Chapter 2b: Server Issues: Networked Infrastructure: Difference between revisions

This page was last edited on 5 December 2025, at 16:25.
No edit summary
(caption text back into running text)
 
Line 61: Line 61:
'''How can we imagine a virtual private server, in a material world ?''' During the rehabilitation of  an eco-industrial colony in the mountains near Barcelona, Calafou, a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org<ref>Anarchaserver is an allied […]
'''How can we imagine a virtual private server, in a material world ?''' During the rehabilitation of  an eco-industrial colony in the mountains near Barcelona, Calafou, a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org<ref>Anarchaserver is an allied […]


This link https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the anarchaserver server.</ref><!-- as this anarchaserver is quite crucial to systerserver history and the currently alliance, may be worth expanding the details in the footnote, and now the footnote is incomplete --> Open for visitors, it was used during system administrative work sessions, and for gatherings, sonic improvisations and radio. The door, window, ceilings and multi-levels were analogous to the functionalities of a server’s hardware-software counterparts (ports, encryption, including a repository... and even a firewall). It also had a bed,where somebody could sleep, rest and reside in analogy with the Living Data container, which hosts [https://alexandria.anarchaserver.org/index.php/Main_Page ALEXANDRIA] for Wiki documenting and [https://zoiahorn.anarchaserver.org/ ZOIA HORN] for multi-site blogging. It was also activated during TransHackFeminist Convergence, an event of intersectional feminists, queer and trans people of all genders  to better understand, use and ultimately develop free and liberating technologies for social dissence.]]
This link https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the anarchaserver server.</ref><!-- as this anarchaserver is quite crucial to systerserver history and the currently alliance, may be worth expanding the details in the footnote, and now the footnote is incomplete --> Open for visitors, it was used during system administrative work sessions, and for gatherings, sonic improvisations and radio. The door, window, ceilings and multi-levels were analogous to the functionalities of a server’s hardware-software counterparts (ports, encryption, including a repository... and even a firewall). It also had a bed,where somebody could sleep, rest and reside in analogy with the Living Data container, which hosts [https://alexandria.anarchaserver.org/index.php/Main_Page ALEXANDRIA] for Wiki documenting and [https://zoiahorn.anarchaserver.org/ ZOIA HORN] for multi-site blogging. It was also activated during TransHackFeminist Convergence, an event of intersectional feminists, queer and trans people of all genders  to better understand, use and ultimately develop free and liberating technologies for social dissence.|alt=]]


''How can we imagine a virtual private server, in a material world ?''


[[File:server-wiki-act5.png|'''Home is a server'''''How to collectively embody a server?''Fourteen people are invited to choose a props representing the different hardware parts of a computer (CPU, RAM, watchdogs, ports, kernels, hard drives). By reading a script together, we follow the data flow while we install a server, send data in/out, install a wiki and publish a recipe for pancakes which we bake and eat together.]]
During the rehabilitation of  an eco-industrial colony in the mountains near Barcelona, Calafou, a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org Open for visitors, it was used during system administrative work sessions, and for gatherings, sonic improvisations and radio. The door, window, ceilings and multi-levels were analogous to the functionalities of a server’s hardware-software counterparts (ports, encryption, including a repository... and even a firewall). It also had a bed,where somebody could sleep, rest and reside in analogy with the Living Data container, which hosts ALEXANDRIA for Wiki documenting and ZOIA HORN for multi-site blogging. It was also activated during TransHackFeminist Convergence, an event of intersectional feminists, queer and trans people of all genders  to better understand, use and ultimately develop free and liberating technologies for social dissence.
How to collectively embody a server?Fourteen people are invited to choose a props representing the different hardware parts of a computer (CPU, RAM, watchdogs, ports, kernels, hard drives). By reading a script together, we follow the data flow while we install a server, send data in/out, install a wiki and publish a recipe for pancakes which we bake and eat together.




[[File:hummingbird.png|'''Humming Birds'''''What is feminist federation?''   
[[File:hummingbird.png|'''Humming Birds'''''What is feminist federation?''   


By choreographies, sociometric exercises and voicing techniques we explore the Fediverse and get introduced in the technical understanding of the protocol ActivityPub which is used as a standard for decentralized social networking. It provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.]]
By choreographies, sociometric exercises and voicing techniques we explore the Fediverse and get introduced in the technical understanding of the protocol ActivityPub which is used as a standard for decentralized social networking. It provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.|alt=Humming Birds]]
 
[[File:Cryptodance.png|'''Cryptodance''' Are we vulnerable, safe and do we need to encrypt?
 
In different exercises combining dance annotations, crypto techniques and careful somatic tactics we embody issues of security, privacy, safety and surveillance. Cryptodance is a performative event whcih was developed in August 2016 during the preparations for [https://femhack.noblogs.org/post/2016/05/31/thf2016-en/ THF 2016!], by a small international constellation of choreographers, hackers and dancers.. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint(ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder.Cryptodance - THF 2016]]
 
 
 


''What is feminist federation?'' 


By choreographies, sociometric exercises and voicing techniques we explore the Fediverse and get introduced in the technical understanding of the protocol ActivityPub which is used as a standard for decentralized social networking. It provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.


[[File:Cryptodance.png|'''Cryptodance''' Are we vulnerable, safe and do we need to encrypt?


In different exercises combining dance annotations, crypto techniques and careful somatic tactics we embody issues of security, privacy, safety and surveillance. Cryptodance is a performative event whcih was developed in August 2016 during the preparations for [https://femhack.noblogs.org/post/2016/05/31/thf2016-en/ THF 2016!], by a small international constellation of choreographers, hackers and dancers.. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint(ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder.Cryptodance - THF 2016|alt=Cryptodance ]]


''Are we vulnerable, safe and do we need to encrypt?''


In different exercises combining dance annotations, crypto techniques and careful somatic tactics we embody issues of security, privacy, safety and surveillance. Cryptodance is a performative event whcih was developed in August 2016 during the preparations for THF 2016!, by a small international constellation of choreographers, hackers and dancers.. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint(ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder.Cryptodance - THF 2016










<br />
// WE WOULD STOP HERE AND TAKE ALL OF THIS OUT // I tdoesn't make sense servpub isn't a feminist networking project -<blockquote>
// WE WOULD STOP HERE AND TAKE ALL OF THIS OUT // I tdoesn't make sense servpub isn't a feminist networking project -<blockquote>
''"[T]echnologies are about relations with things we would like to relate to, but also things we'' ''don't want to be related to''<!-- COUNTER _ proposing our vpn is --- wanting to relate your static IP to us, but really this quote is more used as understanding in which networked practices you engage, or you don't COUNTER  / DONE this is an interesting quote, but how these show in your IP investigation? I feel it is there, but may be when you write about your dependency, you can refer to this quote as a sign posting? -->''"'' Femke Snelting in Forms of Ongoingness, 2018</blockquote>
''"[T]echnologies are about relations with things we would like to relate to, but also things we'' ''don't want to be related to''<!-- COUNTER _ proposing our vpn is --- wanting to relate your static IP to us, but really this quote is more used as understanding in which networked practices you engage, or you don't COUNTER  / DONE this is an interesting quote, but how these show in your IP investigation? I feel it is there, but may be when you write about your dependency, you can refer to this quote as a sign posting? -->''"'' Femke Snelting in Forms of Ongoingness, 2018</blockquote>

Latest revision as of 16:25, 5 December 2025

Contributors: Systerserver

"Activist infrastructures are where the messy, grinding, generally invisible ­labor of 'doing feminism' takes place." Cait McKinney in Information Activism - A Queer History of Lesbian Media, 2020

Parts of the Internets

Systerserver, a feminist server project of almost two decades, has supported the Servpub project with their network infrastructure. The feminists involved in this project have configured their own infrastructure of two physical servers in the data room of [mur.at], an art association in Graz, Austria, which hosts a wide variety of art and cultural initiatives. The physical servers found this shelter through the networking of activists and artists during Eclectic Tech Carnival (/ETC)[1], a self organized skill sharing gathering. Donna Meltzer and Gaba from Systerserver went to Graz to upgrade the servers' hardware in 2019. The first machine, installed and configured in 2005, is called Jean and was refurbished by ooooo[2] in 2023 during their stay in Graz for the Traversal Network of Feminist Servers[3]. The gathering was hosted by ESC[4], a local media art gallery in Graz, which is affiliated with mur.at.

Both servers are running on Debian, which is a Linux based operating system and host together, Gitlab, a code repository, Peertube, a video and streaming platform, Mailman, mailinglist provider, Nextcloud, cloud storage and collective organisation, Mastodon providing a social networking platform[5], and Tinc, a virtual private network (VPN) software. The VPN is the most recent addition, facilitating the need for home based and self hosted servers by our peers. Those server projects interweave into a feminist networking, an affective, socio-technical infrastructure, enabling the emergence of more trans-feminist groups and collectives like actinomy (Bremen), leverburns (Amsterdam), caladona (Barcelona), brknhs (Berlin) to host their own infrastructures and be reachable by the public internet.

Tinc was chosen as VPN software, mimicking of what we learnt during a Traversal Feminist Server, encountering Rosa [6]. Rosa's setup itself was inspired by the network infrastructure of Xpub[7] (Rotterdam, Piet Zwart Academy). Also Mara, part of systerserver was commissioned by constant vzw to write with Michael (Xpub), a Zine as a manual, how to make ambulant servers like rosa.[8] reachable on the public internet. The beta version of the zine was read together, revisioned and updated by vo.ezn, also part of systerserver. She deployed it in the digital infrastructure of hackers and designers[9].

A VPN software creates virtual private networks, connecting computers and machines that are not sharing the same physical location. In contrast to the internet, though, the network between these machines is concealed, thus called private, as it only exists between the trusted machines that are added to it. They cannot be seen by Internet providers or other bodies, who are not invited, nor authenticated in the private network. A VPN can also facilitate a public entry point to private machines, making them addressable and thus allowing them to become servers. Usually, devices are assigned an Internet Protocol (IP) address that changes periodically, thus called dynamic. A home or office router, also switches its public IP regularly, because the internet service provider (ISP) distributes IP address from a given pool, which can expire and trigger an IP address change, so called a lease time. ISP do this to manage their available addresses more efficiently and for minor security benefits.[10] Finding a machine in the Internet, by remembering their IP, would be a challenging if not impossible thing to do. Thus, domain names such as https://wwww.servpub.net need to be mapped to an IP address, so when this domain name is visited, the browser can present the service or content hosted on that machine. Retaining this IP the same becomes important for mapping it to a domain name, therefore it's also known as fixed or static IP. The translation IP to domain names and back, happen with Domain Name Servers or DNS.[11]

Network! Ack!
Network! Ack! zine by Julia Evans, introduction about computer networking and how DNS works [1]

So if a request is made to a domain name (for example https://wiki4print.servpub.net, which is serving our wiki) that is hosted on one of the trusted machines in the private network of Jean, the domain name request first reaches Jean, as the only server that has a public and static IP address in this network. On Jean, a web engine configuration software forwards the request to the private address of the machine, which hosts the wiki. The request is thus rerouted internally, meaning inside the concealed/private network, to the specific machine, which hosts the wiki4print website. This forwarding request is called a reverse proxy.

What is a vpn


Systersever has configured three of these virtual private networks (VPN) to reach servers which have no public and static IP address: "internes", "alliances" and "systerserver". "Internes" is for Systerserver's internal network and it is used to reach the machine in Antwerp, which is making backup of our own servers( jean & adele) . "Alliances" is for facilitating a range of home-based server initiatives within our community, such as the Etherpad servers of leverburns which we use for technical documentation during our server maintenance work sessions, or allied communities such as caladona and brknhs that want to serve video content without having to commit to the expenses of acquiring a public, static IP address. There is also the network named “systerserver” which was our first attempt to install and configure Tinc for the publishing infrastructure of the ServPub project, making the raspberry-pies, which host the wiki4print and the servpub website accessible to the internet.

Ip protocol stack
Ip protocol stack

Looking at the initial architecture of the Internet as a communication medium where a node can reach any other node, and the importance of a node to be authenticated by their address as a unique identifier, the current landscape has transformed to something quite different. Since the end of the 90s the development of the IPv6 protocol was conceived [12] for enabling larger addresses, mitigating the depletion of IPv4 addresses, whose notation hasn't been long enough to cover the proliferation of devices, but also allowing more security and various methods of sending and receiving messages. The encryption protocol IPsec, introduced around the mid-1990s, provided an end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. It was compatible with IPv4 to ensure encryption, however it requires extra software installation and configuration steps, but it was incorporated as a core component of IPv6.[13] Therefore, while internet communication over the web, provides encryption with the secure HTTPS certificates, other internet connections, e.g files syncing over two machines, require encryption configurations and/or VPN tunnels.[14] One may argue whether the embedded encryption within the IP packet for every node on the Internet, it is a civil right that the industry and states' surveillance would rather avoid.

Up until now, the transition to the IPv6 protocol has been overshadowed by the tech industry's monetary need for scaling. Storage and computing became inexpensive, which saw the development of serving content through intermediaries, that are located closer to users network access, and which can cache content, known as Content Distribution Networks (CDNs) . Those providers serve most of Internet content and have minimized the factor of geographic distance from the network, as well as eliminating the need for unique addresses assigned to servers and clients for reaching each other. They have, nonetheless, utterly centralized the Internet. Moreover, the lower motivation for business to offer and maintain both IPv4 and IPv6 network stack, as other technologies such as address-sharing[15] and CDNs have fixed the issue of handling the scarcity of IP addresses,[16] have contributed to a decreased pace in advancement of technology that supports IPv6. This has resulted in internet service providers (ISPs) charging higher prices for a reduced number of IPv4 addresses and in some cases, legacy IP blocks of addresses can even be sold in the grey market, because those blocks were not regulated by any regional internet registry system since they were allocated before those registries came to existence.[17]

During the translation of the VPN manuals Tunnel Up/ Tunnel Down[18] the Chinese artist and translator Biyi Wen pointed to the art research project "A Tour of Suspended Handshakes". In this project, artist Cheng Guo physically visits some nodes of China’s Great Firewall. Using network diagnostic tools, the artist identified the geolocations mapped to IP addresses of these critical gateways, based on data published by other researchers. At times, these geolocations correspond to scientific and academic centres, which seem like plausible sites for gateway infrastructure. Other times, they lead to desolate locations with no apparent technological presence. While Guo acknowledges that some gateways may be hidden or disguised - for example, antennas camouflaged as lamp posts - the primary reason for these discrepancies lies in the redistribution and subnetting of IP addresses, as well as their resale. These factors make it difficult to pinpoint exact geographical locations. Additionally, online IP geolocation tools provide coordinates in the WGS-84 system (the global GPS standard), whereas locations in China must be converted to GCJ-02 (an encrypted Chinese standard). This further complicates geographic identification, as mapping activities have been illegal in mainland China since 2002.[19]

In the case of the Great Firewall, the combination of IP redistribution and encrypted coordinates obscures the true locations of its gateways, rendering the firewall a nebulous and elusive system. We would like to argue that for mobile (ambulant) servers, geolocating the private servers concealed behind the private network -beyond the main public-facing nodes - remains a challenge. However, unlike the Great Firewall, the mobility of such servers is not enforced through a top-down governmental control. The desire to be addressable from our home based infrastructure through a network-sharing of tunnels and reverse proxies through trusted public nodes,[20] Community infrastructures in this case, bring about the potential to circumvent state and capitalist surveillance, such as commercial centralised CDNs, institutional and business firewalls, and turn this imposed scarcity into a solidarity action.

Digital litteracies

Being part of the internet, or internets[21], creating and maintaining our own networked infrastructures involves an understanding of the technicalities and politics of IP addresses, networks, routing and subnetting, and of an economy of scarcity and institutional and corporate control. One way of addressing the politics of networking and of relating with technology is by 'following the data'. Data is not just an informational unit or a technicality, it is how we relate to computers, both on a supra- or infra-individual level but also as something that can be incredibly personal and intimate. We need to keep asking 'Where is the data?'. We need to develop technical awareness and accountability in how we participate and are complicit in the existing infrastructures in which our data is created, stored/sold and analyzed. In becoming more engaged, we cultivate our sensibilities around data and infrastructure politics.[22]

By making infrastructures visible with the aid of drawings, diagrams, manuals, metaphors, performances and gatherings, Systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) data and redistribute networks of machines and humans/species. We have the potential to exchange knowledge, and to maintain and care for a space together in a non-hierarchical and non-meritocratic way[23] - often referred to as “feminist pedagogies” in the introductions and talks about our praxis. It centers around developing tactics and approaches related to content, welcoming various and diverse experiences located in the places where we physically meet, and cultivating learning by accepting life experiences, recognizing that knowledge is socially constructed.


///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

insert placeholder - online and offline entanglements

sudo apt upgrade root in public interface anarchaserver

How can we imagine a virtual private server, in a material world ?

During the rehabilitation of  an eco-industrial colony in the mountains near Barcelona, Calafou, a room was transformed into a physical public interface for the practices around the feminist server: anarchaserver.org Open for visitors, it was used during system administrative work sessions, and for gatherings, sonic improvisations and radio. The door, window, ceilings and multi-levels were analogous to the functionalities of a server’s hardware-software counterparts (ports, encryption, including a repository... and even a firewall). It also had a bed,where somebody could sleep, rest and reside in analogy with the Living Data container, which hosts ALEXANDRIA for Wiki documenting and ZOIA HORN for multi-site blogging. It was also activated during TransHackFeminist Convergence, an event of intersectional feminists, queer and trans people of all genders  to better understand, use and ultimately develop free and liberating technologies for social dissence. How to collectively embody a server?Fourteen people are invited to choose a props representing the different hardware parts of a computer (CPU, RAM, watchdogs, ports, kernels, hard drives). By reading a script together, we follow the data flow while we install a server, send data in/out, install a wiki and publish a recipe for pancakes which we bake and eat together.


Humming Birds

What is feminist federation? 

By choreographies, sociometric exercises and voicing techniques we explore the Fediverse and get introduced in the technical understanding of the protocol ActivityPub which is used as a standard for decentralized social networking. It provides a client-to-server API for creating and modifying content, as well as a federated server-to-server protocol for delivering notifications and content to other servers.

Cryptodance

Are we vulnerable, safe and do we need to encrypt?

In different exercises combining dance annotations, crypto techniques and careful somatic tactics we embody issues of security, privacy, safety and surveillance. Cryptodance is a performative event whcih was developed in August 2016 during the preparations for THF 2016!, by a small international constellation of choreographers, hackers and dancers.. Goldjian and bolwerK started plotting the Cryptodance project during a Ministry of Hacking (hosted by esc in Graz, Austria), where they formed a joint(ad)venture of the Department of Waves and Shadow and the Department of Care and Wonder.Cryptodance - THF 2016




// WE WOULD STOP HERE AND TAKE ALL OF THIS OUT // I tdoesn't make sense servpub isn't a feminist networking project -

"[T]echnologies are about relations with things we would like to relate to, but also things we don't want to be related to'" Femke Snelting in Forms of Ongoingness, 2018

Feminist networking

Feminist networking is a situated technopolitical practice that engages us in more-than-human relations with hardware, wetware and software. Networks are material, and interfaces to affective relations through protocols. Networking can be in that sense laborious, an act of care, of wielding solidarities, of sharing and of growing alliances, recognizing our precarities, identities and collective oppressions. It is a community practice, a way of staying connected and connecting anew, of looking for and cherishing those critical connections[25] which are always already more than technical. Feminists have long recognized the power that communication technologies hold for forming translocal movements,[26] mobilising and sharing information without moderators.[27] But when it comes to practices of appropriating technology, and coming closer to the machines[28] we sense hesitation, fear and structural obstacles in society and queer communities. As with Systerserver [29] being part of this wider trans*hack, cyberfeminist network, we dare to introduce our server's activities as a catalyst to push techno-feminism into existence and announce that we are here to stay.[30] We set out to appropriate and develop technologies for and with our network and communities, critically addressing the oppression of a techno-fascist system. Together we have a need to share ways of doing, tools and strategies to overcome and overthrow the monocultural, centralised oligopolic technologies of surveillance and control. We need to resist the matrix of domination. Stop the techno-facilitated exploitation and continuation of social and climate injustice(s).

Feminist networking prompts us into making space for ourselves[31] and choosing our own dependencies[32]. These prompts embrace the feminist politics of embodiment, situatedness and consensual decision making. Feminist networking is not constrained to digital technologies, or even to the particular 'network of networks' aka the internet.[33] But when we are talking about the internet and its potential for feminist networking, we need to move away from thinking of it as something 'given' that we might 'use'. We need to shift away from the cloudy image of cyberspace serving the extension and intensification of capital, governance and data power.[34]

Feminist networking is praxis [35]: it means collective vision for a feminist Internet[36] as a technopolitical way of becoming servers, that we can 'co-create', involving our bodies, materialities, networking skills and knowledges.

Networks as infrastructures of one's own

A feminist server goes beyond a technically facilitated node in the network, it is an (online) space that we enter "as inhabitants, to which we make contributions, nurturing a safe space and a place for expression and experimentation, a place for taking a role in hacking heteronormativity and patriarchy."[37] A server is a place on the internet that we can share with our intersectional, queer and feminist communities, a place where our data and the contents of our websites are hosted, where we are chatting, storing stories and imaginaries, and accessing the tools we need to get organized (mailing lists, calendars, etherpads) Hence, serving, and becoming a server is not just a neutral relation between two or more computers.[38] It is tied to politics of protocols, of infrastructure capacity and power, responsibilities, dependencies, labour, knowledge, and control. What are the politics of self-hosting and being addressable on the internet, by having an IP address of one's own? How can we emancipate ourselves from the techno-fascist platforms and content service providers? Which layer of the internet protocol stack we shall intervene? Who can become a server, who is being served?[39]

As feminist servers, we refuse to be served in networks that increase our dependencies on cis male dominated and neoliberal technologies. The spacial vocabulary around having a place or 'a room of one's own' on the internet is therefore important, referencing historic feminist struggles for agency, and safe/r off- and online spaces for uninterrupted time together to imagine technological praxis otherwise.

In her essay, A Room of One's Own, Woolf addresses the need for women to escape from the societal pressure of fulfilling their assigned roles as care-givers, house wives and servants, and become creative without being affected by society's expectations of moral chastity on women. By earning our own means, we can claim the privilege of not sharing a room, so that we can think and write without constant interruptions from the gender based assigned duties. For many people in the feminist movement, the fight to become our own persons, with our own spaces, our own devices and ways of accessing the internet, is still ongoing in the face of intersecting, economic oppression and gender based societal roles and constraints. This can sometimes look like a practice of withdrawal, of temporarily locking the door behind oneself or of creating separatist spaces with peers whose experiences are similar to our own. Yet importantly, insisting on this room of one's own - not unlike the room of the woman who writes on the back of and in reference to other women authors (a room full of books one can presume) - is also insisting on connecting with others, of making critical connections.[40] In terms of feminist servers, the server thus becomes a 'connected room' or even 'infrastructures of one's own', characterized by the tension between the need for self-determination and the promiscuous and contagious practices of networking and making contact with others. These practices inherently surpass strong notions of the individual 'self', facilitating instead a collective and heterogeneous search for empowerment, and partake in creating the conditions for networked socialities and solidarities. They transform to a connected room,[41] a network of one's own, with allies as co-dependencies, attributing each other(s), interacting as radical references[42] to evade hierarchies of cognitive capital, which are crucial for sustaining collective efforts of resistance against capitalistic logics of knowledge and cultural production.

Furthermore, the metaphor of one's own room highlights the ways in which bodies need to be accommodated in the practices of feminist servers and networking. These bodies incorporate our data bodies[43] but also the ways in which we show up in gatherings and places outside the digital networks. Self-organised gatherings such as the eclectic tech carnival (/etc)[44] or the trans hack feminist convergence (THF),[45] and feminist hacklabs such as marialabs, fluid.space, mz balathazar’s laboratory, t_cyberhol, as well as (art) residencies or other larger gatherings (Global gathering, Privacycamp, OFFDEM, CCC) have been crucially nurturing and fueling the desires for our own servers. These are moments where feminist networking can materialise into feminist servers and affective infrastructures.[46]

Trans Hack Feminist Convergence Eclectic tech carnival feminist Hack meeting Athens https://psaroskalazines.gr/ Painfull backup & migrations



  1. https://eclectictechcarnival.org/
  2. https://www.ooooo.be
  3. refer chapter one or two
  4. https://esc.mur.at/
  5. Mastodon is a free and open-source software for microblogging. It operates within a federated network of independently managed servers that communicate using the ActivityPub protocol, allowing users to interact across different instances within the Fediverse
  6. Rosa is using, varia.hub to be reachable on the internet. varia hub is what they called a jumphole, a poetic description for the VPN + reversey proxy through their servers. varia is a space for developing collective approaches to everyday technology. As varia members, we maintain and facilitate a collective infrastructure from which we generate questions, opinions, modifications, help and action. We work with free software, organise events and collaborate in different constellations.
  7. XPUB is the Master of Arts in Fine Art and Design: Experimental Publishing of the Piet Zwart Institute. XPUB focuses on the acts of making things public and creating publics in the age of post-digital networks.
  8. https://psaroskalazines.gr/pdf/rosa_beta_25_jan_23.pdf
  9. https://etherpad.hackersanddesigners.nl/p/hd_infrastructures-tinc
  10. IP address lease times provide security benefits such as preventing persistent unauthorized use, reduce risks such as IP spoofing and theft, allow rapid response to misuse by removing compromised devices from the network.
  11. a fun guide to what is a DNS, and computer networking in general, it's the zine Networking! Ack! by Julia Evans, 2017, available at https://jvns.ca/networking-zine.pdf
  12. The first publication of the IPv6 protocol in a Request for Comments was in December 1998, accessed on September 20th, 2025, https://www.rfc-editor.org/rfc/rfc2460.txt
  13. Besides IPv6 protocol being a secure protocol with extra authentication and privacy, it also has support for unicast, multicast, anycast. See more at Internetworking with TCP/IP, Vol. 2 by Douglas E. Comer and David L. Stevens, published by Englewood Cliffs, N.J. : Prentice Hall, 1998, accessed on September 20th, 2025, https://archive.org/details/internetworking000come
  14. While HTTPS is a way to secure traffic over the internet, it is distinguished from IPSec in that IPSec secures all data traffic within an IP network, suitable for site-to-site connectivity. HTTPS, the secure version of HTTP, using TLS certificates, secures individual web sessions. The authentication with a TLS certificate relies on name ownership, and not on the integrity of the server's IP address. This fact enables CDNs to cache content and serve in place of the origin server, which contributes to the centralisation of content distribution over the web. https://gcore.com/learning/tls-on-cdn More about how TLS works https://www.bacloud.com/en/blog/190/ssl-for-ip-lets-encrypt-now-supports-tlsorssl-certificates-for-ip-addresses.html
  15. See for example routing via Network Address Translation (NAT), https://en.wikipedia.org/wiki/Network_address_translation
  16. Geoff Huston, The IPv6 transition, 2024, accessed on September 20th, 2025 at https://blog.apnic.net/2024/10/22/the-ipv6-transition/
  17. The African continent registry AFRINIC have been under scrutiny due to organizational and legal problems. In 2019, 4.1 million IPv4 addresses part of unused legacy IP blocks, were sold on the grey market. Accessed online on 25 July 2025 https://en.wikipedia.org/wiki/AFRINIC.
  18. Tunnel Up/ Tunnel Down, Mara Karagianni, a self-published zine about what is a VPN and its various uses and technologies, 2019, https://psaroskalazines.gr/pdf/fanzine-VPN-screen-en.pdf.
  19. https://en.wikipedia.org/wiki/Restrictions_on_geographic_data_in_China
  20. Dynamic DNS is another option for when your ISP changes your home network's IP address.It is a commercial service that allows you also to use a fixed address for your home network. You can often set up DDNS on your router. Self-hosted website or online resource will be redirected over commercial nodes maintained by companies; companies which are often known for data-exploitation, acts of censorship and compliance with states agencies in cases of political prosecution.
  21. Networks with an Attitude - https://constantvzw.org/sponge/s/?u=https://www.constantvzw.org/site/-Networks-with-an-Attitude-.html
  22. https://journals.sagepub.com/doi/10.1177/2053951718786316
  23. https://creatingcommons.zhdk.ch/wp-content/uploads/2020/06/Transcript-Femkespider.pdf
  24. Anarchaserver is an allied […] This link https://zoiahorn.anarchaserver.org/physical-process/ is hosted on the anarchaserver server.
  25. Following a quote from Grace Lee Hoggs on connectedness and activism which puts 'critical connections' over 'critical mass' after an idea by Margaret Wheatly. (Boggs, Kurashige, and Glover. 2012, p. 50)
  26. McKinney describes how lesbians built newsletter networks for fostering lesbian culture in the 70s till mid 90's, in chapter one The Internet that Lesbians Built, Cait McKinney, Information Activism - A Queer History of Lesbian Media, Duke University Press, 2020
  27. See the interview with Donna, Aileen, Anne and Helen from Systerserver, 2025. (to be published at https://systerserver.net)
  28. Haraway, Cyborg Manifesto p. 10. The phrase 'close to the machine' is borrowed from Ellen Ullman who has written about her life as a female software developer in the early era of the personal computer.
  29. Systerserver is durational feminist server project, founded in 2005 in the context of the Gender Changer Academy and the Ecelectic Tech Carnival. (expand more on that? maybe put the part about the physical machines and mur.at here.)
  30. Queercore: How To Punk A Revolution. The documentary explores the rise of the queercore cultural and social movement in the mid-1980s. Although the movement started with only a handful of outsiders ('too queer for punk culture and too punk for the queers'), they persisted in channelling punk angst into a biting critique of societal homophobia
  31. This is on one of the slides of the presentation --> could include that as a picture.
  32. After a phrase from the first Feminist Server manifesto: " A feminist server… is autonomous in the sense that she decides for her own dependencies." https://areyoubeingserved.constantvzw.org/Summit_afterlife.xhtml
  33. Check out the 'other networks' projekt and anthology by Lori Emerson, https://shop.mexicansummer.com/merch/495898-lori-emerson-other-networks-a-radical-technology-sourcebook
  34. Metahaven, Daniel van der Velden, and Vinca Kruk. 2012. ‘Captives of the Cloud: Part I’. E-Flux 37.
  35. The Human Condition, Hannah Arendt
  36. Including the principles of a feminist internet
  37. Spideralex in Forms of Ongoingness
  38. https://www.roots-routes.org/hacking-maintenance-with-care-reflections-on-the-self-administered-survival-of-digital-solidarity-networks-by-erica-gargaglione/ [client/server nor user/developper]
  39. Linking to the Feminist Server Summit
  40. Boggs, Grace Lee, Scott Kurashige, and Danny Glover. 2012. The next American Revolution: Sustainable Activism for the Twenty-First Century. 2nd ed. Berkeley: University of California Press.
  41. See also spideralex, referencing Remedios Zafra's book "A Connected Room of One’s Own" in Forms of Ongoingness, Interview with Femke Snelting and spideralex, by Cornelia Sollfrank.
  42. Inspiration for this article: Chapter_5b:_Distribution
  43. https://www.apc.org/en/pubs/consent-our-data-bodies-lessons-feminist-theories-enforce-data-protection
  44. https://monoskop.org/Eclectic_Tech_Carnival
  45. https://alexandria.anarchaserver.org/index.php/Main_Page#TransHackFeminist_Convergence
  46. nate wessalowski, Mara Karagianni, From Feminists Servers to Feminist Federation, Vol. 12 No. 1 (2023): Minor Tech, 2023, https://doi.org/10.7146/aprja.v12i1.140450