don&#39;t Get Paid For In the Information Security Industry</itunes:title>
    <title>Episode 4 (2020): Alex Dean Cybulski - Hacker Culture Is Everything You Don&#39;t Get Paid For In the Information Security Industry</title>
    <itunes:summary><![CDATA[Alex Dean Cybulski is a PhD candidate at the University of Toronto's Faculty of Information. Presently, he is writing a dissertation on capture the flag competitions, play and games in hacker culture and the information security industry. In this session he will talk about the field he is studying – specifically Capture the flag (CTF). It is a competitive game in which players mimic the experience of discovering and exploiting vulnerabilities in information systems, hacking into simulated sof...]]></itunes:summary>
    <description><![CDATA[<p>Alex Dean Cybulski is a PhD candidate at the University of Toronto&apos;s Faculty of Information. Presently, he is writing a dissertation on capture the flag competitions, play and games in hacker culture and the information security industry.</p><p>In this session he will talk about the field he is studying – specifically Capture the flag (CTF). It is a competitive game in which players mimic the experience of discovering and exploiting vulnerabilities in information systems, hacking into simulated software and/or networks to retrieve data known as a ‘flag.’ CTF participants, often drawn from the information security and IT industries utilize these games as a means of training to develop/apply offensive security knowledge in a legal way, so that they can better defend the software/systems they are entrusted with. <br/> <br/>This presentation will discuss preliminary findings of his research: ethnographic, semi-structured interviews with a team of players at an on-site CTF who also share the same workplace.  </p>]]></description>
    <content:encoded><![CDATA[<p>Alex Dean Cybulski is a PhD candidate at the University of Toronto&apos;s Faculty of Information. Presently, he is writing a dissertation on capture the flag competitions, play and games in hacker culture and the information security industry.</p><p>In this session he will talk about the field he is studying – specifically Capture the flag (CTF). It is a competitive game in which players mimic the experience of discovering and exploiting vulnerabilities in information systems, hacking into simulated software and/or networks to retrieve data known as a ‘flag.’ CTF participants, often drawn from the information security and IT industries utilize these games as a means of training to develop/apply offensive security knowledge in a legal way, so that they can better defend the software/systems they are entrusted with. <br/> <br/>This presentation will discuss preliminary findings of his research: ethnographic, semi-structured interviews with a team of players at an on-site CTF who also share the same workplace.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257501-episode-4-2020-alex-dean-cybulski-hacker-culture-is-everything-you-don-t-get-paid-for-in-the-information-security-industry.mp3" length="14241398" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257501</guid>
    <pubDate>Wed, 02 Sep 2020 19:00:00 +0000</pubDate>
    <itunes:duration>1184</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 5 (2020): Jérémy Grosman  - Algorithmic Objects, Algorithmic Practices</itunes:title>
    <title>Episode 5 (2020): Jérémy Grosman  - Algorithmic Objects, Algorithmic Practices</title>
    <itunes:summary><![CDATA[Jérémy is a PhD student at the Faculty of Philosophy at the University of Namur in Belgium His work sits between computer science on the one hand and philosophy on the other.  Jeremy’s talk today takes a deep dive into the daily practices of engineers (practices like implementations, experiments, publications). He says that these practices force engineers to complicate the separation between algorithms, on one side, and problems, on the other. His work focuses on a character named Robin,...]]></itunes:summary>
    <description><![CDATA[<p>Jérémy is a PhD student at the Faculty of Philosophy at the University of Namur in Belgium His work sits between computer science on the one hand and philosophy on the other. </p><p>Jeremy’s talk today takes a deep dive into the daily practices of engineers (practices like implementations, experiments, publications). He says that these practices force engineers to complicate the separation between algorithms, on one side, and problems, on the other. His work focuses on a character named Robin, an engineer working on recommender systems, who he ethnographically observed in his research project. </p><p>In today’s talk, he will focus on describing one bit of Robin’s work, in order to hopefully teach us something about what algorithms, as objects are, in between in between abstract mathematical objects and concrete material objects, and he will attempts to give us an insight into engineering endeavours. </p>]]></description>
    <content:encoded><![CDATA[<p>Jérémy is a PhD student at the Faculty of Philosophy at the University of Namur in Belgium His work sits between computer science on the one hand and philosophy on the other. </p><p>Jeremy’s talk today takes a deep dive into the daily practices of engineers (practices like implementations, experiments, publications). He says that these practices force engineers to complicate the separation between algorithms, on one side, and problems, on the other. His work focuses on a character named Robin, an engineer working on recommender systems, who he ethnographically observed in his research project. </p><p>In today’s talk, he will focus on describing one bit of Robin’s work, in order to hopefully teach us something about what algorithms, as objects are, in between in between abstract mathematical objects and concrete material objects, and he will attempts to give us an insight into engineering endeavours. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257453-episode-5-2020-jeremy-grosman-algorithmic-objects-algorithmic-practices.mp3" length="14562920" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257453</guid>
    <pubDate>Wed, 02 Sep 2020 18:00:00 +0000</pubDate>
    <itunes:duration>1211</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 6 (2020): Stéphane Couture - Hacker Culture and Practices in the Development of Internet Protocols</itunes:title>
    <title>Episode 6 (2020): Stéphane Couture - Hacker Culture and Practices in the Development of Internet Protocols</title>
    <itunes:summary><![CDATA[Stéphane Couture is a Professor at the Faculté des arts et des sciences - Département de communication at the University of Montreal.  Referring to previous work done on hacker culture and free and open source software,  Stéphane's presentation will look at the cultures, practices, and power dynamics of the Internet Engineering Task Force (IETF) and its sister and peripheral organization, the Internet Research Task Force (IRTF). IETF is the main organization building Internet protoc...]]></itunes:summary>
    <description><![CDATA[<h1>Stéphane Couture is a Professor at the Faculté des arts et des sciences - Département de communication at the University of Montreal. </h1><p><br/>Referring to previous work done on hacker culture and free and open source software,  Stéphane&apos;s presentation will look at the cultures, practices, and power dynamics of the Internet Engineering Task Force (IETF) and its sister and peripheral organization, the Internet Research Task Force (IRTF). IETF is the main organization building Internet protocols, namely the formal specifications and standards that specify the rules and forms of computer communication on the Internet. He proposes to look at protocol development from the perspective of hacker cultures and practices described by authors such as Coleman and Kelty. Indeed, while the ‘protocol’ artifact is different than the software ‘code’ of hackers, many aspects of its development are reminiscent of hacker culture. </p>]]></description>
    <content:encoded><![CDATA[<h1>Stéphane Couture is a Professor at the Faculté des arts et des sciences - Département de communication at the University of Montreal. </h1><p><br/>Referring to previous work done on hacker culture and free and open source software,  Stéphane&apos;s presentation will look at the cultures, practices, and power dynamics of the Internet Engineering Task Force (IETF) and its sister and peripheral organization, the Internet Research Task Force (IRTF). IETF is the main organization building Internet protocols, namely the formal specifications and standards that specify the rules and forms of computer communication on the Internet. He proposes to look at protocol development from the perspective of hacker cultures and practices described by authors such as Coleman and Kelty. Indeed, while the ‘protocol’ artifact is different than the software ‘code’ of hackers, many aspects of its development are reminiscent of hacker culture. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257381-episode-6-2020-stephane-couture-hacker-culture-and-practices-in-the-development-of-internet-protocols.mp3" length="14257030" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257381</guid>
    <pubDate>Wed, 02 Sep 2020 18:00:00 +0000</pubDate>
    <itunes:duration>1185</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 7 (2020): Ola Michalec - Hacking infrastructures: understanding capabilities of Operational Technology (OT) security workers</itunes:title>
    <title>Episode 7 (2020): Ola Michalec - Hacking infrastructures: understanding capabilities of Operational Technology (OT) security workers</title>
    <itunes:summary><![CDATA[Ola is a research associate at the University of Bristol and is interested in the 'making of' technology, science and policy, specifically about the Cybersecurity of Critical National Infrastructures Facilities like power plants, water pipes and railway stations underpin contemporary living standards across the world. For decades, they have been operated by Operational Technologies (OT), basic (yet sturdy!) computers without Internet access. People working in OT facilities are traditionally m...]]></itunes:summary>
    <description><![CDATA[<p>Ola is a research associate at the University of Bristol and is interested in the &apos;making of&apos; technology, science and policy, specifically about the Cybersecurity of Critical National Infrastructures</p><p>Facilities like power plants, water pipes and railway stations underpin contemporary living standards across the world. For decades, they have been operated by Operational Technologies (OT), basic (yet sturdy!) computers without Internet access. People working in OT facilities are traditionally manual workers or engineers with training in safety.</p><p>In this session, Ola presents the results of a qualitative study conducted between November 2019-January 2020, where her and her team interviewed 30 UK-based security practitioners with expertise in critical infrastructures. Their analysis is concerned with the following questions: How do security practitioners define (in)security? How do they evidence it? What capabilities make a good OT security worker?</p>]]></description>
    <content:encoded><![CDATA[<p>Ola is a research associate at the University of Bristol and is interested in the &apos;making of&apos; technology, science and policy, specifically about the Cybersecurity of Critical National Infrastructures</p><p>Facilities like power plants, water pipes and railway stations underpin contemporary living standards across the world. For decades, they have been operated by Operational Technologies (OT), basic (yet sturdy!) computers without Internet access. People working in OT facilities are traditionally manual workers or engineers with training in safety.</p><p>In this session, Ola presents the results of a qualitative study conducted between November 2019-January 2020, where her and her team interviewed 30 UK-based security practitioners with expertise in critical infrastructures. Their analysis is concerned with the following questions: How do security practitioners define (in)security? How do they evidence it? What capabilities make a good OT security worker?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257378-episode-7-2020-ola-michalec-hacking-infrastructures-understanding-capabilities-of-operational-technology-ot-security-workers.mp3" length="13816657" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257378</guid>
    <pubDate>Wed, 02 Sep 2020 17:00:00 +0000</pubDate>
    <itunes:duration>1149</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 8 (2020): Sylvain Besençon - Securing by hacking: maintenance regimes around an end-to-end encryption standard</itunes:title>
    <title>Episode 8 (2020): Sylvain Besençon - Securing by hacking: maintenance regimes around an end-to-end encryption standard</title>
    <itunes:summary><![CDATA[In this session, we interview Sylvain Besençon a PhD student in anthropology at the University of Fribourg.   In his presentation, he talks about internet standards, which are elementary and powerful bricks of the Internet infrastructure: they define how the Internet should work and help developers to code their pieces of software accordingly. However, regularly, there are some voices or hacks that destabilize them and open the door to radical uncertainties about the reliability of the s...]]></itunes:summary>
    <description><![CDATA[<p>In this session, we interview Sylvain Besençon a PhD student in anthropology at the University of Fribourg. <br/><br/>In his presentation, he talks about internet standards, which are elementary and powerful bricks of the Internet infrastructure: they define how the Internet should work and help developers to code their pieces of software accordingly. However, regularly, there are some voices or hacks that destabilize them and open the door to radical uncertainties about the reliability of the software we use, especially when crucial information is at stake. Based on digital ethnography as well as interviews and observations at international conferences, his paper takes as departure point the disclosure process of a series of vulnerabilities that affects an end-to-end email encryption standard called OpenPGP, used mostly by computer engineers, activists and journalists. </p>]]></description>
    <content:encoded><![CDATA[<p>In this session, we interview Sylvain Besençon a PhD student in anthropology at the University of Fribourg. <br/><br/>In his presentation, he talks about internet standards, which are elementary and powerful bricks of the Internet infrastructure: they define how the Internet should work and help developers to code their pieces of software accordingly. However, regularly, there are some voices or hacks that destabilize them and open the door to radical uncertainties about the reliability of the software we use, especially when crucial information is at stake. Based on digital ethnography as well as interviews and observations at international conferences, his paper takes as departure point the disclosure process of a series of vulnerabilities that affects an end-to-end email encryption standard called OpenPGP, used mostly by computer engineers, activists and journalists. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257330-episode-8-2020-sylvain-besencon-securing-by-hacking-maintenance-regimes-around-an-end-to-end-encryption-standard.mp3" length="13572436" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257330</guid>
    <pubDate>Wed, 02 Sep 2020 16:00:00 +0000</pubDate>
    <itunes:duration>1128</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 9 (2020): R. Stuart Geiger &amp; Dorothy Howard - “I didn’t sign up for this”: The Invisible Work of Maintaining Free/Open-Source Software Communities</itunes:title>
    <title>Episode 9 (2020): R. Stuart Geiger &amp; Dorothy Howard - “I didn’t sign up for this”: The Invisible Work of Maintaining Free/Open-Source Software Communities</title>
    <itunes:summary><![CDATA[R. Stuart Geiger calls himself an Ethnographer of computation and computational ethnographer, and is an Assistant Professor at the University of California, San Diego in the Department of Communication and the Haligiolu Data science Institute. Dorothy Howard is a Ph.D. student in Communication at UC San Diego, and her interests broadly span across the psychosocial and material effects of sociotechnical systems on society, and on worker's lives and subjectivities. In this session, Stuart and D...]]></itunes:summary>
    <description><![CDATA[<p>R. Stuart Geiger calls himself an Ethnographer of computation and computational ethnographer, and is an Assistant Professor at the University of California, San Diego in the <a href='https://communication.ucsd.edu'>Department of Communication</a> and the Haligiolu Data science Institute.</p><p>Dorothy Howard is a Ph.D. student in Communication at <em>UC San Diego, and her </em>interests broadly span across the psychosocial and material effects of sociotechnical systems on society, and on worker&apos;s lives and subjectivities.</p><p>In this session, Stuart and Dorothy will present findings about the work of maintaining community-based free and/or open-source software (F/OSS) projects, focusing on invisible and infrastructural work. Many F/OSS projects have become foundational across academia, industry, government, journalism, and activism. Although F/OSS projects provide immense benefits for society, they are often created and sustained by volunteer labor. Their maintainers often struggle with how to sustain and support their projects, particularly for projects lower down the stack like software libraries, operating systems, or kernels, which become adopted as infrastructure. Some growing projects transition into non-profit foundations, startups, or corporate patronage, while others stand against more traditional organizational models and align with more decentralized, cooperative, or ‘hacker’ cultures.</p><p><b> </b></p>]]></description>
    <content:encoded><![CDATA[<p>R. Stuart Geiger calls himself an Ethnographer of computation and computational ethnographer, and is an Assistant Professor at the University of California, San Diego in the <a href='https://communication.ucsd.edu'>Department of Communication</a> and the Haligiolu Data science Institute.</p><p>Dorothy Howard is a Ph.D. student in Communication at <em>UC San Diego, and her </em>interests broadly span across the psychosocial and material effects of sociotechnical systems on society, and on worker&apos;s lives and subjectivities.</p><p>In this session, Stuart and Dorothy will present findings about the work of maintaining community-based free and/or open-source software (F/OSS) projects, focusing on invisible and infrastructural work. Many F/OSS projects have become foundational across academia, industry, government, journalism, and activism. Although F/OSS projects provide immense benefits for society, they are often created and sustained by volunteer labor. Their maintainers often struggle with how to sustain and support their projects, particularly for projects lower down the stack like software libraries, operating systems, or kernels, which become adopted as infrastructure. Some growing projects transition into non-profit foundations, startups, or corporate patronage, while others stand against more traditional organizational models and align with more decentralized, cooperative, or ‘hacker’ cultures.</p><p><b> </b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1323889/episodes/5257318-episode-9-2020-r-stuart-geiger-dorothy-howard-i-didn-t-sign-up-for-this-the-invisible-work-of-maintaining-free-open-source-software-communities.mp3" length="14632035" type="audio/mpeg" />
    <itunes:author>Paula Bialski &amp; Mace Ojala </itunes:author>
    <guid isPermaLink="false">Buzzsprout-5257318</guid>
    <pubDate>Wed, 02 Sep 2020 16:00:00 +0000</pubDate>
    <itunes:duration>1216</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2020</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
