Chapter 2b: Server Issues: Networked Infrastructure: Difference between revisions

This page was last edited on 6 March 2026, at 17:24.
mNo edit summary
No edit summary
 
(195 intermediate revisions by 6 users not shown)
Line 1: Line 1:
==== Coordinator: SysterServer  with contributors: xm (ooooo), Mara and nate ====
<ref>https://digitalcare.noho.st/pad/p/servpub</ref>
<ref>https://eth.leverburns.blue/p/servpub-2b</ref>
<nowiki/>


<blockquote>"Activist infrastructures are where the messy, grinding, generally invisible ­labor of 'doing feminism' takes place." – Cait McKinney, ''Information Activism: A Queer History of Lesbian Media'' (2020).<ref>Cait McKinney, ''Information Activism: A Queer History of Lesbian Media Technologies,'' (Duke University Press, 2020).</ref>
</blockquote>


== Being part of internets ==
[https://systerserver.org Systerserver], a feminist server project of almost two decades,<ref>For more information on the genealogy of Systerserver see Wessalowski, Nate & Karagianni, Mara. “From Feminist Servers to Feminist Federation.” ''A Peer-Reviewed Journal About'' 12, no. 1 (September 7, 2023), 192–208.


===== intro =====
<nowiki>https://doi.org/10.7146/aprja.v12i1.140450</nowiki>.</ref> has supported the ServPub project with their network infrastructure. The feminists involved in this project have configured their own infrastructure of two physical servers in the data room of [https://esc.mur.at/ <nowiki>[mur.at]</nowiki>], an art association in Graz, Austria, which hosts a wide variety of art and cultural initiatives. The physical servers found this shelter through the networking of activists and artists during the [https://eclectictechcarnival.org/ Eclectic Tech Carnival (/ETC]), a self-organised skill-sharing gathering. Donna Meltzer and Gaba from Systerserver went to Graz to upgrade the servers' hardware in 2019. The first machine, installed and configured in 2005, is called Jean and was refurbished by [https://www.ooooo.be ooooo] in 2023 during their stay in Graz for the Traversal Network of Feminist Servers (ATNOFS), which took place in different countries.<ref>Chapter 2: Traveling server space: Why does it matter?, "A Traversal Network of Feminist Servers" (2022). Accessed 8 March 2026. https://systerserver.net/ATNOFS/</ref> The ATNOFS event in Austria was hosted by [https://esc.mur.at/ ESC], a local media art gallery in Graz, which is affiliated with [mur.at].  
Online publics are not virtual or politically neutral 'cyberspaces', they result from the material and laborious networking of computers and 'the relations that form around them'.<ref>This infrastructural understanding of publishing and computer networks is indebted to Lauren Berlant, 2016. The commons: Infrastructures for troubling times*</ref> The following text describes and documents some of the infrastructural practices around the Servpub project<ref>https://servpub.net/</ref> which explores modes of 'making public' at the fringes of the locked-down publishing apparatus of the university. It also introduces and investigates the feminist principles of ''<nowiki/>'making space for ourselves*'<nowiki/>''<ref>This is on one of the slides.</ref> and '<nowiki/>''choosing our* own dependencies'''<ref>After a formulation from the first Feminist Server manifesto: "A feminist server… is autonomous in the sense that she decides for her own dependencies." (https://areyoubeingserved.constantvzw.org/Summit_afterlife.xhtml)</ref> which are tied to practices of networking, publishing and inhabiting online-offline spaces.


More concretely, this text recounts the collaborative modes of sharing infrastructures and responsabilities between Servpub und Systerserver. The collaboration (alliance?) is reflected on and documented by some of us Systerserver admins in exchange with other members of a further network of feminist servers and feminist sysadmins<ref>One important means for exchange and contact are emaillists, such as the adminsysters list hosted by Systerserver.</ref>. Both writing and publishing this text has been a recursive endeavor in the sense that it involved the infrastructures of the Servpub project resulting from the collaboration, such as the self-hosted wiki-to-print service. Furthermore the project relied on self-hosted services and organizational tools from Systerserver. Systerserver is one of the oldest feminist servers, founded in 2005 in the context of the Gender Changer Academy and the Ecelectic Tech Carnival.<ref>More information about the /etc and past  events see <nowiki>https://eclectictechcarnival.org/ET</nowiki>  C2019/archive/.</ref>[[File:Feminist internet.jpg|thumb]]
Both servers are running on Debian, a Linux-based operating system, and host several tools for community communications and organising,<ref>Systerserver hosts a GitLab instance as code repository, Peertube for video and streaming, Mailman for mailing lists, Nextcloud for data storage and collective organisation, Mastodon for providing a microblogging social networking platform, Tinc for VPN, and relevant code based projects and websites. For links to each service, visit https://systerserver.net/.</ref> among which is Tinc – a virtual private network (VPN) software. The VPN is the most recent addition, facilitating the desire for servers hosted by our peers from their homes, studios, and spaces that cannot afford a stable digital address.<ref>Configuring a server requires what is known as a fixed IP address, which is a numeric notation, signalling the location of the server. This IP address can be mapped to a domain name, which in turn can be traceable on the internet when visiting said domain name in a browser.</ref> Those server projects interweave into a feminist networking – an affective, socio-technical infrastructure – enabling more trans-feminist groups and collectives – such as actinomy (Bremen), leverburns (Amsterdam), caladona (Barcelona), or brknhs (Berlin) – to host their own servers in their own spaces rather than in data centres, and be reachable through the public internet.  
[[File:Aicarmela-quote.png|thumb|Audrey Lorde cited by ai carmela]]
As part of Systerserver we are co-dependent on other feminist server projects (anarchaserver, Maadix, leverburns, digiticalcare...) and other autonomous tech collectives. Together we have a need to share ways of doing, tools & strategies ''to overcome/overthrow the monocultural, centralized oligopolic surveillance & technologies of control and''  We need to resist the matrix of domination. Stop the exploitation and continuation of social and climatological injustice(s)


To this aim, some of us take inspiration from the tactics of ''Queercore: How To Punk A Revolution'' <ref> https://www.imdb.com/title/tt4643034</ref>. The documentary explores the rise of the queercore cultural and social movement in the mid-1980s, which channeled punk angst into a biting critique of societal homophobia. We introduce our feminist server's activities as a catalyst to push techno-feminism into existence and announce we are here to stay, even in the current tech-fascist oppressive society.
Tinc was chosen as VPN software, mimicking what Systerserver learnt during their participation in ATNOFS, encountering the mobile server Rosa.<ref>Rosa is Raspberry Pi server using varia.hub to be reachable on the internet. Varia hub is what in varia they call a jump hole, a poetic description for the VPN + reverse proxy through their servers. Varia  is a space for developing collective approaches to everyday technology, working with free software, organising events, and collaborating in different constellations. See https://varia.zone/en/.</ref> Rosa is a server connected to the internet via a VPN, hosted by the Rotterdam-based space Varia, which was inspired by another relevant network infrastructure setup – that of the Rotterdam-based institute XPUB.<ref>XPUB is the Master of Arts in Fine Art and Design: Experimental Publishing of the Piet Zwart Institute in Rotterdam. XPUB focuses on the acts of making things public and creating publics in the age of post-digital networks. The VPN software Tinc and reverse proxy is inspired by their HUB project, which enabled the Institute to form an experimental server space for their students who could access the server from outside the Institute, passing institutional firewalls securely and let devices roam. See Docs:03_VPN_with_Tinc.</ref> Constant association in Brussels and Hackers and Designers collective in Amsterdam have also experimented with similar VPN-based servers.<ref>Mara Karagianni, Michael Murtaugh, and Wendy Van Wynsberghe were commissioned by Constant to write a zine manual on Tinc and reverse proxies: "Making A Private server Ambulant''"'', https://psaroskalazines.gr/pdf/rosa_beta_25_jan_23.pdf.
The beta version of the zine was revised and updated by vo ezn, who is also part of Systerserver. She deployed it in the digital infrastructure of Hackers and Designers.</ref> The people, groups, and spaces involved in these server experiments often overlap, which is also due to the physical proximity of the projects (Rotterdam, Brussels, Amsterdam).


'''Mitigating dependencies''' (the problem and the 'research question)
=== Being a server ===
A VPN software creates virtual private networks, connecting computers and devices that are not in the same physical location. In contrast to the public internet, the network between these devices is concealed – hence the term "private" – as it exists only between the trusted devices that have been added to it. A VPN can also provide a public entry point to these privately networked devices, making them reachable over the public internet and thus allowing them to function as servers. When devices connect to the internet, they are assigned a numeric identifier known as an Internet Protocol (IP) address. A home or office router is assigned a public IP address by its Internet Service Provider (ISP) – this address changes periodically, thus is referred to as dynamic. The ISP allocates these public IP address from a limited pool; each has an expiration period knowns as lease time. Once the lease expires, the address may change, allowing the ISP to provide internet connection to far more locations than the size of its IP pool. ISPs do this to manage available addresses more efficiently and for minor security benefits.<ref>IP address lease times provide security benefits such as preventing persistent unauthorised use, reduce risks such as IP spoofing and theft, and allow rapid response to misuse by removing compromised devices from the network.</ref> 


Today, many forms of online publishing depend on corporate services and providers, furthering the centralization and commercialisation of the internet. These dependencies are of course most palpable for those who are publishing directly on corporate platforms such as commercial social media or with corporate publishers which have taken over academic publishing practices.<ref>Aaron Swartz, Open Access Guerilla Manifesto: <nowiki>https://archive.org/details/GuerillaOpenAccessManifesto</nowiki></ref> But even for projects who, like Servpub, are setting out to self-host by running and maintaining their own online infrastructures (web servers), dependencies -- understood as technically facilitated relations based in a power imbalance --  are not easy to mitigate.
All devices within a home or office are assigned a local IP address by the router. By default, the router permits one-way internet traffic – such as websites' content (response) – while blocking unsolicited traffic from the outside world. However, within a VPN network, the devices are assigned a private IP by the VPN software itself, and they become able to both send and receive traffic from outside their physical location.  


For many self-hosting projects, this means that the data traffic of everyone who wants to visit or interact with a particular self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for acts of censorship and compliance with states agencies in cases of political prosecution.<ref>Lookup the storys of Hetzner.</ref> This fundamentally contradicts the vision not only of autonomous self-hosting but also of a feminist internet set up to facilitate critical connections beyond relations of commercial exchange.
[[File:2-what-is-vpn.png|600x600px|center|frameless| Drawing from Tunnel Up/ Tunnel Down zine by Mara Karagianni, introduction about virtual private networks [https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf]|alt=What is a VPN]]


So, what would it mean to instead grow interdependencies and networks which further horizontal and non-commerical modes of exchange and support? What are the challenges of self-publishing on a technical and social level with which Servpub was confronted? And what does feminist politics of networking and ''choosing our* own dependencies'' and ''making space for ourselves'' look like in practice?
Visiting a device over the internet by remembering its IP address would be challenging, if not impossible. This is why domain names – such as [https://wwww.servpub.net www.servpub.net]– are needed. They are mapped to an IP address so that when the domain name is visited, the browser can retrieve and present the content (for example, a website) hosted on that device. Maintaining the same IP address over time is crucial for reliably mapping it to a domain name. Such an address is therefore known as a fixed or static IP. The translation between IP addresses and domain names (and vice versa) is handled by Domain Name Servers, or DNS.<ref> Networking! Ack! ''(2017),'' a zine by Julia Evans, provides a fun guide to DNS and computer networking in general. Accesssed 8 March 2026. https://jvns.ca/networking-zine.pdf.</ref>


'''A network of one's own'''
[[File:network-hack.png|600x600px|center|frameless|Network! Ack! zine by Julia Evans, introduction about computer networking and how DNS works [https://wizardzines.com/zines/networking/]|alt=Network! Ack!]]


One particular angle from which the question of 'publishing' will be interrogated in the following, is the notion of locality  -- of having a place, an address which can be visited on the network. On the internet, this is facilitated by the protocollogical logic of the internet protocol (IP) which -- amongst other requirements -- allows a computer to become an addressable node which can be reached through other nodes on the internet. Nodes who are answering to the calls of other computers, such as the call to view a website, to provide a document, to send an email or to receive a video stream, are called servers.
So if a request is made to [https://wiki4print.servpub.net wiki4print.servpub.net], the request first reaches Jean, whose IP is mapped to that domain, because Jean is the only computer with a public and static IP address within this private network. On Jean, web engine configuration software forwards the request to the private IP of the device that actually hosts ServPub project's wiki. The request is thus rerouted internally – inside the concealed virtual private network – to the specific device hosting the wiki4print website. This forwarding of requests from the public IP to the private one is called a proxy request, and the device's ability to send data back through the public node – thus functioning as a server – is enabled via a reverse proxy.


A server is thus a place on the internet: A place where our data is hosted, the contents of our websites, where we are chatting, storing our stories and imaginaries and access the multiple online services we need to get organized (mailing lists, calendars, notes,...). We don't want to be served, we think a feminist server as an (online) space that we need to inhabit. As inhabitants,  we contribute by nurturing a safe space and a place for creativity, experimentation and justice, a place for hacking hetero normative and patriarchal technologies. Feminist servers have the potential to learn, to maintain and care for a space together in a non-hierarchical way, and in a non-meritocratic way.
Systerserver has configured three such private networks using Tinc to reach home-based servers that lack public and static IP address: ''internes'', ''alliances'' and ''systerserver''.<ref>The ''internes'' stands for Systerserver's machines located in [mur.at] to reach a machine in Antwerp, which makes periodic backups of Jean and Adele servers. The network ''alliances'' stands for facilitating several home-based server initiatives within Systerserver's extensive community, such as the Etherpad services hosted on the leverburns server which Systerserver uses for technical documentation during server maintenance sessions, or for other allied communities such as caladona and brknhs that want to serve video content without having to commit to the expenses of acquiring a public and static IP address.</ref> The network named ''systerserver'' was the first Tinc installation and configuration in Systerserver's infrastructure. It was initiated specifically for the publishing infrastructure of the ServPub project. The ''systerserver'' network allows the Raspberry Pis – which host wiki4print and the ServPub website – to be accessible over the internet via Systerserver's public node and machine, Jean.  


<ref> https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf </ref>
Arriving at this first technical attempt to configure the ''systerserver'' network required building trust between Systerserver peers and the other groups participating in the ServPub project. This began with Winnie Soon's participation in one of Systerserver's week-long event and workshops in Barcelona in 2023, during which Systerserver installed PeerTube for and with the caladona women's space. Such collective, grassroots organising-based events – messy and campy – form the basis for bonding and solidarity, built on the invisible labour of doing feminism (McKinney 2020). By understanding computing together, configuring machines, and conversing about big tech and its sexism, racism, classism, and gender discrimination, the people gathered at these events nourish a resistance rooted in body and identity politics – one that transgress labour exchanges based on economic value alone.[[File:Protocol_stack_hourglass.jpeg|300x300px|center|frameless|Ip protocol stack]]


To be able to setup server's we need to have hardware, a machine - a single board computer (like raspberry pi, olimex, an old refurbished laptop/smartphone,...) or a server in a rack in a data center, a virtual machine (vps), and the will to self-host (described in chapter 1). As Systerserver, our feminist server project, we relate and organize around these servers by adopting different roles, defined in conversations with Anarchaserver's network.
== Navigating network politics ==
Looking at the initial architecture of the internet as a communication medium where any node could reach any other node – and where a node was authenticated by its address as a unique identifier – the current landscape has transformed into something quite different. Since the late 1990s, the IPv6 protocol was conceived to mitigate the depletion of IPv4 addresses<ref>The first publication of the IPv6 protocol in a Request for Comments was in December 1998. Accessed 20 September 2025. https://www.rfc-editor.org/rfc/rfc2460.txt.</ref> by providing a much larger address space, thereby restoring the original numeric uniqueness. IPv6 was also designed with embedded security within the IP packet itself. By contrast, IPv4 required external encryption configurations which led to the development of the IPSec encryption protocol in the mid-1990s. IPSec provided end-to-end security wrapped around the IP layer, authenticating and encrypting each IP packet. While IPSec ensured encryption for IPv4, it required additional software installation and configuration, but encryption was incorporated as a core component of IPv6.<ref> Besides being a secure protocol with extra authentication and privacy, IPv6 features support for unicast, multicast, and anycast. See, "Internet working with TCP/IP", Vol. 2 by Douglas E. Comer and David L. Stevens, (Prentice Hall, 1998). Accessed 20 September 2025. https://archive.org/details/internetworking000come.</ref> For the vast majority of IPv4 based Internet communications that happen over the web, the solution to security was the implementation of HTTPS certificates,<ref>While HTTPS is a way to secure traffic over the internet, it is distinguished from IPSec in that IPSec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS –a  secure version of HTTP, using TLS certificates –secures individual web sessions. The authentication with a TLS certificate relies on the organisation or company's name ownership of the certificate, and not on the integrity of the server's IP address. This enables CDNs to cache content and serve in place of the origin server, which contributes to the centralisation of content distribution over the web, https://gcore.com/learning/tls-on-cdn. For more about how TLS works, see https://www.bacloud.com/en/blog/190/ssl-for-ip-lets-encrypt-now-supports-tlsorssl-certificates-for-ip-addresses.html.</ref>. However, other internet connections – such as files syncing between two devices – require extra encryption configurations or tunnels, such ssh or VPN, or the IPSec mentioned above.
[[File:IP-packet-auth-encrypted.png|alt=How IPSec encryption works with IPv4 data packet|center|thumb|613x613px|How IPSec works: An IPv4 data packet without encryption and with encryption provided by IPSec. Drawing by Mara Karagianni, part of the Tunnel Up/ Tunnel Down zine https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf ]]
Secure certificates encrypt traffic over cables and wireless signals, but once data reach the destination server, they are no longer encrypted. Unencrypted data can therefore be cached and served by intermediaries located closer to users' internet access points. For example, when the same website is requested again, the content may be served by a Content Distribution Network (CDN) rather than the origin server. CDN providers deliver much of internet content by caching it on servers distributed around the world. By serving data from servers that are geographically close to users, they greatly reduce the impact of physical distance between the user’s internet access point and the origin server, thereby speeding up load times. However, this centralisation of content – which has been made possible by the sharp decline in digital storage costs since the 2010s – raises certain user‑rights concerns despite its performance benefits. Because CDNs terminate secure certificates and gain access to unencrypted data, they introduce an additional point where user data can be inspected, monitored or breached. Their central position also enables large‑scale blocking, filtering, and surveillance capitalism, which can affect, for example, the right to erasure – especially when data crosses borders.<ref>For example, data harvesting and extensive users profiling without consent violates the EU law General Data Protection Regulation (GDPR), https://wideangle.co/blog/content-delivery-network-cdn-and-gdpr.</ref>


'''Guardians''' are the people who report new updates, possible bugs [...] to ensure the security and the functionality of the services. They initiate collective meetings to address the issues and follow up that is gets done. '''Interfaces''' are people who are in-betweens to communicate about the feminist servers to our communities and allies. They also support the guardians by using the services and pointing out if some of them are not working or has issues. '''Scribes''' are the people who will be providing support by writing documentation during our collective meetings, either by creating content in our wiki, or in our gitlab, or by writing documents needed for their services, or by developing narratives. '''Fire extinguishers''' are the people who have the most experience, on who we can rely if we suffer an attack or something very strange is happening. They also guide while installing, configuring and debugging.
Technologies such as dynamic IP addresses, mentioned above – and other address-sharing technics<ref>For example, see routing via Network Address Translation (NAT), https://en.wikipedia.org/wiki/Network_address_translation.</ref> and CDNs that multiplex many sites onto fewer IPv4s working around the scarcity of IP addresses<ref>Huston Geoff, ''The IPv6 transition'' (2024). Accessed 20 September 2025. https://blog.apnic.net/2024/10/22/the-ipv6-transition/.</ref> – has slowed the IPv6 rollout across devices. Given IPv6 potential for true end-to-end encryption for each device on the internet, one might ask whether embedded per-packet encryption constitutes a civil right to security and privacy that industry and state surveillance actors would prefer to avoid. At the same time, ISPs can charge higher prices for scarce IPv4 addresses, and in some cases legacy IP blocks of addresses are traded on the grey market, because they were allocated before regional internet registries existed and therefore remain unregulated.<ref>The African continent registry (AFRINIC) has been under scrutiny due to organisational and legal problems. In 2019, 4.1 million IPv4 addresses (part of unused legacy IP blocks), were sold on the grey market. Accessed 25 July 2025. https://en.wikipedia.org/wiki/AFRINIC.</ref>


Besides from these roles we need to encourage “data infrastructure literacy” for the ability to account for, intervene around and participate in the wider socio-technical infrastructures in which data is created, stored and analyzed. Our intent is to make space for collective inquiry, experimentation, imagination and intervention around data. Data as in binary information, suitable for processing by computers, recognizing it's intrinsic (human)labour conditions, maintenance and hence care. In becoming more literate, we cultivate our sensibilities around data politics and as well engage a wider public with digital data infrastructures. <ref> https://journals.sagepub.com/doi/10.1177/2053951718786316</ref>
It is interesting to consider a VPN as a means of rendering our data unreadable to non-consensual monitoring. In the case of the ServPub ambulant server – as a resistance to rigid university network configurations, and beyond its wider accessibility and mobility – the content traveling through private networks is encrypted and authenticated by design within the VPN software. This makes it unreadable, untraceable, and resistant to censorship. What also becomes untraceable is the geolocation of servers within the private network.  


For this reason we need to make servers visible and physical as a crucial/critical space, we need a room of our own and we need a ''‘connected room’ of our own''.*  or ''a network of one's own''
During the translation of the ''Tunnel Up/Tunnel Down Zine'' into Chinese,<ref>Tunnel Up/Tunnel Down (2019), Mara Karagianni's self-published zine about what is a VPN and its various uses and technologies. Accessed 8 March 2026. https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf.</ref> the artist and translator Biyi Wen, referenced the art research project "A Tour of Suspended Handshakes." In this project, artist Cheng Guo physically visited nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of critical gateways that filter data from outside China,<ref>A gateway is a network device that acts as an entry and exit point between two different networks, translating and routing traffic so they can communicate. While a home or office router mainly forwards packets between networks that typically use IP, a gateway connects different kinds of networks and can translate between differnet protocols or data formats, and often operates across multiple OSI layers.</ref> drawing on data published by other researchers. These gateways' filtering function is what constitutes them as firewalls. At times, the locations visited by the artist corresponded to scientific and academic centres that could plausibly house gateway infrastructure. At other times, they led to desolate sites with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised – for example, antennas camouflaged as lamp posts – the primary reason for these discrepancies lies in the redistribution and resale of IP addresses. These factors make it difficult to pinpoint exact geographical locations. Moreover, mapping activities have been illegal in mainland China since 2002, and precise coordinates remain hidden from the public.<ref>See, https://en.wikipedia.org/wiki/Restrictions_on_geographic_data_in_China.</ref>
<ref>(Spideralex) [https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.]</ref>
<ref>referring to the paranodal periodic publication and series of events and worksessions in rotterdam revisting of Virgina Woolf's classic essay.</ref>


By making infrastructures visible with the aid of drawings, diagrams, manuals, metaphors, performances, gatherings, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) our data, and redistribute our networks of machines and humans/species.
In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true geolocations of its gateways, rendering the firewall a nebulous and elusive system. For the ambulant servers, their exact geolocation remains similarly obscure because they are concealed within the virtual private network – beyond the main public-facing nodes such as Jean. However, unlike the Great Firewall, the concealment of the ambulant servers is not enforced through top-down governmental control. The desire to make home-based infrastructures addressable through a trusted network-sharing of tunnels and reverse proxies on community-run servers<ref>Dynamic DNS (DDNS) is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed address for your home network. You can often set up DDNS on your router. Self-hosted websites or online resources will be redirected over commercial nodes maintained by companies – companies which are often known for data-exploitation, acts of censorship, and compliance with states agencies in cases of political prosecution.</ref> creates the potential to circumvent censorship, surveillance, and content centralisation by CDNs, states or other institutional and commercial firewalls. In this way the imposed scarcity of IPv4 becomes a solidarity action.  


A connected room, network of one's own, with allies as co-dependencies, attributes collectivities interacting as radical references which evades hierarchies of cognitive capital based on individuals and underlines the collective efforts to resist within the hegemonic technological paradigm. <ref> https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/ </ref>
It is worth mentioning here, Alison Macrina's work on the Library Freedom Project and Tor Browser as a concrete, real‑world activist case that reinforces the "messy, grinding labor of doing feminism." Alison's Library Freedom Project exemplifies this by turning libraries into practical privacy infrastructure sites: teaching surveillance resistance through Tor relays, anonymising traffic, and reclaiming data sovereignty – much like Systerserver and other community-run servers' VPNs, resist centralised control.


--
== Digital literacies ==
[[File:Port443-ssl.jpg|thumb]]
Being part of the internet, or the internets,<ref>Networks with an Attitude was a work session exploring the future of Internet, organised by Constant from 7 to 13 April 2019 at various locations in Antwerp. The internet is dead, long live the internets! Accessed on 8 March 2026. https://constantvzw.org/sponge/s/?u=https://www.constantvzw.org/site/-Networks-with-an-Attitude-.html.</ref> creating and maintaining our own networked infrastructures involves an understanding of the technicalities and politics of IP addresses, routers and gateways, and the economy of IP scarcity and institutional and corporate control. One way of addressing the politics and economies of network infrastructures – and how we relate to technology – is by "following the data." Data is not just an informational unit or a technicality – it is how we as trans*feminists relate to computers, both on a supra- or infra-individual level and as something that can be incredibly personal and intimate. We need to keep asking: "Where is the data?" We need to develop technical awareness and accountability in how we participate in – and how we are complicit with – the infrastructures in which our data is created, stored, sold, and analysed. In "following the data," we become more engaged and cultivate our sensibilities around data and networked infrastructure politics.<ref>Gray Jonathan, Gerlitz Carolin, Bounegru Liliana, “Data Infrastructure Literacy.” Big Data & Society 5, no. 2 (1 July 2018). https://doi.org/10.1177/2053951718786316</ref>
Public interface anarchaserver in calafou: https://zoiahorn.anarchaserver.org/physical-process/ [[File:Server-wiki-act5.png|thumb]]


By making digital infrastructures and technicalities visible through drawings, diagrams, manuals, metaphors, performances, and gatherings, Systerserver traverses technical knowledge with the aim of de-clouding data,<ref>Hilfling Ritasdatter Linda, Gansing Kristoffer, "A Video Store After the End of the World". Accessed 8 March 2026. https://vhs.data.coop/.</ref> and redistributing networks of machines and humans/species. Systerserver therefore becomes a space to exchange knowledge, whose sysadmins maintain and care together in non-hierarchical and non-meritocratic ways – what the sysadmins refer to as "feminist pedagogies." These pedagogies cultivate socio-technical learning by accepting diverse life experiences, recognising that knowledge is socially constructed, questioning digital hegemonies, and welcoming situated experiences from the places where people physically meet for the trans-feminist gatherings such as Eclectic Tech Carnival (/ETC), the TransHackFeminist Convergence (THF), and others. These meetings – or rather offline and online entanglements – encourage Do-It-Together practices, give time and space to study and write documentation, and collectivise moments of choosing our dependencies while feeling trusted in a safe(r) space to learn about technologies. They challenge our bodies-machines relations. 


Are you being served ? s performative event developed by ooooo which took place during The Feminist Server Summit, organized by constantvzw in brussels  https://areyoubeingserved.constantvzw.org/Home_server.xhtml Home is a Server is about mimicking computer functioning through human energy and towards a human goal (eating the pancake instead of just publishing its recipe online), transforming ourselves into CPU, data, kernel, hard drive, booting, rebooting, getting into Kernel Panick and finally managing to get through the difficulties of sending data out, making a wiki that eventually achieves the very physical process of making pancakes for the group during the afternoon, 12–15 December 2013
===== politics of networks =====
Being part of the Internet, or internets, is a combination of vast, complex and opaque technologies we have to understand the technicalities of the Internet, such as IP address, Local, private and virtual networks, routing and subnetting and the politics of scarcity, economy and institutional control.


Systerserver has two physical machines in a data room in Graz @ mur.at, an association which enables the networking of a wide variety of art and cultural initiatives in a (shared) virtual space. Donna from the https://www.genderchangers.org<nowiki/>went to install the most recent hardware in 20?? . The server is called Adele. The older machine we have since 20?? and is called Jean. Both are running a recent stable debian image with diverse services. Let's focus on Jean who hosts a mastodon and tinc<ref>Genealogy - Mansoux developed the idea of the hub in the context of XPUB in 2019, enabling networked experiments and server related work to be done within the institution. The free software was used in the Traversal network of Feminist Server's project to make rosa, a mobile server accessible to the public internet</ref>. Mastodon is a free and open-source software platform for microblogging and social networking. It operates within a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse. Tinc is a VPN tunneling software. It creates virtual private network(s), in which as as many servers can be added as preferred. The network is hidden, it only exists between the servers that are added to it, but it works with public entry points. So if a request is made to a server, it first connects to Jean server, which forwards the request internally, meaning inside the hidden network to the specific machine .<ref>https://atnofs.constantvzw.org/ATNOFS-screen.pdf<nowiki/>p9</ref>
<div id="trans">
[[File:Root-prepare.jpg|300px|sudo apt upgrade]]
[[File:root-1.jpg|300px|root in public interface anarchaserver]]
[[File:Port443-ssl.jpg|300px|port 443]]


In Jean, we configured three of these private networks, named "internes" and "alliances" and "systerserver". While the first is for our internal Systerserver network name to communicate with our backup server, the latter is for local servers from our community e.g  the etherpad servers of leverburns which we use for documentation, ..... There is also the network named systerserver which was our first attempt to install and configure Tinc and makes the servers for this publication accessible. The servers that are connected to these networks are mostly home based with dynamic IPs that change. A home router switches the public IP regularly, they use what are called dynamic IP addresses, this means your public IP address change over time. This is because your internet service provider (ISP) temporarily assigns you an IP address from a pool. They do this to manage their available addresses more efficiently and for minor security benefits. So an ISP's lease time can expire which triggers an IP address change. 


Hence for these servers to be accessible in the Internet they need a fixed (or static) IP. With the creation of the Tinc networks, servers can be accessed via the IP of jean which is a fixed IP. . Tinc (and other VPN) tunnels operate within private networks (10.0.0.0), and the machines 'invited' inside these tunnels can connect to each other. With reverse proxy, a configuration of your webserver (nginx, apache, ...), jean reroutes all the incoming and outgoing traffic to the servers that are part of the specific network(s).  
''How can we imagine a virtual private server, in a material world?'' An intervention by ooooo and others during the rehabilitation of an eco-industrial colony in the mountains near Barcelona, Calafou, where a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org.<ref>The documentation of this process https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the AnarchaServer: an allied feminist server – set up in Calafou, Spain – that contributes to the maintenance of autonomous infrastructure on the internet for feminists projects.</ref> Open for visitors, it was used during sysadmin work sessions, gatherings, sonic improvisations, and radio broadcasts. The door, windows, ceilings, and multi-levels served as analogies for the functionalities of a server’s hardware-software counterparts (ports, encryption, repositories, and even a firewall). It also included a bed, where someone could sleep, rest, and reside – in analogy with the Living Data container, which hosts [https://alexandria.anarchaserver.org/index.php/Main_Page ALEXANDRIA] for wiki documentation and [https://zoiahorn.anarchaserver.org/ ZOIA HORN] for multi-site blogging. The space was also activated during the THF Convergence, an event for intersectional feminists, queer, and trans people of all genders to better understand, use, and ultimately develop free and liberating technologies for social dissent.
</div>


The vpn-software + reverse proxy is a valuable strategy to avoid high costs for a static IP of your Internet Service Provider and to over come theshortage of IPv4. We have to keep in mind that adding new servers to our tinc network(s), creates more traffic and hence bandwidth use of the dataroom in [mur.at]
<div id="trans">
[[File:Server-wiki-act5.png|600px|Sever - wiki - act5]]


===== choose your dependencies =====
With the question "How to collectively embody a server?" ooooo staged another performative event during The Feminist Server Summit (12–15 December 2013),<ref>The 14th edition of the Verbindingen/Jonctions gathering organised by constant vzw in December 2013 was dedicated to a feminist review of mesh, cloud, autonomous, and DIY servers. Accessed 8 March 2026. https://areyoubeingserved.constantvzw.org/Summit.xhtml.</ref> organised by Constant association of media arts in Brussels. In ''Home is a Server,'' fourteen people were invited to choose a prop representing the different hardware parts of a computer (CPU, RAM, watchdogs, ports, kernels, hard drives). By reading a script together, they followed the data flow while installing a server, setting up a wiki, and publishing a recipe for pancakes – which they then made and ate together.
An alternative for when your ISP changes your home network's IP address, would be Dynamic DNS, which is a useful service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. You can also run a DDNS client on one of your servers.


/// needs more... / generalisation + references


THIS SEEMS MORE INFORMATIVE /MAYBE IN SEORATE DESIGN STYLE [[File:Protocol stack hourglass.jpeg|thumb|Protocol stack]]
</div>


====== lan/wan/van ======
<div id="trans">
To understand somehow more the private and public IP’s and networks, we can look at them from their naming conventions. LAN is an abbreviation for LOCAL AREA NETWORK, and the reserved addresses for these networks are either 192.x.x.x, 169.x.x.x (DHCP) and 172.x.x.x. These addresses are distributed within one room, building that has a router. The router that broadcasts the WiFi or provides ethernet cable connections is the interface between the local network inside the room, and the WAN (WIDER ARE NETWORK), basically the Internet.  
[[File:Cryptodance.png|600px|Cryptodance]]


The addresses 10.x.x.x are reserved for the private networks, that are also called virtual. Since Virtual Private Networks are more complex to comprehend. Let's  introduce a little bit of  their history, hoping that it will illustrate their purposes and functions more.


====== regulatory bodies ICAN-RFC's develop/discuss standards (missing) ======


====== routing / subnetting (missing) ======
''Are we vulnerable, safe, and do we need to encrypt?'' In different exercises combining dance notations, crypto techniques and careful somatic tactics, participants embody issues of security, privacy, safety and surveillance. ''Cryptodance'' was a performative event developed in August 2016 during the preparations for [https://femhack.noblogs.org/post/2016/05/31/thf2016-en/ THF 2016!], by a small international constellation of choreographers, hackers, and dancers. <ref>Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint (ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder. Cryptodance was also shown in THF 2016 (Montréal) and Panke Gallery (Berlin).</ref>


====== history and topology of VPN ======
After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider.
AT&T Bell Laboratories developed an IP Encryption Protocol (SwIPe), implementing encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.


"IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic.
</div>
Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies."
<ref> https://www.paloaltonetworks.com/cyberpedia/history-of-vpn </ref>


By end of 90s Microsoft worked towards implementing a secure tunnel protocol, creating a virtual data tunnel to ensure more secure data transmission over the web. The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats. Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.
<div id="trans">
[[File:File-silkscreen-final.jpg|alt=Diffie-Hellman|center|thumb|Diffie-Hellman drawing by Mara Karagianni (Systerserver)]]


"L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel."
''Crypto Keys'' is a drawing about the mathematical formulas used in the Diffie–Hellman algorithm for encrypting data over the internet without the need to exchange a password or secret key.  
<ref> https://www.paloaltonetworks.com/cyberpedia/what-is-l2tp</ref>
</div>


A later tunneling protocol is the openVPN, which has been designed as a more flexible protocol allowing port configuration, and more security.
<div id="trans">
[[File:Bundle-vpn-zines.jpg|alt=VPN zines|center|thumb|VPN zines by Mara Karagianni (Systerserver)]]


Tinc protocol follows here...
''VPN introduction zines'' is a series of manuals about private virtual networks describing technical concepts of firewalls, authentication and encryption over the Internet, how we can install a VPN with a single board computer, on mobile phones, and when to chose for a VPN over a proxy.


the drawing of encapsulation from tunnel up/down


While https is another way to secure traffic over the internet, it is distingue from IPSec in that IPsec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS, the secure version of HTTP, using SSL, and its successor TLS secures individual web sessions, typically used for secure remote access to specific applications via the internet. 


====== geolocation and network infrastructures ======
</div>
Now that hopefully we have a clearer idea of the local/private networks vs the public networks aka Internet, it’s important to dive into the distribution of addresses and the politics that stem from this.
According an online article about the state of the Internet as of 2023, several factors have contributed to the decline in IPv4:
    • Market Saturation: The Internet may have reached a point where there is no additional demand to drive further growth, leading to a natural plateau in IPv4 usage.
     
    • Shift to Content Distribution Networks (CDNs): The transition to CDNs for digital services has reduced the demand for traditional content distribution methods, impacting IPv4 growth.
     
    • IPv4 Address Exhaustion: The depletion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline.
     
Despite these trends, the article notes that the majority of the Internet user base (slightly under two-thirds as of the end of 2022) still relies exclusively on IPv4. The future trajectory of IPv4 and IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and communications technology in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the market saturation and the smaller pace of network growth (double check) in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs.
This means that ISP can charge higher prices for a declined number of IPv4 and the need for self or community based hosting that relies on static and fixed IPv4s can be obtained through VPN tunnels and reverse proxies, or Tor onions. <ref> https://blog.apnic.net/2024/01/09/measuring-bgp-in-2023-have-we-reached-peak-ipv4/ </ref>


During the translation of the manuals Tunnel Up/ Tunnel Down, the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, he identifies the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers.
<div id="trans">
At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations.
[[File:hummingbird.png|600px|Humming Birds]]
Additionally, online IP location tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002.
In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. Similarly, for mobile (ambulant) servers, geolocating individual servers—beyond the main public-facing ones—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through top-down government control. This decentralization has the potential to counteract centralized policies and provide a means of circumvention. <ref> https://en.wikipedia.org/wiki/Restrictions_on_geographic_data_in_China</ref>


===== resources matter =====
''What is feminist federation?'' Another example of making analogies and tangible translations, it the performative event ''Humming Birds''. Through choreographies, sociometric exercises, and voicing techniques, participants explore the social network Fediverse and get introduced in a technical understanding of its protocol ActivityPub – a standard for publishing content in decentralised social networking.<ref>Nate Wessalowski and xm developed it during 360 degrees of proximities for the cyborg collective of Caladona, a women center in Barcelona, together with whom they installed peertube on a self-hosted server. ActivityPub provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.</ref>
</div>


====== traffic costs and electricity (missing) ======
== A feminist networking ==
<noinclude>
<blockquote>
  [[index.php?title=Category:ServPub]]
"Technologies are about relations with things we would like to relate to, but also things we don't want to be related to." – Femke Snelting in Forms of Ongoingness (2018).<ref>Sollfrank, Cornelia, "Forms of Ongoingness". Interview with Femke Snelting and spideralex. House for Electronic Arts (HeK). (18 September 2018). Accessed on 8 March 2026. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.</ref></blockquote>
</noinclude>
A feminist server goes beyond a technically facilitated node in the network – it becomes an (online) space for understanding digital infrastructures and resisting hegemonies. It can be entered &#x22;as an inhabitant, to which we make contributions, nurture a safe space and a place for expression and experimentation, a place for taking a role in hacking heteronormativity and patriarchy.&#x22;<ref>Spideralex in Sollfrank, Cornelia, "Forms of Ongoingness".  House for Electronic Arts (HeK) (18 September 2018). Accessed on 8 March 2026. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.</ref> A feminist server is a place where we as trans*feminists can share with intersectional, queer, and feminist communities – a place where our data and the contents of our websites are hosted, where we chat, store stories and imaginaries, and access the tools we need to get organised (mailing lists, calendars, Etherpads).
 
Serving, and becoming a server is not just a neutral relation between two or more computers.<ref>Gargaglione, Erika, “Hacking Maintenance With Care Reflections on the Self-administered Survival of Digital Solidarity Networks", Roots§Routes (14 May 2023). Accessed 8 March 2026. <nowiki>https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/</nowiki>. [client/server not user/developer].</ref> It is tied to the politics of protocols, infrastructure capacity and power, responsibilities, dependencies, invisible labour, knowledge, and control. A feminist server is a space where we learn how a collective emancipation is possible from techno-fascist platforms and content service providers. As feminist servers, we refuse to be served in networks that increase our dependencies on cis male-dominated and extractivist technologies of big tech. Having a place – or "a room of one's own" – on the internet is therefore important, referencing historic feminist struggles for agency, and safe/r off- and online spaces for uninterrupted time together to imagine technological praxis in new ways.
 
Furthermore, the metaphor of one's own room<ref>"Networks of One’s Own" is a periodic para-nodal publication by varia (September 2019). Accessed 8 March 2026. https://networksofonesown.varia.zone/.</ref> highlights the ways in which bodies need to be accommodated in the practices of feminist servers and social networking. These bodies incorporate our data bodies<ref>Association for Progressive Communications, Paz Peña and Joana Varon, “Consent to Our Data Bodies: Lessons From Feminist Theories to Enforce Data Protection”, ''Coding Rights'' (25 March 2019), https://www.apc.org/en/pubs/consent-our-data-bodies-lessons-feminist-theories-enforce-data-protection.</ref> but also the ways in which we show up in gatherings and places outside digital networks. Self-organised gatherings such as the [https://eclectictechcarnival.org Eclectic Tech Carnival] (/ETC)<ref>The Eclectic Tech Carnival (/ETC) is a potent gathering of feminists who critically explore and develop everyday skills and information technologies in the context of free software and open hardware. /ETC chews on the roots of control and domination, disrupts patriarchal societies, and imagines better alternatives, https://monoskop.org/Eclectic_Tech_Carnival.</ref> or the TransHackFeminist convergence (THF),<ref>See, https://alexandria.anarchaserver.org/index.php/Main_Page#TransHackFeminist_Convergence.</ref> and feminist hacklabs such as [https://www.marialab.org/ marialab], [https://www.fluidspace.org fluid.space], [https://www.mzbaltazarslaboratory.org/ mz balathazar’s laboratory], [https://wiki.digitalcare.noho.st/ t_cyberhol], as well as (art) residencies or other larger gatherings ([https://wiki.digitalrights.community/Main_Page Global Gathering], [https://privacycamp.eu/ Privacycamp], [https://offdem.net/ OFFDEM], [https://events.ccc.de/ Chaos Communication Congress]) have been crucial in nurturing and fueling the desires for our own servers. These gatherings address the need to share ways of doing, tools and strategies to overcome and overthrow the monocultural, centralised, oligopolistic technologies of surveillance and control, and to resist the matrix of domination. These are moments where social networking can materialise into feminist servers and affective infrastructures.<ref>Nate Wessalowski & Mara Karagianni, “From Feminist Servers to Feminist Federation.” ''A Peer-Reviewed Journal About'' 12, no. 1 (7 September 2023), 192–208, https://doi.org/10.7146/aprja.v12i1.140450.</ref>
 
Social networking – which shapes affective infrastructures – can in this sense be laborious: an act of care, of wielding solidarities, of sharing and growing alliances, recognising our precarities, identities and collective oppressions. It is a community practice, a way of staying connected and connecting anew, of seeking and cherishing those critical connections that are always already more than technical.<ref>Following a quote from Grace Lee Hoggs on connectedness and activism which puts "critical connections" over "critical mass" after an idea by Margaret Wheatly, Boggs, G., Kurashige, S. ''The Next American Revolution: Sustainable Activism for the Twenty-First Century''. (University of California Press, 2012), 50.</ref> Those critical connections can become feminist networking – a situated techno-political practice that engages us in more-than-human relations with hardware, wetware and software.
 
In terms of feminist servers, the server thus becomes a "connected room" or even '"infrastructures of one's own", characterised by the tension between the need for self-determination and the promiscuous, contagious practices of networking and making contact with others. These practices inherently surpass strong notions of the individual "self," facilitating instead a collective and heterogeneous search for empowerment, and contributing to improving conditions for networked subjectivities and solidarities. They transform into a connected room,<ref>See also spideralex, referencing Remedios Zafra's book, ''A Connected Room of One’s Own'', https://www.remedioszafra.net/aconnectedroom.html in Cornelia Sollfrank, "Forms of Ongoingness. Interview with Femke Snelting and spideralex." House for Electronic Arts (HeK), Basel. (18 September, 2018) https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf</ref> a network of one's own, with allies as co-dependencies – attributing value to each other(s), interacting as radical references<ref>A term introduced in this book by ooooo, which then got picked up an led to an in depth article on the subject in [https://wiki4print.servpub.net/index.php?title=Chapter_5b:_Distribution Chapter_5b:_Distribution].</ref> to evade hierarchies of cultural capital, and instead sustaining collective efforts of resistance against capitalistic logics of knowledge production.
 
When talking about the internet and its potential for feminist networking, one needs to move away from thinking of it as something "given" that we might "use". One must shift away from the cloudy image of cyberspace as an extension and intensification of capital, governance, and data power.<ref>Metahaven, Daniel van der Velden, Vinca Kruk, "Captives of the Cloud: Part I,", e-flux 37 (2012). https://www.e-flux.com/journal/37/61232/captives-of-the-cloud-part-i.</ref>
 
ServPub, as a publishing platform for collaboration, learning digital infrastructuring while doing it, and being part of Systerserver's internet and networking, is moving toward feminist forms of affective infrastructures.
 
 
 
----<references />

Latest revision as of 17:24, 6 March 2026

"Activist infrastructures are where the messy, grinding, generally invisible ­labor of 'doing feminism' takes place." – Cait McKinney, Information Activism: A Queer History of Lesbian Media (2020).[1]

Being part of internets

Systerserver, a feminist server project of almost two decades,[2] has supported the ServPub project with their network infrastructure. The feminists involved in this project have configured their own infrastructure of two physical servers in the data room of [mur.at], an art association in Graz, Austria, which hosts a wide variety of art and cultural initiatives. The physical servers found this shelter through the networking of activists and artists during the Eclectic Tech Carnival (/ETC), a self-organised skill-sharing gathering. Donna Meltzer and Gaba from Systerserver went to Graz to upgrade the servers' hardware in 2019. The first machine, installed and configured in 2005, is called Jean and was refurbished by ooooo in 2023 during their stay in Graz for the Traversal Network of Feminist Servers (ATNOFS), which took place in different countries.[3] The ATNOFS event in Austria was hosted by ESC, a local media art gallery in Graz, which is affiliated with [mur.at].

Both servers are running on Debian, a Linux-based operating system, and host several tools for community communications and organising,[4] among which is Tinc – a virtual private network (VPN) software. The VPN is the most recent addition, facilitating the desire for servers hosted by our peers from their homes, studios, and spaces that cannot afford a stable digital address.[5] Those server projects interweave into a feminist networking – an affective, socio-technical infrastructure – enabling more trans-feminist groups and collectives – such as actinomy (Bremen), leverburns (Amsterdam), caladona (Barcelona), or brknhs (Berlin) – to host their own servers in their own spaces rather than in data centres, and be reachable through the public internet.

Tinc was chosen as VPN software, mimicking what Systerserver learnt during their participation in ATNOFS, encountering the mobile server Rosa.[6] Rosa is a server connected to the internet via a VPN, hosted by the Rotterdam-based space Varia, which was inspired by another relevant network infrastructure setup – that of the Rotterdam-based institute XPUB.[7] Constant association in Brussels and Hackers and Designers collective in Amsterdam have also experimented with similar VPN-based servers.[8] The people, groups, and spaces involved in these server experiments often overlap, which is also due to the physical proximity of the projects (Rotterdam, Brussels, Amsterdam).

Being a server

A VPN software creates virtual private networks, connecting computers and devices that are not in the same physical location. In contrast to the public internet, the network between these devices is concealed – hence the term "private" – as it exists only between the trusted devices that have been added to it. A VPN can also provide a public entry point to these privately networked devices, making them reachable over the public internet and thus allowing them to function as servers. When devices connect to the internet, they are assigned a numeric identifier known as an Internet Protocol (IP) address. A home or office router is assigned a public IP address by its Internet Service Provider (ISP) – this address changes periodically, thus is referred to as dynamic. The ISP allocates these public IP address from a limited pool; each has an expiration period knowns as lease time. Once the lease expires, the address may change, allowing the ISP to provide internet connection to far more locations than the size of its IP pool. ISPs do this to manage available addresses more efficiently and for minor security benefits.[9]

All devices within a home or office are assigned a local IP address by the router. By default, the router permits one-way internet traffic – such as websites' content (response) – while blocking unsolicited traffic from the outside world. However, within a VPN network, the devices are assigned a private IP by the VPN software itself, and they become able to both send and receive traffic from outside their physical location.

What is a VPN
Drawing from Tunnel Up/ Tunnel Down zine by Mara Karagianni, introduction about virtual private networks [1]

Visiting a device over the internet by remembering its IP address would be challenging, if not impossible. This is why domain names – such as www.servpub.net– are needed. They are mapped to an IP address so that when the domain name is visited, the browser can retrieve and present the content (for example, a website) hosted on that device. Maintaining the same IP address over time is crucial for reliably mapping it to a domain name. Such an address is therefore known as a fixed or static IP. The translation between IP addresses and domain names (and vice versa) is handled by Domain Name Servers, or DNS.[10]

Network! Ack!
Network! Ack! zine by Julia Evans, introduction about computer networking and how DNS works [2]

So if a request is made to wiki4print.servpub.net, the request first reaches Jean, whose IP is mapped to that domain, because Jean is the only computer with a public and static IP address within this private network. On Jean, web engine configuration software forwards the request to the private IP of the device that actually hosts ServPub project's wiki. The request is thus rerouted internally – inside the concealed virtual private network – to the specific device hosting the wiki4print website. This forwarding of requests from the public IP to the private one is called a proxy request, and the device's ability to send data back through the public node – thus functioning as a server – is enabled via a reverse proxy.

Systerserver has configured three such private networks using Tinc to reach home-based servers that lack public and static IP address: internes, alliances and systerserver.[11] The network named systerserver was the first Tinc installation and configuration in Systerserver's infrastructure. It was initiated specifically for the publishing infrastructure of the ServPub project. The systerserver network allows the Raspberry Pis – which host wiki4print and the ServPub website – to be accessible over the internet via Systerserver's public node and machine, Jean.

Arriving at this first technical attempt to configure the systerserver network required building trust between Systerserver peers and the other groups participating in the ServPub project. This began with Winnie Soon's participation in one of Systerserver's week-long event and workshops in Barcelona in 2023, during which Systerserver installed PeerTube for and with the caladona women's space. Such collective, grassroots organising-based events – messy and campy – form the basis for bonding and solidarity, built on the invisible labour of doing feminism (McKinney 2020). By understanding computing together, configuring machines, and conversing about big tech and its sexism, racism, classism, and gender discrimination, the people gathered at these events nourish a resistance rooted in body and identity politics – one that transgress labour exchanges based on economic value alone.

Ip protocol stack
Ip protocol stack

Navigating network politics

Looking at the initial architecture of the internet as a communication medium where any node could reach any other node – and where a node was authenticated by its address as a unique identifier – the current landscape has transformed into something quite different. Since the late 1990s, the IPv6 protocol was conceived to mitigate the depletion of IPv4 addresses[12] by providing a much larger address space, thereby restoring the original numeric uniqueness. IPv6 was also designed with embedded security within the IP packet itself. By contrast, IPv4 required external encryption configurations which led to the development of the IPSec encryption protocol in the mid-1990s. IPSec provided end-to-end security wrapped around the IP layer, authenticating and encrypting each IP packet. While IPSec ensured encryption for IPv4, it required additional software installation and configuration, but encryption was incorporated as a core component of IPv6.[13] For the vast majority of IPv4 based Internet communications that happen over the web, the solution to security was the implementation of HTTPS certificates,[14]. However, other internet connections – such as files syncing between two devices – require extra encryption configurations or tunnels, such ssh or VPN, or the IPSec mentioned above.

How IPSec encryption works with IPv4 data packet
How IPSec works: An IPv4 data packet without encryption and with encryption provided by IPSec. Drawing by Mara Karagianni, part of the Tunnel Up/ Tunnel Down zine https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf

Secure certificates encrypt traffic over cables and wireless signals, but once data reach the destination server, they are no longer encrypted. Unencrypted data can therefore be cached and served by intermediaries located closer to users' internet access points. For example, when the same website is requested again, the content may be served by a Content Distribution Network (CDN) rather than the origin server. CDN providers deliver much of internet content by caching it on servers distributed around the world. By serving data from servers that are geographically close to users, they greatly reduce the impact of physical distance between the user’s internet access point and the origin server, thereby speeding up load times. However, this centralisation of content – which has been made possible by the sharp decline in digital storage costs since the 2010s – raises certain user‑rights concerns despite its performance benefits. Because CDNs terminate secure certificates and gain access to unencrypted data, they introduce an additional point where user data can be inspected, monitored or breached. Their central position also enables large‑scale blocking, filtering, and surveillance capitalism, which can affect, for example, the right to erasure – especially when data crosses borders.[15]

Technologies such as dynamic IP addresses, mentioned above – and other address-sharing technics[16] and CDNs that multiplex many sites onto fewer IPv4s working around the scarcity of IP addresses[17] – has slowed the IPv6 rollout across devices. Given IPv6 potential for true end-to-end encryption for each device on the internet, one might ask whether embedded per-packet encryption constitutes a civil right to security and privacy that industry and state surveillance actors would prefer to avoid. At the same time, ISPs can charge higher prices for scarce IPv4 addresses, and in some cases legacy IP blocks of addresses are traded on the grey market, because they were allocated before regional internet registries existed and therefore remain unregulated.[18]

It is interesting to consider a VPN as a means of rendering our data unreadable to non-consensual monitoring. In the case of the ServPub ambulant server – as a resistance to rigid university network configurations, and beyond its wider accessibility and mobility – the content traveling through private networks is encrypted and authenticated by design within the VPN software. This makes it unreadable, untraceable, and resistant to censorship. What also becomes untraceable is the geolocation of servers within the private network.

During the translation of the Tunnel Up/Tunnel Down Zine into Chinese,[19] the artist and translator Biyi Wen, referenced the art research project "A Tour of Suspended Handshakes." In this project, artist Cheng Guo physically visited nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of critical gateways that filter data from outside China,[20] drawing on data published by other researchers. These gateways' filtering function is what constitutes them as firewalls. At times, the locations visited by the artist corresponded to scientific and academic centres that could plausibly house gateway infrastructure. At other times, they led to desolate sites with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised – for example, antennas camouflaged as lamp posts – the primary reason for these discrepancies lies in the redistribution and resale of IP addresses. These factors make it difficult to pinpoint exact geographical locations. Moreover, mapping activities have been illegal in mainland China since 2002, and precise coordinates remain hidden from the public.[21]

In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true geolocations of its gateways, rendering the firewall a nebulous and elusive system. For the ambulant servers, their exact geolocation remains similarly obscure because they are concealed within the virtual private network – beyond the main public-facing nodes such as Jean. However, unlike the Great Firewall, the concealment of the ambulant servers is not enforced through top-down governmental control. The desire to make home-based infrastructures addressable through a trusted network-sharing of tunnels and reverse proxies on community-run servers[22] creates the potential to circumvent censorship, surveillance, and content centralisation by CDNs, states or other institutional and commercial firewalls. In this way the imposed scarcity of IPv4 becomes a solidarity action.

It is worth mentioning here, Alison Macrina's work on the Library Freedom Project and Tor Browser as a concrete, real‑world activist case that reinforces the "messy, grinding labor of doing feminism." Alison's Library Freedom Project exemplifies this by turning libraries into practical privacy infrastructure sites: teaching surveillance resistance through Tor relays, anonymising traffic, and reclaiming data sovereignty – much like Systerserver and other community-run servers' VPNs, resist centralised control.

Digital literacies

Being part of the internet, or the internets,[23] creating and maintaining our own networked infrastructures involves an understanding of the technicalities and politics of IP addresses, routers and gateways, and the economy of IP scarcity and institutional and corporate control. One way of addressing the politics and economies of network infrastructures – and how we relate to technology – is by "following the data." Data is not just an informational unit or a technicality – it is how we as trans*feminists relate to computers, both on a supra- or infra-individual level and as something that can be incredibly personal and intimate. We need to keep asking: "Where is the data?" We need to develop technical awareness and accountability in how we participate in – and how we are complicit with – the infrastructures in which our data is created, stored, sold, and analysed. In "following the data," we become more engaged and cultivate our sensibilities around data and networked infrastructure politics.[24]

By making digital infrastructures and technicalities visible through drawings, diagrams, manuals, metaphors, performances, and gatherings, Systerserver traverses technical knowledge with the aim of de-clouding data,[25] and redistributing networks of machines and humans/species. Systerserver therefore becomes a space to exchange knowledge, whose sysadmins maintain and care together in non-hierarchical and non-meritocratic ways – what the sysadmins refer to as "feminist pedagogies." These pedagogies cultivate socio-technical learning by accepting diverse life experiences, recognising that knowledge is socially constructed, questioning digital hegemonies, and welcoming situated experiences from the places where people physically meet for the trans-feminist gatherings such as Eclectic Tech Carnival (/ETC), the TransHackFeminist Convergence (THF), and others. These meetings – or rather offline and online entanglements – encourage Do-It-Together practices, give time and space to study and write documentation, and collectivise moments of choosing our dependencies while feeling trusted in a safe(r) space to learn about technologies. They challenge our bodies-machines relations.


sudo apt upgrade root in public interface anarchaserver port 443


How can we imagine a virtual private server, in a material world? An intervention by ooooo and others during the rehabilitation of an eco-industrial colony in the mountains near Barcelona, Calafou, where a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org.[26] Open for visitors, it was used during sysadmin work sessions, gatherings, sonic improvisations, and radio broadcasts. The door, windows, ceilings, and multi-levels served as analogies for the functionalities of a server’s hardware-software counterparts (ports, encryption, repositories, and even a firewall). It also included a bed, where someone could sleep, rest, and reside – in analogy with the Living Data container, which hosts ALEXANDRIA for wiki documentation and ZOIA HORN for multi-site blogging. The space was also activated during the THF Convergence, an event for intersectional feminists, queer, and trans people of all genders to better understand, use, and ultimately develop free and liberating technologies for social dissent.

Sever - wiki - act5

With the question "How to collectively embody a server?" ooooo staged another performative event during The Feminist Server Summit (12–15 December 2013),[27] organised by Constant association of media arts in Brussels. In Home is a Server, fourteen people were invited to choose a prop representing the different hardware parts of a computer (CPU, RAM, watchdogs, ports, kernels, hard drives). By reading a script together, they followed the data flow while installing a server, setting up a wiki, and publishing a recipe for pancakes – which they then made and ate together.


Cryptodance


Are we vulnerable, safe, and do we need to encrypt? In different exercises combining dance notations, crypto techniques and careful somatic tactics, participants embody issues of security, privacy, safety and surveillance. Cryptodance was a performative event developed in August 2016 during the preparations for THF 2016!, by a small international constellation of choreographers, hackers, and dancers. [28]


Diffie-Hellman
Diffie-Hellman drawing by Mara Karagianni (Systerserver)

Crypto Keys is a drawing about the mathematical formulas used in the Diffie–Hellman algorithm for encrypting data over the internet without the need to exchange a password or secret key.

VPN zines
VPN zines by Mara Karagianni (Systerserver)

VPN introduction zines is a series of manuals about private virtual networks describing technical concepts of firewalls, authentication and encryption over the Internet, how we can install a VPN with a single board computer, on mobile phones, and when to chose for a VPN over a proxy.


Humming Birds

What is feminist federation? Another example of making analogies and tangible translations, it the performative event Humming Birds. Through choreographies, sociometric exercises, and voicing techniques, participants explore the social network Fediverse and get introduced in a technical understanding of its protocol ActivityPub – a standard for publishing content in decentralised social networking.[29]

A feminist networking

"Technologies are about relations with things we would like to relate to, but also things we don't want to be related to." – Femke Snelting in Forms of Ongoingness (2018).[30]

A feminist server goes beyond a technically facilitated node in the network – it becomes an (online) space for understanding digital infrastructures and resisting hegemonies. It can be entered "as an inhabitant, to which we make contributions, nurture a safe space and a place for expression and experimentation, a place for taking a role in hacking heteronormativity and patriarchy."[31] A feminist server is a place where we as trans*feminists can share with intersectional, queer, and feminist communities – a place where our data and the contents of our websites are hosted, where we chat, store stories and imaginaries, and access the tools we need to get organised (mailing lists, calendars, Etherpads).

Serving, and becoming a server is not just a neutral relation between two or more computers.[32] It is tied to the politics of protocols, infrastructure capacity and power, responsibilities, dependencies, invisible labour, knowledge, and control. A feminist server is a space where we learn how a collective emancipation is possible from techno-fascist platforms and content service providers. As feminist servers, we refuse to be served in networks that increase our dependencies on cis male-dominated and extractivist technologies of big tech. Having a place – or "a room of one's own" – on the internet is therefore important, referencing historic feminist struggles for agency, and safe/r off- and online spaces for uninterrupted time together to imagine technological praxis in new ways.

Furthermore, the metaphor of one's own room[33] highlights the ways in which bodies need to be accommodated in the practices of feminist servers and social networking. These bodies incorporate our data bodies[34] but also the ways in which we show up in gatherings and places outside digital networks. Self-organised gatherings such as the Eclectic Tech Carnival (/ETC)[35] or the TransHackFeminist convergence (THF),[36] and feminist hacklabs such as marialab, fluid.space, mz balathazar’s laboratory, t_cyberhol, as well as (art) residencies or other larger gatherings (Global Gathering, Privacycamp, OFFDEM, Chaos Communication Congress) have been crucial in nurturing and fueling the desires for our own servers. These gatherings address the need to share ways of doing, tools and strategies to overcome and overthrow the monocultural, centralised, oligopolistic technologies of surveillance and control, and to resist the matrix of domination. These are moments where social networking can materialise into feminist servers and affective infrastructures.[37]

Social networking – which shapes affective infrastructures – can in this sense be laborious: an act of care, of wielding solidarities, of sharing and growing alliances, recognising our precarities, identities and collective oppressions. It is a community practice, a way of staying connected and connecting anew, of seeking and cherishing those critical connections that are always already more than technical.[38] Those critical connections can become feminist networking – a situated techno-political practice that engages us in more-than-human relations with hardware, wetware and software.

In terms of feminist servers, the server thus becomes a "connected room" or even '"infrastructures of one's own", characterised by the tension between the need for self-determination and the promiscuous, contagious practices of networking and making contact with others. These practices inherently surpass strong notions of the individual "self," facilitating instead a collective and heterogeneous search for empowerment, and contributing to improving conditions for networked subjectivities and solidarities. They transform into a connected room,[39] a network of one's own, with allies as co-dependencies – attributing value to each other(s), interacting as radical references[40] to evade hierarchies of cultural capital, and instead sustaining collective efforts of resistance against capitalistic logics of knowledge production.

When talking about the internet and its potential for feminist networking, one needs to move away from thinking of it as something "given" that we might "use". One must shift away from the cloudy image of cyberspace as an extension and intensification of capital, governance, and data power.[41]

ServPub, as a publishing platform for collaboration, learning digital infrastructuring while doing it, and being part of Systerserver's internet and networking, is moving toward feminist forms of affective infrastructures.



  1. Cait McKinney, Information Activism: A Queer History of Lesbian Media Technologies, (Duke University Press, 2020).
  2. For more information on the genealogy of Systerserver see Wessalowski, Nate & Karagianni, Mara. “From Feminist Servers to Feminist Federation.” A Peer-Reviewed Journal About 12, no. 1 (September 7, 2023), 192–208. https://doi.org/10.7146/aprja.v12i1.140450.
  3. Chapter 2: Traveling server space: Why does it matter?, "A Traversal Network of Feminist Servers" (2022). Accessed 8 March 2026. https://systerserver.net/ATNOFS/
  4. Systerserver hosts a GitLab instance as code repository, Peertube for video and streaming, Mailman for mailing lists, Nextcloud for data storage and collective organisation, Mastodon for providing a microblogging social networking platform, Tinc for VPN, and relevant code based projects and websites. For links to each service, visit https://systerserver.net/.
  5. Configuring a server requires what is known as a fixed IP address, which is a numeric notation, signalling the location of the server. This IP address can be mapped to a domain name, which in turn can be traceable on the internet when visiting said domain name in a browser.
  6. Rosa is Raspberry Pi server using varia.hub to be reachable on the internet. Varia hub is what in varia they call a jump hole, a poetic description for the VPN + reverse proxy through their servers. Varia is a space for developing collective approaches to everyday technology, working with free software, organising events, and collaborating in different constellations. See https://varia.zone/en/.
  7. XPUB is the Master of Arts in Fine Art and Design: Experimental Publishing of the Piet Zwart Institute in Rotterdam. XPUB focuses on the acts of making things public and creating publics in the age of post-digital networks. The VPN software Tinc and reverse proxy is inspired by their HUB project, which enabled the Institute to form an experimental server space for their students who could access the server from outside the Institute, passing institutional firewalls securely and let devices roam. See Docs:03_VPN_with_Tinc.
  8. Mara Karagianni, Michael Murtaugh, and Wendy Van Wynsberghe were commissioned by Constant to write a zine manual on Tinc and reverse proxies: "Making A Private server Ambulant", https://psaroskalazines.gr/pdf/rosa_beta_25_jan_23.pdf. The beta version of the zine was revised and updated by vo ezn, who is also part of Systerserver. She deployed it in the digital infrastructure of Hackers and Designers.
  9. IP address lease times provide security benefits such as preventing persistent unauthorised use, reduce risks such as IP spoofing and theft, and allow rapid response to misuse by removing compromised devices from the network.
  10. Networking! Ack! (2017), a zine by Julia Evans, provides a fun guide to DNS and computer networking in general. Accesssed 8 March 2026. https://jvns.ca/networking-zine.pdf.
  11. The internes stands for Systerserver's machines located in [mur.at] to reach a machine in Antwerp, which makes periodic backups of Jean and Adele servers. The network alliances stands for facilitating several home-based server initiatives within Systerserver's extensive community, such as the Etherpad services hosted on the leverburns server which Systerserver uses for technical documentation during server maintenance sessions, or for other allied communities such as caladona and brknhs that want to serve video content without having to commit to the expenses of acquiring a public and static IP address.
  12. The first publication of the IPv6 protocol in a Request for Comments was in December 1998. Accessed 20 September 2025. https://www.rfc-editor.org/rfc/rfc2460.txt.
  13. Besides being a secure protocol with extra authentication and privacy, IPv6 features support for unicast, multicast, and anycast. See, "Internet working with TCP/IP", Vol. 2 by Douglas E. Comer and David L. Stevens, (Prentice Hall, 1998). Accessed 20 September 2025. https://archive.org/details/internetworking000come.
  14. While HTTPS is a way to secure traffic over the internet, it is distinguished from IPSec in that IPSec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS –a secure version of HTTP, using TLS certificates –secures individual web sessions. The authentication with a TLS certificate relies on the organisation or company's name ownership of the certificate, and not on the integrity of the server's IP address. This enables CDNs to cache content and serve in place of the origin server, which contributes to the centralisation of content distribution over the web, https://gcore.com/learning/tls-on-cdn. For more about how TLS works, see https://www.bacloud.com/en/blog/190/ssl-for-ip-lets-encrypt-now-supports-tlsorssl-certificates-for-ip-addresses.html.
  15. For example, data harvesting and extensive users profiling without consent violates the EU law General Data Protection Regulation (GDPR), https://wideangle.co/blog/content-delivery-network-cdn-and-gdpr.
  16. For example, see routing via Network Address Translation (NAT), https://en.wikipedia.org/wiki/Network_address_translation.
  17. Huston Geoff, The IPv6 transition (2024). Accessed 20 September 2025. https://blog.apnic.net/2024/10/22/the-ipv6-transition/.
  18. The African continent registry (AFRINIC) has been under scrutiny due to organisational and legal problems. In 2019, 4.1 million IPv4 addresses (part of unused legacy IP blocks), were sold on the grey market. Accessed 25 July 2025. https://en.wikipedia.org/wiki/AFRINIC.
  19. Tunnel Up/Tunnel Down (2019), Mara Karagianni's self-published zine about what is a VPN and its various uses and technologies. Accessed 8 March 2026. https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf.
  20. A gateway is a network device that acts as an entry and exit point between two different networks, translating and routing traffic so they can communicate. While a home or office router mainly forwards packets between networks that typically use IP, a gateway connects different kinds of networks and can translate between differnet protocols or data formats, and often operates across multiple OSI layers.
  21. See, https://en.wikipedia.org/wiki/Restrictions_on_geographic_data_in_China.
  22. Dynamic DNS (DDNS) is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed address for your home network. You can often set up DDNS on your router. Self-hosted websites or online resources will be redirected over commercial nodes maintained by companies – companies which are often known for data-exploitation, acts of censorship, and compliance with states agencies in cases of political prosecution.
  23. Networks with an Attitude was a work session exploring the future of Internet, organised by Constant from 7 to 13 April 2019 at various locations in Antwerp. The internet is dead, long live the internets! Accessed on 8 March 2026. https://constantvzw.org/sponge/s/?u=https://www.constantvzw.org/site/-Networks-with-an-Attitude-.html.
  24. Gray Jonathan, Gerlitz Carolin, Bounegru Liliana, “Data Infrastructure Literacy.” Big Data & Society 5, no. 2 (1 July 2018). https://doi.org/10.1177/2053951718786316
  25. Hilfling Ritasdatter Linda, Gansing Kristoffer, "A Video Store After the End of the World". Accessed 8 March 2026. https://vhs.data.coop/.
  26. The documentation of this process https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the AnarchaServer: an allied feminist server – set up in Calafou, Spain – that contributes to the maintenance of autonomous infrastructure on the internet for feminists projects.
  27. The 14th edition of the Verbindingen/Jonctions gathering organised by constant vzw in December 2013 was dedicated to a feminist review of mesh, cloud, autonomous, and DIY servers. Accessed 8 March 2026. https://areyoubeingserved.constantvzw.org/Summit.xhtml.
  28. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint (ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder. Cryptodance was also shown in THF 2016 (Montréal) and Panke Gallery (Berlin).
  29. Nate Wessalowski and xm developed it during 360 degrees of proximities for the cyborg collective of Caladona, a women center in Barcelona, together with whom they installed peertube on a self-hosted server. ActivityPub provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.
  30. Sollfrank, Cornelia, "Forms of Ongoingness". Interview with Femke Snelting and spideralex. House for Electronic Arts (HeK). (18 September 2018). Accessed on 8 March 2026. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.
  31. Spideralex in Sollfrank, Cornelia, "Forms of Ongoingness". House for Electronic Arts (HeK) (18 September 2018). Accessed on 8 March 2026. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.
  32. Gargaglione, Erika, “Hacking Maintenance With Care Reflections on the Self-administered Survival of Digital Solidarity Networks", Roots§Routes (14 May 2023). Accessed 8 March 2026. https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/. [client/server not user/developer].
  33. "Networks of One’s Own" is a periodic para-nodal publication by varia (September 2019). Accessed 8 March 2026. https://networksofonesown.varia.zone/.
  34. Association for Progressive Communications, Paz Peña and Joana Varon, “Consent to Our Data Bodies: Lessons From Feminist Theories to Enforce Data Protection”, Coding Rights (25 March 2019), https://www.apc.org/en/pubs/consent-our-data-bodies-lessons-feminist-theories-enforce-data-protection.
  35. The Eclectic Tech Carnival (/ETC) is a potent gathering of feminists who critically explore and develop everyday skills and information technologies in the context of free software and open hardware. /ETC chews on the roots of control and domination, disrupts patriarchal societies, and imagines better alternatives, https://monoskop.org/Eclectic_Tech_Carnival.
  36. See, https://alexandria.anarchaserver.org/index.php/Main_Page#TransHackFeminist_Convergence.
  37. Nate Wessalowski & Mara Karagianni, “From Feminist Servers to Feminist Federation.” A Peer-Reviewed Journal About 12, no. 1 (7 September 2023), 192–208, https://doi.org/10.7146/aprja.v12i1.140450.
  38. Following a quote from Grace Lee Hoggs on connectedness and activism which puts "critical connections" over "critical mass" after an idea by Margaret Wheatly, Boggs, G., Kurashige, S. The Next American Revolution: Sustainable Activism for the Twenty-First Century. (University of California Press, 2012), 50.
  39. See also spideralex, referencing Remedios Zafra's book, A Connected Room of One’s Own, https://www.remedioszafra.net/aconnectedroom.html in Cornelia Sollfrank, "Forms of Ongoingness. Interview with Femke Snelting and spideralex." House for Electronic Arts (HeK), Basel. (18 September, 2018) https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf
  40. A term introduced in this book by ooooo, which then got picked up an led to an in depth article on the subject in Chapter_5b:_Distribution.
  41. Metahaven, Daniel van der Velden, Vinca Kruk, "Captives of the Cloud: Part I,", e-flux 37 (2012). https://www.e-flux.com/journal/37/61232/captives-of-the-cloud-part-i.