Chapter 2b: Server Issues: Networked Infrastructure: Difference between revisions

This page was last edited on 4 August 2025, at 00:20.
(move the section geolocation and network infrastructures after the →‎politics of networks)
No edit summary
Line 1: Line 1:
==== Coordinator: SysterServer  with contributors: xm (ooooo), Mara and nate ====
<blockquote>''&#x22;[T]echnologies are about relations with things we would like to relate to, but also things we don't want to be related to.&#x22; (Femke Snelting in Forms of Ongoingness, 2018)''</blockquote>Feminist networking is a situated, transgressive and technopolitical practice that engages us in more-than-human relations with hardware, wetware and software. Networks are material and need protocols to interface affective relations. Networking can be in that sense laborious, an act of care, of wielding solidarities, of sharing and of growing alliances, recognizing our precarities, identities and collective oppressions. It is a community practice, a way of staying connected and connecting anew, of looking for and cherishing those critical connections<ref>Following a quote from Grace Lee Hoggs on connectedness and activism which puts 'critical connections' over 'critical mass' after an idea by Margaret Wheatly. (Boggs, Kurashige, and Glover. 2012, p. 50)</ref> which are always already more than technical. Feminists have long recognized the power that digital communication technologies hold for forming translocal movements, mobilizing and sharing information without moderators.<ref>See the interview with Donna, Aileen, Anne and Helen from systerserver, 2025. (to be published at https://systerserver.net)</ref> But when it comes to practices of appropriating technology, and coming closer to the machines in ways that are 'unfaithful' to their militaristic origins,<ref>Haraway, Cyborg Manifesto p. 10. The phrase 'close to the machine' is borrowed from Ellen Ullman who has written about her life as a female software developer in the early era of the personal computer.</ref> we sense hesitation, fear and structural obstacles in our society and queer communities. As with systserver <ref>Systerserver is durational feminist server project, founded in 2005 in the context of the Gender Changer Academy and the Ecelectic Tech Carnival. (expand more on that? maybe put the part about the physical machines and mur.at here.)</ref> being part of this wider trans*hack, cyber feminists network, we dare to introduce our server's activities as a catalyst to push techno-feminism into existence and announce that we are here to stay.<ref>''Queercore: How To Punk A Revolution''. The documentary explores the rise of the queercore cultural and social movement in the mid-1980s. Although the movement started with only a handful of outsiders ('too queer for punk culture and too punk for the queers'), they persisted in channelling punk angst into a biting critique of societal homophobia</ref> We set out to appropriate and develop technologies for and with our network and communities, critically addressing the oppression of a techno-fascist system. Together we have a need to share ways of doing, tools &#x26; strategies ''to overcome/overthrow the monocultural, centralized oligopolic surveillance &#x26; technologies of control.'' We need to resist the matrix of domination. Stop the techno-facilitated exploitation and continuation of social and climatological injustice(s).
<ref>https://digitalcare.noho.st/pad/p/servpub</ref>
<ref>https://eth.leverburns.blue/p/servpub-2b</ref>
<nowiki/>


Feminist networking prompt us in to '''Making space for ourselves*'<ref>This is on one of the slides ''of the presentation --&#x3E; could include that as a picture.'' </ref> ''and'' '''''choosing our* own dependencies'<ref>After a ''phrase from'' the first Feminist Server manifesto: &#x22; A feminist server… is autonomous in the sense that she decides for her own dependencies.&#x22; https://areyoubeingserved.constantvzw.org/Summit_afterlife.xhtml</ref>''. These prompts embrace the feminist politics of embodiment, situatedness and consensual decision making. Feminist networking is not constrained to digital technologies, or even to the particular 'network of networks' aka the internet.<ref>Check out the 'other networks' projekt and anthology by Lori Emerson, https://shop.mexicansummer.com/merch/495898-lori-emerson-other-networks-a-radical-technology-sourcebook</ref> But when we are talking about the internet and its potential for feminist networking, we need to move away from thinking of it as something 'given' that we might 'use'. We need to shift away from the cloudy image of cyberspace serving the extension and intensification of capital, governance and data power.<ref>Metahaven, Daniel van der Velden, and Vinca Kruk. 2012. ‘Captives of the Cloud: Part I’. ''E-Flux'' 37.</ref>


Feminist networking is praxis <ref>''The Human Condition'', Hannah Arendt</ref>: it means collective vision for a feminist internet<ref>Including the principles of a feminist internet</ref> as a technopolitical way of becoming servers, that we can 'co-create', involving our bodies, materialities, networking skills and knowledges.


"[T]echnologies are about relations with things we would like to relate to, but also things we don't want to be related to." (Femke Snelting in Forms of Ongoingness, 2018)
====== Networks as Infrastructures of one's own ======
A feminist server is not only this technically facilitated node on the network, it is an (online) space that we enter &#x22;as inhabitants, to which we make contributions, nurturing a safe space and a place for expression and experimentation, a place for taking a role in hacking heteronormativity and patriarchy.&#x22;<ref>Spideralex in Forms of Ongoingness</ref> A server is a place on the internet that we can share with our intersectional, queer and feminist communities, a place where our data is hosted and the contents of our websites, where we are chatting, storing our stories and imaginaries and access the multiple online services we need to get organized (mailing lists, calendars, notes,…) However, serving, and becoming a server is not just a neutral relation between two or more computers<ref>https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/ [client/server nor user/developper]</ref> , ­ it is tied to politics of protocols, of infrastructure, power, responsablilities, dependencies, labour, knowledge, control, etc. What are the politics of self-hosting and being addressable on the internet, by having an IP address? Can we subvert our dependencies on commercial services? Which layer of the internet network we want to dismantle. Who can become a server, who is being served?<ref>Linking to the Feminist Server Summit</ref>
{|
|}
As feminist servers, we refuse to be served in ways that increases our dependencies on cis male dominated commercial and neoliberal technologies. The spacial vocabulary around having a place or 'a room of one's own' on the internet is though important, referencing historic feminist struggles for independence and safe/r off- and online spaces.


==== intro ====
One of its meanings is taking up the feminist writing by Virginia Woolf from 1927. In her essays, Woolf addresses the need for women to escape from societal pressures of fulfulling their socially assigned roles as care-givers, house wifes, servants. For many people in the feminist movement, the fight to become our own persons, with our own spaces, our own devices and ways of accessing the internet, is still ongoing in the face of intersecting, economic oppression and societal roles and burdens. This can sometimes look like a practice of withdrawel, of temporary locking the door behind oneself or of creating separatist spaces with peers whose experiences are similar to our own. Yet importantly, insisting in this room of one's own-- not unlike the room of the woman who writes on the back of and in reference to other women authors (a room full of book one can presume) -- is also of connecting with others, of making critical connections.<ref>Boggs, Grace Lee, Scott Kurashige, and Danny Glover. 2012. ''The next American Revolution: Sustainable Activism for the Twenty-First Century''. 2nd ed. Berkeley: University of California Press.</ref> In terms of feminist servers, the server thus becomes a 'connected room' or even 'infrastructures of one's own' characterized by the tension between the need for self-determination and the promiscuous and contagious practices of networking and making contact with others. These practices inherently surpass strong notions of an identitarian 'self' in a collective and heterogenous search for empowerment and are taking part in creating the conditions for networked socialities and solidarities. (see Femke, in Ongoingness) A connected room, network of one's own, with allies as co-dependencies, attributing each other(s), interacting as radical references<ref>Inspiration for this article: [https://wiki4print.servpub.net/index.php?title=Chapter_5b:_Distribution Chapter_5b:_Distribution]</ref> to evade hierarchies of cognitive capital, underlining the collective efforts to resist.<ref>See also spideralex, referencing Remedios Zafra's book &#x22;A Connected Room of One’s Own&#x22; in Forms of Ongoingness, Interview with Femke Snelting and spideralex, by Cornelia Sollfrank.</ref>
Feminist networking is a situated, transgressive and technopolitical practice that comprises more-than-human relations, hardware, wetware and software, as well as material, affective and protocological dimensions. Networking can be laborious, an act of care, of weilding solidarities, of sharing and of growing alliances. It is a community practice, a way of staying connected and connecting anew, of looking for and cherishing those critical connections which are always already more than technical -- even though technologies and mediatic infrastructures are often involved in making and maintaining them. Feminists have long recognized the power that digital networking technologies hold for forming translocal movements, mobilizing and sharing information quickly and without mediators. But when it comes to practices of appropriating technology, and coming closer to the machines in ways that are 'unfaithful' to their militaristic and extractivist origins (Haraway), we sense a lot of hesitation, fear and structural obstacles in our feminist queer circles.


This is why, as trans*hack, cyber feminists, some of us take inspiration from the tactics of ''Queercore: How To Punk A Revolution''. The documentary explores the rise of the queercore cultural and social movement in the mid-1980s, which channeled punk angst into a biting critique of societal homophobia. We introduce our feminist server's activities as a catalyst to push techno-feminism into existence and announce that we are here to stay. We set out to appropriate technology for and through our feminist networks, even amidst this current techno-fascist oppressive society.  
Furthermore, the metaphor of the room highlights the ways in which bodies need to be accommodated in the practices of feminist networking. These bodies incorporate our data bodies<ref>https://www.apc.org/en/pubs/consent-our-data-bodies-lessons-feminist-theories-enforce-data-protection</ref> but also the ways in which we show up in gatherings and places outside of digital networks. Self-organized gatherings such as the eclectic tech carnival (/etc)<ref>https://monoskop.org/Eclectic_Tech_Carnival</ref> or the trans hack feminist convergence (THF)<ref>https://alexandria.anarchaserver.org/index.php/Main_Page#TransHackFeminist_Convergence</ref>, and feminst hacklabs as marialabs, fluid.space, mz balathazar’s laboreatory, t_cyberhol, ... as well as (art) residencies or other more formal gatherings (Global gathering, Privacycamp, OFFDEM, CCC...) have been crucially informing and nuturing. Since the very beginning these are morments where feminist servers initiate and networking practices conceal.


Feminist networking involves two principles: '<nowiki/>''Making space for ourselves*' [x]'' and '<nowiki/>''choosing our* own dependencies'''[x]. These principles embraces the feminist politics of embodiment, situatedness and consensual decision making. Feminist networking is not constrained to digital technologies, or even to the ways in which the internet works. (see the 'other networks' publication). But when we are talking about the internet and its potential for feminist networking, we need to move away from thinking of it as something we 'use', away from the cloudy image of cyberspace serving the extension and intensification of the logistics of capital and data power [x]. Instead, we need to understand feminist networking in regard to the internet as a critical practice and theory at once: It means to insist on our vision of a feminist internet as a technopolitical and a collective way of becoming that we can 'co-create' and that involves bodies, materialities, networking skills and technological knowledges.


One of the ways in which this technopolitical becoming materializes is through the practices of feminist servers such as Systerserver, which is the feminist server that channels some of our more current technofeminist practices. Systerserver is one of the oldest feminist servers, founded in 2005 in the context of the Gender Changer Academy and the Ecelectic Tech Carnival. (more on that?) As part of Systerserver we are well connected and co-dependent on other feminist server projects (anarchaserver, Maadix, leverburns, digiticalcare...) and autonomous tech collectives. Together we have a need to share ways of doing, tools & strategies ''to overcome/overthrow the monocultural, centralized oligopolic surveillance & technologies of control.'' We need to resist the matrix of domination. Stop the techno-facilitated exploitation and continuation of social and climatological injustice(s).[[File:Feminist internet.jpg|thumb]]
[[File:Aicarmela-quote.png|thumb|Audrey Lorde cited by ai carmela]]


====== A network of one's own ======
'''/ETC 2024 - Berlin'''
A feminist server is not just a technically facilitated node on the network, it is a place on the internet that we can inhabit and share with our intersectional, queer and feminist communities: A place where our data is hosted, the contents of our websites, where we are chatting, storing our stories and imaginaries and access the multiple online services we need to get organized (mailing lists, calendars, notes,...). This sense of a networked locality, of having an address which can be visited on the internet, is facilitated by the internet protocol (IP) which -- amongst other requirements -- allows a computer to become an addressable node. (Footnote: Servers are computers on a network, so called nodes, who are answering to the calls of nodes, that is to say to other computers on the network. These other computers take on the role of clients making calls such as the call to view a website, to provide a document, to send an email or to receive a video stream.)


However, serving, and becoming a server is not just a technicality or a neutral relation between two or more computers. It is a technopolitical practice, that is tied to politics of protocols, of infrastructure, power, responsablility, dependencies, labour, knowledge, control, etc. What are the politics of having an IP address, of being addressable on the internet? How can we subvert our dependencies on commerical services? 
The importance of these offline-online entanglements manifested in a renovating of a part of a building in an ecoindustrial colony in the mountains by Barcelona which hosted the first THF. The room onsite was transformed into a public interface for the practices around the feminist server: anarchaserver.org<ref>This link https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the anarchaserver server. Anarchaserver is an allied […]</ref> Open for visitors, it was used during system administrative work sessions, gatherings and for sonic improvisations, radio. The door, window, ceilings, multilevels, made analogies to the functionalities of server’s hardware-software counterpart (ports, encryption, including a repository... and even a firewall. It also had a bed,where somebody could sleep, rest, reside in analogy with the Living Data container, which hosts [https://alexandria.anarchaserver.org/index.php/Main_Page ALEXANDRIA] for Wiki documenting and [https://zoiahorn.anarchaserver.org/ ZOIA HORN] for Multisite blogging.


Who can become a server, who is being served? [x]
===== pollitics of networks =====
Systerserver infrastructure is sheltered in the data room of mur.at, a cultural association which enables the hosting of a wide variety of art and cultural initiatives in a (shared) virtual server, along with Systerserver’s two physical servers. Donna Meltzer and Gaba from Systerserver went to install the most recent hardware in 2019 . The server is called Adele it host gitlab, peertube, mailman and nextcloud. The older machine was installed and configured in 2005 and is called Jean. Both are running on Debian, which is a Linux based operating system, with different services on each machine. Jean hosts a social network platform, a mastodon instance for our wider feminist communities, and tinc, a VPN software. Mastodon is a free and open-source software for microblogging. It operates within a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse. Tinc is a VPN tunneling software. It creates virtual private network(s), enabling computers and machines to connect to each other. The network is concealed, thus called private, as it only exists between the trusted machines that are added to it.


As feminist servers, we refuse to be served in ways that increases our dependencies on cis male dominated and commercial technologies and the hegemonic technical paradigm around individualism and commerce. The spacial vocabulary around having a place or 'a room of one's own' on the internet is an important principle that communicates the politics of feminist servers in serveral ways, referencing feminist struggles for independence and safe/r off- and online spaces.
A VPN can facilitate as a public entry point to our machines, make them adressable, allowing them to become servers. Home based servers are assigned with dynamic addresses that change periodically. A home router switches its public IP regularly, thus called dynamic IP addresses, because the internet service provider (ISP) temporarily assigns an IP address from a given pool, called also a lease time, that can expire and trigger an IP address change. They do this to manage their available addresses more efficiently and for minor security benefits. Domain names https://wwww.servpub.net needs to be mapped to what we call a static of fixed IP address in order to be translatable to a unique machine’s service or content.


One of its meanings is taking up the feminist writing by Virginia Woolf from 1927. In her essays, Woolf addresses the need for women to escape from societal pressures of fulfilling their socially assigned roles as care-givers, house wives, servants. For many people in the feminist movement, the fight to become our own persons, with our own spaces, our own devices and ways of accessing the internet, is still ongoing in the face of intersecting, economic oppression and societal roles and burdens. This can sometimes look like a practice of withdrawal, of temporary locking the door behind oneself or of creating separatist spaces with peers whose experiences are similar to our own.  
So if a request is made to a domain name (https://wiki4print.servpub.net), which e.g, is serving our wiki, hosted in one of these machines invited within the private network of Jean, the domain name request is first reaching Jean, the only server who has a public address in this network. On Jean, a web engine configuration software is resolving the domain and mapping it to the private address of the machine, which hosts the wiki. The request is thus rerouted internally, meaning inside the hidden/internal network to the specific machine.


Yet importantly, insisting in this room of one's own-- not unlike the room of the woman who writes on the back of and in reference to other women authors (a room full of book one can presume) -- is also of connecting with others, of making critical connections.  
Systersever has configured three of these private networks(VLAN?), &#x22;internes&#x22; and &#x22;alliances&#x22; and systerserver. The first is for Systerserver physical servers in mur.at to reach a backup server in Antwerp, which has no public address. The latter is for facilitating a range of home based server initiatives within our community, e.g, the etherpad servers of leverburns which we use for technical documentation during our server maintenance worksessions. Or allied communities, e.g, Caladona, brknhouse that want to serve content without having to commit to the high costs of acquiring a public address. There is also the network named “systerserver” which was our first attempt to install and configure Tinc for the publishing infrastructure of the ServPub project, making the raspberry-pies wiki and website accessible. (chapther 2a)


In terms of feminist servers, the server thus becomes a 'connected room' or even 'infrastructures of one's own' characterized by the tension between the need for self-determination and the promiscuous and contagious practices of networking and making contact with others. These practices inherently surpass strong notions of an identitarian 'self' in a collective and heterogenous search for empowerment and are taking part in creating the conditions for networked socialities and solidarities. (see Femke, in Ongoingness)
Having a fixed IP is costly due to its scarcity, and how the pool of IP are reshuffled and resold based on their geolocation. the distribution of addresses and the politics that stem from this. The exhaustion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline. The future transition from IPv4 to IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and therefore a discrepancy of pace in advancement of technology that supports IPv6 in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the smaller pace of network growth in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs. This means that Internet service providers (ISP) can charge higher prices for a declined number of IPv4, and in some cases, legacy IP block of addresses that were not regulated by any regional Internet registry system because they were allocated before those registries came to existence, being sold in the gray market. Having a fixed IP is costly due to its scarcity, and how the pool of IP are reshuffled and resold based on their geolocation. the distribution of addresses and the politics that stem from this. The exhaustion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline. The future transition from IPv4 to IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and therefore a discrepancy of pace in advancement of technology that supports IPv6 in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the smaller pace of network growth in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs. This means that Internet service providers (ISP) can charge higher prices for a declined number of IPv4, and in some cases, legacy IP block of addresses that were not regulated by any regional Internet registry system because they were allocated before those registries came to existence, being sold in the gray market. [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-8 [8]]


A connected room, network of one's own, with allies as co-dependencies, attributes collectivities interacting as radical references which evades hierarchies of cognitive capital based on individuals and underlines the collective efforts to resist within the hegemonic technological paradigm. <ref> https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/ </ref>  
During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-9 [9]], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-9 [9]], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-10 [10]] In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue, for mobile (ambulant) servers, geolocating the private/hidden servers concealed behind the private network —beyond the main public-facing nodes—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. A network decentralization, through the support of community based hosting that relies on shared static IPv4s, obtained through VPN tunnels and reverse proxies, Dynamic DNS<ref>''Dynamic DNS is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. Self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for data-exploitation, acts of censorship and compliance with states agencies in cases of political prosecution.''</ref> services, or Tor onions During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-9 [9]], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-9 [9]], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-10 [10]] In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue, for mobile (ambulant) servers, geolocating the private/hidden servers concealed behind the private network —beyond the main public-facing nodes—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. A network decentralization, through the support of community based hosting that relies on shared static IPv4s, obtained through VPN tunnels and reverse proxies, Dynamic DNS<ref>''Dynamic DNS is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. Self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for data-exploitation, acts of censorship and compliance with states agencies in cases of political prosecution.''</ref> services, or Tor onions [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-11 [11]] has the potential to counteract authoritarian policies and provide a means of circumvention.


Furthermore, the metaphor of the room highlights the ways in which bodies need to be accommodated in the practices of feminist networking.
'''Data Literacy'''


"We think of a feminist server as an (online) space that we need to inhabit with our bodies. As inhabitants, we contribute by nurturing a safe space and a place for creativity, experimentation and justice, a place for hacking hetero normative and patriarchal technologies. " (quote Ongoingness?)
Being part of the Internet, or internets<ref>Networks with an Attitude - https://constantvzw.org/sponge/s/?u=https://www.constantvzw.org/site/-Networks-with-an-Attitude-.html</ref>, creating and maintaining our own networked infrastructures involves an understanding of the technicalities and politics of IP address, networks, routing and subnetting, an economy of scarcity, institutional and corporate control. One way of addressing the politics of networking and of relating with technology is by 'following the data'. Data is not just an informational unit or a technicality, it is how we relate to computers, both on a supra- or infra individual level but also as something that can be be incredibly personal and intimate. We need to keep asking 'Where is the data?' (as in binary information) We need to develop technical abilities as we are also accountable in how we participate within the exisiting infrastructures in which our data is created, stored and analyzed. Making space for collective inquiry, experimentation, imagination and intervention around data, , including how data infrastructures can be challenged, contested, reshaped and repurposed to align with interests and publics other than those originally intended. In becoming more literate, we cultivate our sensibilities around data politics and as well engage a wider public with digital data infrastructures.<ref>https://journals.sagepub.com/doi/10.1177/2053951718786316</ref>


These bodies incorporate our data bodies but also the ways in which we show up in gatherings and places outside of digital networks. Self-organized gatherings such as the ecclectic tech carnival or the trans hack feminist convergence, as well as residencies or other feminist server meetings have been crucially informing and nuturing feminist server and networking practices since the very beginning.
By making infrastructures visible with the aid of drawings, diagrams, manuals, metaphors, performances, gatherings, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) data, and redistribute networks of machines and humans/species. We have the potential to learn, to maintain and care for a space together in a non-hierarchical way, and in a non-meritocratic way<ref>https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf</ref> - often refered to in introductions of our praxis as “feminist pedagogies.” It includes developping strategies and approaches to content, welcome various and diverse experiences located within the space as opportunities to cultivate learning by accept life experiences, recognizing that knowledge is socially constructed.


The importance of offline-online entanglements can also be demonstrated by the attempt to provide a physical interface of Anarchaserver, a feminist server project which was started in 20xx and which is currently dormant. The public interface of the server was created as a room onsite an anarchist commune in the mountains by Barcelona that could be visited and which was structured according to the functionalities of its hardware-software counterpart (including a repository... and even a firewall, <nowiki>https://zoiahorn.anarchaserver.org/physical-process/</nowiki>). Another example is the performative event 'Are you being served?' developed by ooooo which took place during The Feminist Server Summit, organized by constantvzw in brussels <nowiki>https://areyoubeingserved.constantvzw.org/Home_server.xhtml</nowiki> Home is a Server is about mimicking computer functioning through human energy and towards a human goal (eating the pancake instead of just publishing its recipe online), transforming ourselves into CPU, data, kernel, hard drive, booting, rebooting, getting into Kernel Panick and finally managing to get through the difficulties of sending data out, making a wiki that eventually achieves the very physical process of making pancakes for the group during the afternoon, 12–15 December 2013
Juli Evans self selfpublished wizard zines


((Instead we need a room of our own and we need a ''‘connected room’ of our own''.*  or ''a network of one's own''
  Mara Karagiana self publishes with https://cucu.gr/about/
<ref>(Spideralex) [https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf.]</ref>
<ref>referring to the paranodal periodic publication and series of events and worksessions in rotterdam revisting of Virgina Woolf's classic essay.</ref>))


===== Data literacy: Knowledges about networks =====
  Humming birds is a performative event which took place in 360 degrees of proximity in Faqladen (berlin) &#x26; caledona ( barcelona) . Basic feminist federation by sociometric exercises and voicing techniques we explore the Fediverse, all talking the same protocol Activity Pub.
Networking is a practice that involves knowledges about networks as well as the technopolitics that are tied to different ways of connecting, of making space and relating to online services.


One way of addressing the politics of networking and of relating with technology is by 'following the data'. Data is not just an informational unit or a technicality, it is how we relate to computers, both on a supra- or infra-individual level but also as something that can be be incredibly personal and intimate. We need to keep asking 'Where is the data?'
Home is server is a performative event which took place during The Feminist Server Summit, 12–15 December 2013 ,organized by constantvzw in brussels. Home is a Server is about collectively embodying a computer with some props, a script, CPU, RAM, watchdogs, triggering data, ports, kernels, hard drives. Together we follow the data flow while we install a server, send data in/out, install a wiki and publish a recipie for pancakes which we bake and eat together.  
 
[[File:Cryptodance.png|thumb|Cryptodance - THF 2016]]
Besides from these roles we need to encourage “data infrastructure literacy” for the ability to account for, intervene around and participate in the wider socio-technical infrastructures in which data is created, stored and analyzed. Our intent is to make space for collective inquiry, experimentation, imagination and intervention around data. Data as in binary information, suitable for processing by computers, recognizing it's intrinsic (human)labour conditions, maintenance and hence care. In becoming more literate, we cultivate our sensibilities around data politics and as well engage a wider public with digital data infrastructures. <ref> https://journals.sagepub.com/doi/10.1177/2053951718786316</ref>
  The cryptodance is a performative event to familiarize ourselves with different modes of encryption. Whilst collectively embodying issues of security, privacy, safety and surveillance, we converge a technopolitical urgency for sovereignty and a desire for affinities with the body /machine~ living organisms/algorithms. Cryptodance is developed, in august during the preparations of [https://femhack.noblogs.org/post/2016/05/31/thf2016-en/ THF 2016!] by an international small constellation of choreographers, hackers, dancers, .... They met, discussed and wrote a choreography combining dance annotations, crypto technics and careful somatic tactics. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (Esc, Gratz, Austria), where they formed joint(ad)venture of the department of Waves and Shadow and The Department of Care and Wonder.
 
----
For this reason we need to make servers visible and physical as a crucial/critical space,  
 
By making infrastructures visible with the aid of drawings, diagrams, manuals, metaphors, performances, gatherings, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) our data, and redistribute our networks of machines and humans/species.
 
[[File:Port443-ssl.jpg|thumb]]
  [[File:Server-wiki-act5.png|thumb]]
 
 
===== politics of networks =====
Being part of the Internet, or internets, creating and maintaing our own networked infrastructures involves an understanding of the technicalities and politics of IP address, local, public, private and virtual networks, routing and subnetting, an economy of scarcity, institutional and corporate control.
Systerserver infrastructure is sheltered in the data room of mur.at, a cultural association which enables the hosting of a wide variety of art and cultural initiatives in a (shared) virtual server, along with Systerserver’s two physical servers. Donna Meltzer and Gaba from Systerserver went to install the most recent hardware in 2019 . The server is called Adele. The older machine was installed and configured in 2005 and is called Jean. Both are running on Debian, which is a Linux based operating system, with different services on each machine. Jean hosts a social network platform, a mastodon instance for our wider feminist communities, and tinc, a VPN software. Mastodon is a free and open-source software for microblogging. It operates within a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse. Tinc is a VPN tunneling software. It creates virtual private network(s), enabling computers and machines to connect to each other, even if these machines are not servers with a public address. The network is hidden, thus called private, as it only exists between the machines that are added to it.
 
A VPN can also facilitate as a public entry point to these machines, allowing them to become servers. So if a request is made to a domain name, which e.g, is serving a wiki, hosted in one of these machines hidden within the private network of Jean, the domain name request is first reaching Jean, the only public address in this network. On Jean, a web engine configuration software is resolving the domain and mapping it to the private address of the machine, which hosts the wiki. The request is thus rerouted internally, meaning inside the hidden network to the specific machine.
 
Systersever has configured three of these private networks, distinguishing between "internes" and "alliances". The first is for Systerserver physical servers in mur.at to reach a backup server in Antwerp, which has no public address. The latter is for facilitating a range of home based server initiatives within our community, e.g, the etherpad servers of leverburns which we use for technical documentation during our server maintenance worksessions. Or allied communities, e.g, Caladona that want to serve content without having to commit to the high costs of acquiring a public address. There is also the network named “systerserver” which was our first attempt to install and configure Tinc for the publishing infrastructure of the ServPub project, making the raspberry-pies wiki and website accessible as servers. Home based servers are assigned with dynamic addresses that change periodically. A home router switches its public IP regularly, thus called dynamic IP addresses, because the internet service provider (ISP) temporarily assigns an IP address from a given pool, called also a lease time, that can expire and trigger an IP address change. They do this to manage their available addresses more efficiently and for minor security benefits. The drawback of this, is that a home router cannot be assigned a domain name, since domain names need to be mapped to what we call a static of fixed IP address in order to be translatable to a unique machine’s service or content.
 
Hence for home based servers to be accessible in the Internet they need a static IP address. With the creation of the Tinc networks, as we mentioned above, home based machines can become servers since they can be accessed via the IP of jean which has a fixed IP, assigned by the networking of mur.at. Tinc (and other VPN) tunnels operate within private networks, usually in the ranges of 10.0.0.0 pool, and the machines 'invited' inside these tunnels can connect to each other. The machine with the public IP, or the public node, as we call it within the private network, provides the web engine configutation software – nginx, apache being the most popular and FLOSS options, and those that we work with in Systerserver infrastructure – for forwarding traffic requests, which is also called a reverse proxy. Proxy because Jean servers as the proxy to reach a hidden (private) machine, and reverse, because the hidden machine can respond back to the request by serving its content to the computer who requested it. This is therefore the other distinct feature of a server, the ability to receive and send data over the network, while a computer who is not serving, known as the client, and which is the typical case of working with our computers from home, browsing the internet, and being able to request content, but not being allowed from our home router to send or serve content outside our home network.
 
A VPN software and a reverse proxy configuration is a tactical dependency to avoid the costs for a static IP address, therefore overcoming the shortage of IPv4. Or to avoid censorship and institutional control over the content of a server, since it remains hidden from the public network provided by the ISP. <ref> See also the networking introduction of the art project ''A Traversal Network of Feminist Servers'', which allowed '''rosa''', the project's mobile server to travel to places: the Hub, p.9, accessed on 24 July 2025, https://atnofs.constantvzw.org/ATNOFS-screen.pdf. However systerserver as a techno-feminist collective don't prescribe to the idea of originality and individuals' accreditation to technicalities that have a long history of software development and implementations in various contextes, we cite the reference as another example of using VPN in artistic infrastructural practice.</ref>  It also facilitates the mobility of home based servers, and reinforcing trusted networks by enabling hidden localities – the actual IP address of the private server is not known, but to the public node.  Who is the public node, hence becomes a political dependency. And the legalities that govern that said public node become crucial depending on the content being served.
We have to keep in mind that adding new servers to our Tinc network(s), requires more bandwidth traffic, and hence material resources from the dataroom in mur.at.
 
===== geolocation and network infrastructures =====
Having a fixed IP is costly due to its scarcity, and how the pool of IP are reshuffled and resold based on their geolocation. the distribution of addresses and the politics that stem from this. The exhaustion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline. The future transition from IPv4 to IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and therefore a discrepancy of pace in advancement of technology that supports IPv6 in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the smaller pace of network growth in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs. This means that ISP can charge higher prices for a declined number of IPv4, and in some cases, legacy IP block of addresses that were not regulated by any regional Internet registry system because they were allocated before those registries came to existence, being sold in the gray market. <ref>The African continent registry AFRINIC have been under scrutiny due to organizational and legal problems. In 2019, 4.1 million IPv4 addresses part of unused legacy IP blocks, were sold on the grey market. Accessed online on 25 July 2025 https://en.wikipedia.org/wiki/AFRINIC. </ref>
 
During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, <ref>Tunnel Up/ Tunnel Down, Mara Karagianni, a self-published zine about what is a VPN and its various uses and technologies, 2019, https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf  </ref>, the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. <ref>https://en.wikipedia.org/wiki/Restrictions_on_geographic_data_in_China </ref>
In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue, for mobile (ambulant) servers, geolocating the private/hidden servers behind the private network —beyond the main public-facing nodes—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. A network decentralization, through the support of community based hosting that relies on shared static IPv4s, obtained through VPN tunnels and reverse proxies, Dynamic DNS services, or Tor onions <ref>https://blog.apnic.net/2024/01/09/measuring-bgp-in-2023-have-we-reached-peak-ipv4/ </ref> has the potential to counteract authoritarian policies and provide a means of circumvention.
 
===== choose your dependencies =====
An alternative for when your ISP changes your home network's IP address, would be Dynamic DNS, which is a useful service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. You can also run a DDNS client on one of your servers. 
 
/// needs more... / generalisation + references
 
THIS SEEMS MORE INFORMATIVE /MAYBE IN SEORATE DESIGN STYLE [[File:Protocol stack hourglass.jpeg|thumb|Protocol stack]]
 
====== lan/wan/van ======
To understand somehow more the private and public IP’s and networks, we can look at them from their naming conventions. LAN is an abbreviation for LOCAL AREA NETWORK, and the reserved addresses for these networks are either 192.x.x.x, 169.x.x.x (DHCP) and 172.x.x.x. These addresses are distributed within one room, building that has a router. The router that broadcasts the WiFi or provides ethernet cable connections is the interface between the local network inside the room, and the WAN (WIDER ARE NETWORK), basically the Internet.
 
The addresses 10.x.x.x are reserved for the private networks, that are also called virtual. Since Virtual Private Networks are more complex to comprehend. Let's  introduce a little bit of their history, hoping that it will illustrate their purposes and functions more.
 
====== regulatory bodies ICAN-RFC's develop/discuss standards (missing) ======
 
====== routing / subnetting (missing) ======


====== history and topology of VPN ======
====== history and topology of VPN ======
After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider.
After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider. AT&#x26;T Bell Laboratories developed an IP Encryption Protocol (SwIPe), implementing encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.
AT&T Bell Laboratories developed an IP Encryption Protocol (SwIPe), implementing encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.


"IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic.  
&#x22;IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies.&#x22; &#x22;IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies.&#x22; [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-12 [12]]
Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies."
<ref> https://www.paloaltonetworks.com/cyberpedia/history-of-vpn </ref>


By end of 90s Microsoft worked towards implementing a secure tunnel protocol, creating a virtual data tunnel to ensure more secure data transmission over the web. The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats. Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.
By end of 90s Microsoft worked towards implementing a secure tunnel protocol, creating a virtual data tunnel to ensure more secure data transmission over the web. The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats. Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.


"L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel."
&#x22;L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel.&#x22; &#x22;L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel.&#x22; [https://wiki4print.servpub.net/index.php?title=Chapter_2b:_Server_Issues:_Networked_Infrastructure#cite_note-13 [13]]
<ref> https://www.paloaltonetworks.com/cyberpedia/what-is-l2tp</ref>


A later tunneling protocol is the openVPN, which has been designed as a more flexible protocol allowing port configuration, and more security.
A later tunneling protocol is the openVPN, which has been designed as a more flexible protocol allowing port configuration, and more security.
Line 114: Line 64:
Tinc protocol follows here...
Tinc protocol follows here...


the drawing of encapsulation from tunnel up/down  
the drawing of encapsulation from tunnel up/down
 
While https is another way to secure traffic over the internet, it is distingue from IPSec in that IPsec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS, the secure version of HTTP, using SSL, and its successor TLS secures individual web sessions, typically used for secure remote access to specific applications via the internet. 


===== resources matter =====
While https is another way to secure traffic over the internet, it is distingue from IPSec in that IPsec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS, the secure version of HTTP, using SSL, and its successor TLS secures individual web sessions, typically used for secure remote access to specific applications via the internet.


====== traffic costs and electricity (missing) ======
'
<noinclude>
<references />
[[index.php?title=Category:ServPub]]
</noinclude>

Revision as of 00:20, 4 August 2025

"[T]echnologies are about relations with things we would like to relate to, but also things we don't want to be related to." (Femke Snelting in Forms of Ongoingness, 2018)

Feminist networking is a situated, transgressive and technopolitical practice that engages us in more-than-human relations with hardware, wetware and software. Networks are material and need protocols to interface affective relations. Networking can be in that sense laborious, an act of care, of wielding solidarities, of sharing and of growing alliances, recognizing our precarities, identities and collective oppressions. It is a community practice, a way of staying connected and connecting anew, of looking for and cherishing those critical connections[1] which are always already more than technical. Feminists have long recognized the power that digital communication technologies hold for forming translocal movements, mobilizing and sharing information without moderators.[2] But when it comes to practices of appropriating technology, and coming closer to the machines in ways that are 'unfaithful' to their militaristic origins,[3] we sense hesitation, fear and structural obstacles in our society and queer communities. As with systserver [4] being part of this wider trans*hack, cyber feminists network, we dare to introduce our server's activities as a catalyst to push techno-feminism into existence and announce that we are here to stay.[5] We set out to appropriate and develop technologies for and with our network and communities, critically addressing the oppression of a techno-fascist system. Together we have a need to share ways of doing, tools & strategies to overcome/overthrow the monocultural, centralized oligopolic surveillance & technologies of control. We need to resist the matrix of domination. Stop the techno-facilitated exploitation and continuation of social and climatological injustice(s).

Feminist networking prompt us in to Making space for ourselves*'[6] and choosing our* own dependencies'[7]. These prompts embrace the feminist politics of embodiment, situatedness and consensual decision making. Feminist networking is not constrained to digital technologies, or even to the particular 'network of networks' aka the internet.[8] But when we are talking about the internet and its potential for feminist networking, we need to move away from thinking of it as something 'given' that we might 'use'. We need to shift away from the cloudy image of cyberspace serving the extension and intensification of capital, governance and data power.[9]

Feminist networking is praxis [10]: it means collective vision for a feminist internet[11] as a technopolitical way of becoming servers, that we can 'co-create', involving our bodies, materialities, networking skills and knowledges.

Networks as Infrastructures of one's own

A feminist server is not only this technically facilitated node on the network, it is an (online) space that we enter "as inhabitants, to which we make contributions, nurturing a safe space and a place for expression and experimentation, a place for taking a role in hacking heteronormativity and patriarchy."[12] A server is a place on the internet that we can share with our intersectional, queer and feminist communities, a place where our data is hosted and the contents of our websites, where we are chatting, storing our stories and imaginaries and access the multiple online services we need to get organized (mailing lists, calendars, notes,…) However, serving, and becoming a server is not just a neutral relation between two or more computers[13] , ­ it is tied to politics of protocols, of infrastructure, power, responsablilities, dependencies, labour, knowledge, control, etc. What are the politics of self-hosting and being addressable on the internet, by having an IP address? Can we subvert our dependencies on commercial services? Which layer of the internet network we want to dismantle. Who can become a server, who is being served?[14]

As feminist servers, we refuse to be served in ways that increases our dependencies on cis male dominated commercial and neoliberal technologies. The spacial vocabulary around having a place or 'a room of one's own' on the internet is though important, referencing historic feminist struggles for independence and safe/r off- and online spaces.

One of its meanings is taking up the feminist writing by Virginia Woolf from 1927. In her essays, Woolf addresses the need for women to escape from societal pressures of fulfulling their socially assigned roles as care-givers, house wifes, servants. For many people in the feminist movement, the fight to become our own persons, with our own spaces, our own devices and ways of accessing the internet, is still ongoing in the face of intersecting, economic oppression and societal roles and burdens. This can sometimes look like a practice of withdrawel, of temporary locking the door behind oneself or of creating separatist spaces with peers whose experiences are similar to our own. Yet importantly, insisting in this room of one's own-- not unlike the room of the woman who writes on the back of and in reference to other women authors (a room full of book one can presume) -- is also of connecting with others, of making critical connections.[15] In terms of feminist servers, the server thus becomes a 'connected room' or even 'infrastructures of one's own' characterized by the tension between the need for self-determination and the promiscuous and contagious practices of networking and making contact with others. These practices inherently surpass strong notions of an identitarian 'self' in a collective and heterogenous search for empowerment and are taking part in creating the conditions for networked socialities and solidarities. (see Femke, in Ongoingness) A connected room, network of one's own, with allies as co-dependencies, attributing each other(s), interacting as radical references[16] to evade hierarchies of cognitive capital, underlining the collective efforts to resist.[17]

Furthermore, the metaphor of the room highlights the ways in which bodies need to be accommodated in the practices of feminist networking. These bodies incorporate our data bodies[18] but also the ways in which we show up in gatherings and places outside of digital networks. Self-organized gatherings such as the eclectic tech carnival (/etc)[19] or the trans hack feminist convergence (THF)[20], and feminst hacklabs as marialabs, fluid.space, mz balathazar’s laboreatory, t_cyberhol, ... as well as (art) residencies or other more formal gatherings (Global gathering, Privacycamp, OFFDEM, CCC...) have been crucially informing and nuturing. Since the very beginning these are morments where feminist servers initiate and networking practices conceal.


/ETC 2024 - Berlin

The importance of these offline-online entanglements manifested in a renovating of a part of a building in an ecoindustrial colony in the mountains by Barcelona which hosted the first THF. The room onsite was transformed into a public interface for the practices around the feminist server: anarchaserver.org[21] Open for visitors, it was used during system administrative work sessions, gatherings and for sonic improvisations, radio. The door, window, ceilings, multilevels, made analogies to the functionalities of server’s hardware-software counterpart (ports, encryption, including a repository... and even a firewall. It also had a bed,where somebody could sleep, rest, reside in analogy with the Living Data container, which hosts ALEXANDRIA for Wiki documenting and ZOIA HORN for Multisite blogging.

pollitics of networks

Systerserver infrastructure is sheltered in the data room of mur.at, a cultural association which enables the hosting of a wide variety of art and cultural initiatives in a (shared) virtual server, along with Systerserver’s two physical servers. Donna Meltzer and Gaba from Systerserver went to install the most recent hardware in 2019 . The server is called Adele it host gitlab, peertube, mailman and nextcloud. The older machine was installed and configured in 2005 and is called Jean. Both are running on Debian, which is a Linux based operating system, with different services on each machine. Jean hosts a social network platform, a mastodon instance for our wider feminist communities, and tinc, a VPN software. Mastodon is a free and open-source software for microblogging. It operates within a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse. Tinc is a VPN tunneling software. It creates virtual private network(s), enabling computers and machines to connect to each other. The network is concealed, thus called private, as it only exists between the trusted machines that are added to it.

A VPN can facilitate as a public entry point to our machines, make them adressable, allowing them to become servers. Home based servers are assigned with dynamic addresses that change periodically. A home router switches its public IP regularly, thus called dynamic IP addresses, because the internet service provider (ISP) temporarily assigns an IP address from a given pool, called also a lease time, that can expire and trigger an IP address change. They do this to manage their available addresses more efficiently and for minor security benefits. Domain names https://wwww.servpub.net needs to be mapped to what we call a static of fixed IP address in order to be translatable to a unique machine’s service or content.

So if a request is made to a domain name (https://wiki4print.servpub.net), which e.g, is serving our wiki, hosted in one of these machines invited within the private network of Jean, the domain name request is first reaching Jean, the only server who has a public address in this network. On Jean, a web engine configuration software is resolving the domain and mapping it to the private address of the machine, which hosts the wiki. The request is thus rerouted internally, meaning inside the hidden/internal network to the specific machine.

Systersever has configured three of these private networks(VLAN?), "internes" and "alliances" and systerserver. The first is for Systerserver physical servers in mur.at to reach a backup server in Antwerp, which has no public address. The latter is for facilitating a range of home based server initiatives within our community, e.g, the etherpad servers of leverburns which we use for technical documentation during our server maintenance worksessions. Or allied communities, e.g, Caladona, brknhouse that want to serve content without having to commit to the high costs of acquiring a public address. There is also the network named “systerserver” which was our first attempt to install and configure Tinc for the publishing infrastructure of the ServPub project, making the raspberry-pies wiki and website accessible. (chapther 2a)

Having a fixed IP is costly due to its scarcity, and how the pool of IP are reshuffled and resold based on their geolocation. the distribution of addresses and the politics that stem from this. The exhaustion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline. The future transition from IPv4 to IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and therefore a discrepancy of pace in advancement of technology that supports IPv6 in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the smaller pace of network growth in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs. This means that Internet service providers (ISP) can charge higher prices for a declined number of IPv4, and in some cases, legacy IP block of addresses that were not regulated by any regional Internet registry system because they were allocated before those registries came to existence, being sold in the gray market. Having a fixed IP is costly due to its scarcity, and how the pool of IP are reshuffled and resold based on their geolocation. the distribution of addresses and the politics that stem from this. The exhaustion of available IPv4 addresses has led to the adoption of address-sharing technologies and significant architectural changes in Internet services, further contributing to the decline. The future transition from IPv4 to IPv6 usage remains uncertain, influenced by technical developments, economic factors, and global events, such as pandemics, economic crises and therefore a discrepancy of pace in advancement of technology that supports IPv6 in different parts of the word. IPv6 adoption is scant in most of Africa, the Middle East, Eastern and Southern Europe, and the western part of Latin America. Due to the smaller pace of network growth in those regions appears, for the moment, be adequately accommodated in the continued use of IPv4 NATs. This means that Internet service providers (ISP) can charge higher prices for a declined number of IPv4, and in some cases, legacy IP block of addresses that were not regulated by any regional Internet registry system because they were allocated before those registries came to existence, being sold in the gray market. [8]

During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [9], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [9], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. [10] In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue, for mobile (ambulant) servers, geolocating the private/hidden servers concealed behind the private network —beyond the main public-facing nodes—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. A network decentralization, through the support of community based hosting that relies on shared static IPv4s, obtained through VPN tunnels and reverse proxies, Dynamic DNS[22] services, or Tor onions During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [9], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, During the translation of the VPN manuals Tunnel Up/ Tunnel Down created by one of the authors of this text, [9], the Chinese artist and translator Biyi Wen pointed us to the art research project A Tour of Suspended Handshakes, in which artist Cheng Guo physically visits nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centers, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised—for example, antennas camouflaged as lamp posts—the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002. [10] In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue, for mobile (ambulant) servers, geolocating the private/hidden servers concealed behind the private network —beyond the main public-facing nodes—remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. A network decentralization, through the support of community based hosting that relies on shared static IPv4s, obtained through VPN tunnels and reverse proxies, Dynamic DNS[23] services, or Tor onions [11] has the potential to counteract authoritarian policies and provide a means of circumvention.

Data Literacy

Being part of the Internet, or internets[24], creating and maintaining our own networked infrastructures involves an understanding of the technicalities and politics of IP address, networks, routing and subnetting, an economy of scarcity, institutional and corporate control. One way of addressing the politics of networking and of relating with technology is by 'following the data'. Data is not just an informational unit or a technicality, it is how we relate to computers, both on a supra- or infra individual level but also as something that can be be incredibly personal and intimate. We need to keep asking 'Where is the data?' (as in binary information) We need to develop technical abilities as we are also accountable in how we participate within the exisiting infrastructures in which our data is created, stored and analyzed. Making space for collective inquiry, experimentation, imagination and intervention around data, , including how data infrastructures can be challenged, contested, reshaped and repurposed to align with interests and publics other than those originally intended. In becoming more literate, we cultivate our sensibilities around data politics and as well engage a wider public with digital data infrastructures.[25]

By making infrastructures visible with the aid of drawings, diagrams, manuals, metaphors, performances, gatherings, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) data, and redistribute networks of machines and humans/species. We have the potential to learn, to maintain and care for a space together in a non-hierarchical way, and in a non-meritocratic way[26] - often refered to in introductions of our praxis as “feminist pedagogies.” It includes developping strategies and approaches to content, welcome various and diverse experiences located within the space as opportunities to cultivate learning by accept life experiences, recognizing that knowledge is socially constructed.

Juli Evans self selfpublished wizard zines
Mara Karagiana self publishes with https://cucu.gr/about/
Humming birds is a performative event which took place in 360 degrees of proximity in Faqladen (berlin) & caledona ( barcelona) . Basic feminist federation by sociometric exercises and voicing techniques we explore the Fediverse, all talking the same protocol Activity Pub.
Home is server is a performative event which took place during The Feminist Server Summit, 12–15 December 2013 ,organized by constantvzw in brussels. Home is a Server is about collectively embodying a computer with some props, a script, CPU, RAM, watchdogs, triggering data, ports, kernels, hard drives. Together we follow the data flow while we install a server, send data in/out, install a wiki and publish a recipie for pancakes which we bake and eat together. 
Cryptodance - THF 2016
The cryptodance is a performative event to familiarize ourselves with different modes of encryption. Whilst collectively embodying issues of security, privacy, safety and surveillance, we converge a technopolitical urgency for sovereignty and a desire for affinities with the body /machine~ living organisms/algorithms. Cryptodance is developed, in august during the preparations of THF 2016! by an international small constellation of choreographers, hackers, dancers, .... They met, discussed and wrote a choreography combining dance annotations, crypto technics and careful somatic tactics. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (Esc, Gratz, Austria), where they formed joint(ad)venture of the department of Waves and Shadow and The Department of Care and Wonder.

history and topology of VPN

After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider. AT&T Bell Laboratories developed an IP Encryption Protocol (SwIPe), implementing encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.

"IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies." "IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies." [12]

By end of 90s Microsoft worked towards implementing a secure tunnel protocol, creating a virtual data tunnel to ensure more secure data transmission over the web. The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats. Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.

"L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel." "L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel." [13]

A later tunneling protocol is the openVPN, which has been designed as a more flexible protocol allowing port configuration, and more security.

Tinc protocol follows here...

the drawing of encapsulation from tunnel up/down

While https is another way to secure traffic over the internet, it is distingue from IPSec in that IPsec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS, the secure version of HTTP, using SSL, and its successor TLS secures individual web sessions, typically used for secure remote access to specific applications via the internet.

'

  1. Following a quote from Grace Lee Hoggs on connectedness and activism which puts 'critical connections' over 'critical mass' after an idea by Margaret Wheatly. (Boggs, Kurashige, and Glover. 2012, p. 50)
  2. See the interview with Donna, Aileen, Anne and Helen from systerserver, 2025. (to be published at https://systerserver.net)
  3. Haraway, Cyborg Manifesto p. 10. The phrase 'close to the machine' is borrowed from Ellen Ullman who has written about her life as a female software developer in the early era of the personal computer.
  4. Systerserver is durational feminist server project, founded in 2005 in the context of the Gender Changer Academy and the Ecelectic Tech Carnival. (expand more on that? maybe put the part about the physical machines and mur.at here.)
  5. Queercore: How To Punk A Revolution. The documentary explores the rise of the queercore cultural and social movement in the mid-1980s. Although the movement started with only a handful of outsiders ('too queer for punk culture and too punk for the queers'), they persisted in channelling punk angst into a biting critique of societal homophobia
  6. This is on one of the slides of the presentation --> could include that as a picture.
  7. After a phrase from the first Feminist Server manifesto: " A feminist server… is autonomous in the sense that she decides for her own dependencies." https://areyoubeingserved.constantvzw.org/Summit_afterlife.xhtml
  8. Check out the 'other networks' projekt and anthology by Lori Emerson, https://shop.mexicansummer.com/merch/495898-lori-emerson-other-networks-a-radical-technology-sourcebook
  9. Metahaven, Daniel van der Velden, and Vinca Kruk. 2012. ‘Captives of the Cloud: Part I’. E-Flux 37.
  10. The Human Condition, Hannah Arendt
  11. Including the principles of a feminist internet
  12. Spideralex in Forms of Ongoingness
  13. https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/ [client/server nor user/developper]
  14. Linking to the Feminist Server Summit
  15. Boggs, Grace Lee, Scott Kurashige, and Danny Glover. 2012. The next American Revolution: Sustainable Activism for the Twenty-First Century. 2nd ed. Berkeley: University of California Press.
  16. Inspiration for this article: Chapter_5b:_Distribution
  17. See also spideralex, referencing Remedios Zafra's book "A Connected Room of One’s Own" in Forms of Ongoingness, Interview with Femke Snelting and spideralex, by Cornelia Sollfrank.
  18. https://www.apc.org/en/pubs/consent-our-data-bodies-lessons-feminist-theories-enforce-data-protection
  19. https://monoskop.org/Eclectic_Tech_Carnival
  20. https://alexandria.anarchaserver.org/index.php/Main_Page#TransHackFeminist_Convergence
  21. This link https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the anarchaserver server. Anarchaserver is an allied […]
  22. Dynamic DNS is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. Self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for data-exploitation, acts of censorship and compliance with states agencies in cases of political prosecution.
  23. Dynamic DNS is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed and memorable address for your home network. You can often set up DDNS on your router. Self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for data-exploitation, acts of censorship and compliance with states agencies in cases of political prosecution.
  24. Networks with an Attitude - https://constantvzw.org/sponge/s/?u=https://www.constantvzw.org/site/-Networks-with-an-Attitude-.html
  25. https://journals.sagepub.com/doi/10.1177/2053951718786316
  26. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf