-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathindex.html
300 lines (284 loc) · 16.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
<!DOCTYPE HTML>
<!--
Hyperspace by HTML5 UP
html5up.net | @ajlkn
Free for personal and commercial use under the CCA 3.0 license (html5up.net/license)
-->
<html>
<head>
<title>DIY Cybersecurity for Domestic Violence</title>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1" />
<!--[if lte IE 8]><script src="assets/js/ie/html5shiv.js"></script><![endif]-->
<link rel="stylesheet" href="assets/css/main.min.css" />
<!--[if lte IE 9]><link rel="stylesheet" href="assets/css/ie9.css" /><![endif]-->
<!--[if lte IE 8]><link rel="stylesheet" href="assets/css/ie8.css" /><![endif]-->
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>DIY Cybersecurity for Domestic Violence</title>
<meta name="keywords" content="Cybersecurity, domestic violence, privacy, security, feminist, guide, harassment, troll">
<meta name="description" content="Abuse adapts to technology. You deserve privacy and compassion.">
<meta property="og:site_name" content="HACK*BLOSSOM" />
<meta property="og:type" content="article" />
<meta property="og:url" content="https://hackblossom.org/domestic-violence/" />
<meta property="og:title" content="DIY Cybersecurity for Domestic Violence" />
<meta property="og:description" content="Abuse adapts to technology. You deserve privacy and compassion." />
<meta property="og:image" content="https://hackblossom.org/domestic-violence/images/cover.jpg" />
<meta property="og:image:width" content="1220" />
<meta property="og:image:height" content="635" />
<meta name="twitter:card" content="summary_large_image">
<meta name="twitter:site" content="@hackblossom">
<meta name="twitter:creator" content="@ciakraa">
<meta name="twitter:title" content="DIY Cybersecurity for Domestic Violence">
<meta name="twitter:description" content="Abuse adapts to technology. You deserve privacy and compassion.">
<meta name="twitter:image:src" content="https://hackblossom.org/domestic-violence/images/cover.jpg">
<link rel="image_src" href="https://hackblossom.org/domestic-violence/images/cover.jpg">
<link rel="canonical" href="https://hackblossom.org/domestic-violence/" />
<link rel="shortcut icon" href="images/favicon.ico" type="image/x-icon">
<link rel="apple-touch-icon" href="images/apple-touch-icon.png">
<link rel="apple-touch-icon" sizes="72x72" href="images/apple-icon-72x72.png">
<link rel="apple-touch-icon" sizes="114x114" href="images/apple-icon-114x114.png">
</head>
<body>
<!-- Sidebar -->
<section id="sidebar">
<div class="inner">
<nav class="mobile-off">
<ul>
<li><a href="#safety" class="active">Welcome</a></li>
<li><a href="#threats" class="active">Threat Scenarios</a></li>
<li><a href="#defense" class="active">Defense Strategies</a></li>
<li><a href="#about" class="active">About Us</a></li>
<li><a href="https://www.google.com/search?q=corgi+puppies" class="active">Quick Exit</a></li>
</ul>
</nav>
<nav class="mobile-on">
<ul>
<li><a class="active" href="#" class="active">Home</a></li>
<li><a class="active" href="#threats" class="active">Threats</a></li>
<li><a class="active" href="#defense" class="active">Defense</a></li>
<li><a class="active" href="https://www.google.com/search?q=corgi+puppies" class="active">Exit</a></li>
<ul>
</nav>
</div>
</section>
<!-- Wrapper -->
<div id="wrapper">
<!-- Welcome -->
<section id="welcome" class="wrapper style0 fullscreen fade-up">
<div class="inner">
<h1 class="title-text">DIY Cybersecurity for Domestic Violence</h1>
<p class="title-subtext">A resource of privacy + compassion by HACK*BLOSSOM.</p>
</div>
</section>
<!-- Safety -->
<section id="safety" class="wrapper style1 fade-up">
<div class="inner">
<h1>Why Cybersecurity?</h1>
<p>Domestic violence isn't always physical. Many intimate partners exert control using the technologies we rely on everyday. Being intimidated by constant phone-calls, stalked by location-sharing apps, humiliated on social media, forced to share sensitive texts and passwords: each of these experiences is a violation of privacy that affects your freedom to make decisions about your life. Being deprived of your autonomy is no less painful when it's digital.</p>
<p><b>DIY Cybersecurity asserts your privacy online.</b> When you're threatened by your partner, you can always reach out to a domestic violence professional. But whenever you need to protect yourself online, you're not alone. Our <b><a href="#threats">Threat Scenarios</a></b> explore, in-depth, how to resist a controlling partner. Each guide is accessible and empathetic: you're not obliged to follow any of our suggestions if you don't feel they're right for you. We also have <b><a href="#defense">Defense Strategies</a></b> for proactively securing your digital life.</p>
<p>There's a quick exit button in the sidebar in case you need to suddenly leave the site. If you want to make sure there's no history of your visit, please read our guide on <b><a href="defense/web-browsers.html">Private Web Browsing.</a></b></p>
<p>We hope you find strength and security. You deserve it.</p>
<ul class="actions">
<li><a href="#threats" class="button scrolly">Explore Threat Scenarios</a></li>
<li><a href="#defense" class="button scrolly">Learn Defense Strategies</a></li>
</ul>
</div>
</section>
<!-- Abuse -->
<section id="threats" class="wrapper style2 spotlights">
<section>
<a href="threats/cell-phones.html" class="image" style="background-image: url("images/cell-phones-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My partner is harassing me through my cell phone.</h2>
<p>Some partners send dozens, even hundreds of texts or phone-calls a day. This behavior is deeply invasive—using a cell phone should not be a harmful experience.</p>
<ul class="actions">
<li><a href="threats/cell-phones.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/social-media.html" class="image" style="background-image: url("images/social-media-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My partner is harassing me through social media.</h2>
<p>While social media makes it easy to connect to friends and family, it carries a risk of private harassment and public embarrassment. You deserve a safe space online.</p>
<ul class="actions">
<li><a href="threats/social-media.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/location.html" class="image" style="background-image: url("images/location-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My partner is stalking my location.</h2>
<p>Cellphones and social media reveal our physical location 24/7. Learn how to keep yourself off the grid without sacrificing your freedom.</p>
<ul class="actions">
<li><a href="threats/location.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/monitoring.html" class="image" style="background-image: url("images/monitoring-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My partner is surveilling my online activity.</h2>
<p>By monitoring your devices with or without your consent, a controlling partner can create feelings of fear, anxiety, and helplessness. You have the right to use your electronics privately.</p>
<ul class="actions">
<li><a href="threats/monitoring.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/accounts.html" class="image" style="background-image: url("images/accounts-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My partner has unwanted access to my online accounts.</h2>
<p>Many controlling partners say that if you have "nothing to hide", you should be okay sharing email, social media, or bank accounts. That's not their decision to make.</p>
<ul class="actions">
<li><a href="threats/accounts.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/sexual-content.html" class="image" style="background-image: url("images/sexual-content-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>My sex life is being used against me.</h2>
<p>Sexts, nudes, and pornography are everywhere in modern relationships. When a partner tries weaponize sexuality, you can resist.</p>
<ul class="actions">
<li><a href="threats/sexual-content.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
<section>
<a href="threats/leaving.html" class="image" style="background-image: url("images/leaving-home.jpg"); background-position: center center;"></a>
<div class="content">
<div class="inner">
<h2>I want to leave my partner.</h2>
<p>Leaving a partner can be dangerous. Create a technology safety plan that secures your online accounts and protects your data.</p>
<ul class="actions">
<li><a href="threats/leaving.html" class="button">Read more</a></li>
</ul>
</div>
</div>
</section>
</section>
<!-- Two -->
<section id="defense" class="wrapper style3 fade-up">
<div class="inner">
<h1>Defense Strategies</h1>
<p>Cybersecurity is most effective when you're proactive. Take control of your digital spaces with these simple defense strategies. No tech experience is necessary!</p>
<div class="features">
<section>
<span class="icon major icon-lock"></span>
<h3>Protect Your Passwords.</h3>
<p>Use strong, unique passwords to keep your online accounts from being hacked.</p>
<ul class="actions">
<li><a href="defense/passwords.html" class="button">Learn more</a></li>
</ul>
</section>
<section>
<span class="icon major icon-link"></span>
<h3>Use Two-Step Verification.</h3>
<p>Enable a safety-net when strong passwords aren't enough.</p>
<ul class="actions">
<li><a href="defense/two-step-verification.html" class="button">Learn more</a></li>
</ul>
</section>
<section>
<span class="icon major icon-desktop"></span>
<h3>Browse the Web Privately.</h3>
<p>Secure your web browser to search the internet without a trace.</p>
<ul class="actions">
<li><a href="defense/web-browsers.html" class="button">Learn more</a></li>
</ul>
</section>
<section>
<span class="icon major icon-users"></span>
<h3>Secure Social Media.</h3>
<p>Reduce the risk of your social media being used against you.</p>
<ul class="actions">
<li><a href="defense/social-media.html" class="button">Learn more</a></li>
</ul>
</section>
<section>
<span class="icon major icon-cloud"></span>
<h3>Back-up Your Data.</h3>
<p>Secure your most important data and collect evidence of harassment.</p>
<ul class="actions">
<li><a href="defense/back-ups.html" class="button">Learn more</a></li>
</ul>
</section>
<section>
<span class="icon major icon-eye-off"></span>
<h3>Create Secret Accounts.</h3>
<p>Register with private email, phone-calls, and texts when you need safety.</p>
<ul class="actions">
<li><a href="defense/secret-accounts.html" class="button">Learn more</a></li>
</ul>
</section>
</div>
</div>
</section>
<!-- About -->
<section id="about" class="wrapper style1 fade-up">
<div class="inner">
<h2>About Us</h2>
<p><span class="image left"><img src="images/asterisk.jpg" alt="" /></span><b><a target="_blank" href="https://twitter.com/ciakraa">Noah Kelley</a></b> is the writer and developer of this website. <b><a target="_blank" href="https://hackblossom.org/">HACK*BLOSSOM</a></b> is an activist+artist platform fighting for love in digital spaces. We're based in Boston, Massachusetts.</p>
<div class="split style1">
<section>
<h3>Support</h3>
<p><b><a target="_blank" href="https://hackblossom.org/">HACK*BLOSSOM</a></b> is an unfunded grassroots organization. If you want to support our work, you can make a donation via <b><a target="_blank" href="https://donorbox.org/hack-blossom-donations">Donorbox</a></b>.</p>
<a target="_blank" href="https://donorbox.org/hack-blossom-donations" style="background:rgb(247, 146, 206) url(https://d1iczxrky3cnb2.cloudfront.net/red_logo.png) no-repeat 37px center; color: #fff;text-decoration: none;font-family: Verdana,sans-serif;display: inline-block;font-size: 16px;padding: 15px 38px 15px 75px; -webkit-border-radius: 2px; -moz-border-radius: 2px; border-radius: 2px; box-shadow: 0 1px 0 0 #1f5a89; text-shadow: 0 1px rgba(0, 0, 0, 0.3);" >Donate</a>
<p></p>
<h3>Acknowledgements</h3>
<p>Wonderful illustrations are courtesy of <b><a target="_blank" href="http://www.auroralady.com/">Aurora Lady</a></b>. Special thanks to <b><a target="_blank" href="http://transitionhouse.org/">Transition House</a></b> for their invaluable expertise. Thank you to all the survivors, social workers, activists, volunteers, friends, and family who resist domestic violence. Your commitment to love is revolutionary.</p>
<h3>Contact</h3>
<p>We're happy to hear from you. It may take us some time to respond due to high volume of emails, but we'll be in touch.
<p>
</section>
<section>
<ul class="contact">
<li>
<h3>Twitter</h3>
<span><a target="_blank" href="https://twitter.com/ciakraa">@ciakraa</span>
<br>
<span><a target="_blank" href="https://twitter.com/hackblossom">@hackblossom</span>
</li>
<li>
<h3>Facebook</h3>
<span><a target="_blank" href="https://www.facebook.com/hackblossom">HACK*BLOSSOM</a></span>
</li>
<li>
<h3>Email</h3>
<span><a href="mailto:noah@hackblossom.org" target="_top">outreach@hackblossom.org</a></span><br>
<br>
<span><i>Please contact a domestic violence organization if you need immediate support.</i></span>
</li>
</ul>
</section>
</div>
</div>
</section>
</div>
<!-- Footer -->
<footer id="footer" class="wrapper style1-alt">
<div class="inner">
<ul class="menu">
<li>© HACK*BLOSSOM. All rights reserved.</li>
<li>This site is <a href="https://github.com/HACK-BLOSSOM/DIY-Cybersecurity-For-Domestic-Violence">open source</a> licensed under <a href="https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode.txt">CC BY-NC-SA</a>
<li>Design: <a href="http://html5up.net">HTML5 UP</a></li>
</ul>
</div>
</footer>
</body>
</html>