{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:39:33Z","timestamp":1759365573584,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":149,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032067531","type":"print"},{"value":"9783032067548","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06754-8_1","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:03Z","timestamp":1759307043000},"page":"3-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptography and\u00a0Collective Power"],"prefix":"10.1007","author":[{"given":"Leah Namisa","family":"Rosenbloom","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"1_CR1","unstructured":"The TREE Lab: Examining technology, race, equity, and ethics in education (2024). https:\/\/tree.northwestern.edu\/"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M.: Obstacles to the adoption of secure communication tools. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 137\u2013153. IEEE (2017)","DOI":"10.1109\/SP.2017.65"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Ajmani, L.H., Bhatt, T., Devito, M.A.: Moving towards epistemic autonomy: a paradigm shift for centering participant knowledge. In: Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems, pp. 1\u201317 (2025)","DOI":"10.1145\/3706598.3714252"},{"key":"1_CR4","unstructured":"Albrecht, M.R., Blasco, J., Jensen, R.B., Marekov\u00e1, L.: Collective information security in large-scale urban protests: the case of Hong Kong. arXiv preprint arXiv:2105.14869 (2021)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-030-75539-3_16","volume-title":"Topics in Cryptology \u2013 CT-RSA 2021","author":"MR Albrecht","year":"2021","unstructured":"Albrecht, M.R., Blasco, J., Jensen, R.B., Marekov\u00e1, L.: Mesh messaging in large-scale protests: breaking bridgefy. In: Paterson, K.G. (ed.) CT-RSA 2021. LNCS, vol. 12704, pp. 375\u2013398. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75539-3_16"},{"key":"1_CR6","unstructured":"Alexander, M.: The New Jim Crow. The New Press (2011)"},{"issue":"11","key":"1_CR7","doi-asserted-by":"publisher","first-page":"2018","DOI":"10.1177\/0042098013505881","volume":"52","author":"N AlSayyad","year":"2015","unstructured":"AlSayyad, N., Guvenc, M.: Virtual uprisings: on the interaction of new social media, traditional media coverage and urban space during the \u2018Arab Spring\u2019. Urban Stud. 52(11), 2018\u20132034 (2015)","journal-title":"Urban Stud."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Aouragh, M., G\u00fcrses, S., Rocha, J., Snelting, F.: Fcj-196 let\u2019s first get things done! on division of labour and techno-political practices of delegation in times of crisis. Fibrecult. J. (26 2015: Entanglements\u2013Activism and Technology) (2015)","DOI":"10.15307\/fcj.26.196.2015"},{"issue":"3","key":"1_CR9","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1080\/07370008.2016.1181879","volume":"34","author":"M Bang","year":"2016","unstructured":"Bang, M., Vossoughi, S.: Participatory design research and educational justice: studying learning and relations within social change making. Cogn. Instr. 34(3), 173\u2013193 (2016)","journal-title":"Cogn. Instr."},{"issue":"3","key":"1_CR10","first-page":"823","volume":"4","author":"DA Bell","year":"1995","unstructured":"Bell, D.A.: Who\u2019s afraid of critical race theory. Univ. Illinois Law Rev. 4(3), 823\u2013846 (1995)","journal-title":"Univ. Illinois Law Rev."},{"key":"1_CR11","unstructured":"Benjamin, R.: Race After Technology: Abolitionist Tools for the New Jim Code. Polity Press (2019)"},{"key":"1_CR12","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv2h439xx","volume-title":"Viral Justice: How We Grow the World We Want","author":"R Benjamin","year":"2022","unstructured":"Benjamin, R.: Viral Justice: How We Grow the World We Want. Princeton University Press, Princeton (2022)"},{"key":"1_CR13","unstructured":"Black, E.: IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America\u2019s Most Powerful Corporation. Dialog Press (2012)"},{"key":"1_CR14","unstructured":"Our\u00a0Data Bodies. About (2024). https:\/\/www.odbproject.org\/about-us-2\/"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s12290-014-0296-4","volume":"13","author":"T Bohdanova","year":"2014","unstructured":"Bohdanova, T.: Unexpected revolution: the role of social media in Ukraine\u2019s euromaidan uprising. Eur. View 13(1), 133\u2013142 (2014)","journal-title":"Eur. View"},{"key":"1_CR16","unstructured":"Borradaile, G.: Defend Dissent. Oregon State University Corvallis (2021)"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Borradaile, G., Kretschmer, K., Gretes, M., LeClerc, A.: The motivated can encrypt (even with PGP). In: Proceedings on Privacy Enhancing Technologies (2021)","DOI":"10.2478\/popets-2021-0037"},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"272","DOI":"10.24908\/ss.v18i2.13920","volume":"18","author":"G Borradaile","year":"2020","unstructured":"Borradaile, G., Reeves, J.: Sousveillance capitalism. Surveill. Soc. 18(2), 272\u2013275 (2020)","journal-title":"Surveill. Soc."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Boyarin, D.: The No-State Solution: A Jewish Manifesto. Yale University Press (2023)","DOI":"10.12987\/9780300268416"},{"issue":"3","key":"1_CR20","first-page":"281","volume":"6","author":"J Boykoff","year":"2007","unstructured":"Boykoff, J.: Limiting dissent: the mechanisms of state repression in the USA. Soc. Mov. Stud. 6(3), 281\u2013310 (2007)","journal-title":"Soc. Mov. Stud."},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Browne, S.: Dark Matters: On the Surveillance of Blackness. Duke University Press (2015)","DOI":"10.1515\/9780822375302"},{"key":"1_CR22","unstructured":"Buolamwini, J., Gebru, T.: Gender shades: Intersectional accuracy disparities in commercial gender classification. In: Conference on Fairness, Accountability and Transparency, pp. 77\u201391. PMLR (2018)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44987-6_7"},{"key":"1_CR24","unstructured":"Cammarota, J., Fine, M.: Revolutionizing education. Youth Participatory (2008)"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/BFb0052229","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"R Canetti","year":"1997","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90\u2013104. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052229"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"C\u00e9saire, A.: Discourse on colonialism. In: Postcolonlsm, pp. 310\u2013339. Routledge (2023)","DOI":"10.4324\/9781003101406-19"},{"key":"1_CR27","unstructured":"Charmaz, K.: Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. Sage (2006)"},{"key":"1_CR28","unstructured":"Chator, A., Kamara, S., Qin, L., Rosenbloom, L.N.: Community-Driven Cryptography Seminar (2021\u20132023)"},{"key":"1_CR29","unstructured":"Chator, A., Kamara, S., Qin, L., Rosenbloom, L.N.: Re-Imagining Cryptography and Privacy (ReCAP) Workshop (2024\u20132025)"},{"key":"1_CR30","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston, MA (1983). https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_22"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"67","DOI":"10.2307\/3177999","volume":"14","author":"B Christian","year":"1988","unstructured":"Christian, B.: The race for theory. Feminist Stud. 14(1), 67\u201379 (1988)","journal-title":"Feminist Stud."},{"key":"1_CR33","unstructured":"Churchill, W., Wall, J.V.: The COINTELPRO papers. South End Press (1990)"},{"key":"1_CR34","unstructured":"Detroit Digital\u00a0Justice Coalition. About (2024). https:\/\/www.detroitdjc.org\/about-1"},{"issue":"2","key":"1_CR35","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1080\/15295036.2010.514934","volume":"28","author":"TM Coopman","year":"2011","unstructured":"Coopman, T.M.: Networks of dissent: emergent forms in media based collective action. Crit. Stud. Media Commun. 28(2), 153\u2013172 (2011)","journal-title":"Crit. Stud. Media Commun."},{"key":"1_CR36","doi-asserted-by":"crossref","unstructured":"Costanza-Chock, S.: Design Justice: Community-Led Practices to Build the Worlds We Need. The MIT Press (2020)","DOI":"10.7551\/mitpress\/12255.001.0001"},{"key":"1_CR37","doi-asserted-by":"crossref","unstructured":"Daffalla, A., Simko, L., Kohno, T., Bardas, A.G.: Defensive technology use by political activists during the Sudanese revolution. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 372\u2013390. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00055"},{"key":"1_CR38","unstructured":"Dalek, J., Winter, P., Dranka, A., Crete-Nishihata, M., Senft, A.: Asia chats: update on line, Kakaotalk, and FireChat in China. The Citizen Lab (2014)"},{"key":"1_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201987","author":"Y Desmedt","year":"1988","unstructured":"Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120\u2013127. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_8"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-57220-1_47","volume-title":"Advances in Cryptology \u2014 AUSCRYPT \u201992","author":"Y Desmedt","year":"1993","unstructured":"Desmedt, Y.: Threshold cryptosystems. In: Seberry, J., Zheng, Y. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 1\u201314. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-57220-1_47"},{"key":"1_CR41","unstructured":"Dingledine, R., Mathewson, N.: Anonymity loves company: usability and the network effect. In: WEIS. Citeseer (2006)"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Web, D.B.: Black Reconstruction in America, 1860\u20131880. In: Racism Essential Readings, pp. 27\u201334 (2001)","DOI":"10.4135\/9781446220986.n4"},{"issue":"4","key":"1_CR43","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1177\/0042085916628611","volume":"51","author":"MJ Dumas","year":"2016","unstructured":"Dumas, M.J., Ross, K.M.: \u201cBe Real Black for Me:\u2019\u2019 imagining BlackCrit in education. Urban Educ. 51(4), 415\u2013442 (2016)","journal-title":"Urban Educ."},{"key":"1_CR44","doi-asserted-by":"crossref","unstructured":"Earl, J., Kimport, K.: Digitally Enabled Social Change: Activism in the Internet Age. MIT Press (2011)","DOI":"10.7551\/mitpress\/9780262015103.001.0001"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Ermoshina, K., Halpin, H., Musiani, F.: Can johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols. In: European Workshop on Usable Security, pp. 1\u201313 (2017)","DOI":"10.14722\/eurousec.2017.23016"},{"key":"1_CR46","unstructured":"Escudero, D.: Criptolatino: a group that advocates for cryptography research made by\/for Latin-Americans (2022). https:\/\/youtu.be\/_qSja6VpPbQ?t=588"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Espejo, R.: Cybernetics of governance: the cybersyn project 1971\u20131973. In: Social Systems and Design, pp. 71\u201390 (2014)","DOI":"10.1007\/978-4-431-54478-4_3"},{"key":"1_CR48","unstructured":"Eubanks, V.: Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. St. Martin\u2019s Press (2018)"},{"key":"1_CR49","unstructured":"Data for Black\u00a0Lives. Index (2024). https:\/\/d4bl.org\/"},{"key":"1_CR50","unstructured":"Freire, P.: Pedagogy of the oppressed 30$$^{th}$$ anniversary edition. The Continuum International Publishing Group, 1970 (2005)"},{"key":"1_CR51","unstructured":"Freire, P.: Education: The Practice of Freedom (1976)"},{"issue":"CSCW1","key":"1_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392862","volume":"4","author":"S Ghoshal","year":"2020","unstructured":"Ghoshal, S., Mendhekar, R., Bruckman, A.: Toward a grassroots culture of technology practice. Proc. ACM Hum.-Comput. Interact. 4(CSCW1), 1\u201328 (2020)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"1_CR53","unstructured":"Gilmore, R.W.: Abolition Geography: Essays Towards Liberation. Verso Books (2022)"},{"key":"1_CR54","unstructured":"Gladwell, M.: Small change. New Yorker 4 (2010)"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201989","author":"CG G\u00fcnther","year":"1990","unstructured":"G\u00fcnther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29\u201337. Springer, Heidelberg (1990). https:\/\/doi.org\/10.1007\/3-540-46885-4_5"},{"issue":"4","key":"1_CR56","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1177\/0163443716643006","volume":"38","author":"S G\u00fcrses","year":"2016","unstructured":"G\u00fcrses, S., Kundnani, A., Hoboken, J.: Crypto and empire: the contradictions of counter-surveillance advocacy. Media Cult. Soc. 38(4), 576\u2013590 (2016)","journal-title":"Media Cult. Soc."},{"issue":"4","key":"1_CR57","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1111\/jcc4.12121","volume":"20","author":"G Haciyakupoglu","year":"2015","unstructured":"Haciyakupoglu, G., Zhang, W.: Social media and trust during the Gezi protests in Turkey. J. Comput.-Mediat. Commun. 20(4), 450\u2013466 (2015)","journal-title":"J. Comput.-Mediat. Commun."},{"key":"1_CR58","unstructured":"Hamer, F.L.: Speech Delivered at the Founding of the National Women\u2019s Political Caucus (1971)"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Hampton, L.M.: Black feminist musings on algorithmic oppression. In: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency (2021)","DOI":"10.1145\/3442188.3445929"},{"issue":"2","key":"1_CR60","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1177\/1461444811410408","volume":"14","author":"S Harlow","year":"2012","unstructured":"Harlow, S.: Social media and social movements: facebook and an online guatemalan justice movement that moved offline. New Media Soc. 14(2), 225\u2013243 (2012)","journal-title":"New Media Soc."},{"key":"1_CR61","unstructured":"Harmon, A.: Discussing Blackness on reddit? Photograph your forearm first. New York Times (2019)"},{"issue":"CSCW","key":"1_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359318","volume":"3","author":"C Harrington","year":"2019","unstructured":"Harrington, C., Erete, S., Piper, A.M.: Deconstructing community-based collaborative design: towards more equitable participatory design engagements. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201325 (2019)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"issue":"2","key":"1_CR63","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1080\/26884674.2022.2061392","volume":"3","author":"E Heh","year":"2022","unstructured":"Heh, E., Wainwright, J.: No privacy, no peace: urban surveillance and the movement for Black lives. J. Race Ethn. City 3(2), 121\u2013141 (2022)","journal-title":"J. Race Ethn. City"},{"key":"1_CR64","doi-asserted-by":"crossref","unstructured":"Hooks, B.: Teaching to Transgress: Education as the Practice of Freedom. Routledge (1994)","DOI":"10.3366\/para.1994.17.3.270"},{"key":"1_CR65","unstructured":"Hooks, B.: Feminist Theory: From Margin to Center. Pluto Press (2000)"},{"key":"1_CR66","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Duffy, A., Freelon, D., Hussain, M.M., Mari, W., Maziad, M.: Opening closed regimes: what was the role of social media during the Arab Spring? SSRN 2595096 (2011)","DOI":"10.2139\/ssrn.2595096"},{"key":"1_CR67","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Hussain, M.M.: Democracy\u2019s Fourth Wave?: Digital Media and the Arab Spring. Oxford University Press (2013)","DOI":"10.1093\/acprof:oso\/9780199936953.001.0001"},{"key":"1_CR68","unstructured":"Distributed AI\u00a0Resesarch Institute (2024). https:\/\/www.dair-institute.org\/about\/"},{"key":"1_CR69","unstructured":"Amnesty International. Automated apartheid: How facial recognition fragments, segregates and controls palestinians in the OPT (2023)"},{"issue":"4","key":"1_CR70","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1525\/irqr.2013.6.4.559","volume":"6","author":"J Iseke","year":"2013","unstructured":"Iseke, J.: Indigenous storytelling as research. Int. Rev. Qual. Res. 6(4), 559\u2013577 (2013)","journal-title":"Int. Rev. Qual. Res."},{"key":"1_CR71","unstructured":"Jenkin, T.: Talking with Vula. Mayibuye (1995)"},{"issue":"2","key":"1_CR72","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1353\/lib.2017.0033","volume":"66","author":"H Johnson","year":"2017","unstructured":"Johnson, H.: # nodapl: Social media, empowerment, and civic participation at Standing Rock. Libr. Trends 66(2), 155\u2013175 (2017)","journal-title":"Libr. Trends"},{"key":"1_CR73","doi-asserted-by":"crossref","unstructured":"Jois, T.M., Beck, G., Kaptchuk, G.: Pulsar: Secure steganography through diffusion models. Cryptol. ePrint Arch. (2023)","DOI":"10.1145\/3658644.3690218"},{"issue":"2","key":"1_CR74","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s42330-021-00158-2","volume":"21","author":"ST Jones","year":"2021","unstructured":"Jones, S.T., Melo, N.A.: We tell these stories to survive: towards abolition in computer science education. Can. J. Sci. Math. Technol. Educ. 21(2), 290\u2013308 (2021)","journal-title":"Can. J. Sci. Math. Technol. Educ."},{"key":"1_CR75","unstructured":"Kamara, S.: COINTELPRO. Algorithms for the People (2020)"},{"key":"1_CR76","unstructured":"Kamara, S.: Crypto for the people (2020). https:\/\/www.youtube.com\/watch?v=_qSja6VpPbQ"},{"key":"1_CR77","unstructured":"Kamara, S., Rosenbloom, L.N.: Cryptography for grassroots organizing. Real World Cryptography (2023). https:\/\/namisa.art\/files\/Cryptography_Grassroots_Organizing_RWC_2023_condensed_slides.pdf"},{"key":"1_CR78","unstructured":"Kamara, S., Rosenbloom, L.N.: Cryptography from roots to fruits. Advanced Cryptography School at Latincrypt 2023 (2023). https:\/\/namisa.art\/files\/Cryptography_Roots_Fruits_ASCrypto_2023_condensed_slides.pdf"},{"key":"1_CR79","unstructured":"Kamara, S., Rosenbloom, L.N.: Cryptography, the internet, and grassroots organizing. Internet Engineering Task Force 116 (2023). https:\/\/namisa.art\/files\/Cryptography_Internet_Grassroots_Organizing_IETF_116_condensed_slides.pdf"},{"key":"1_CR80","unstructured":"Kaptchuk, G., Benoit-Bryan, J., Albab, K.D., Locks, M., Varia, M.: The good, the bad, and the ugly\u2014lessons from an MPC for social good deployment. Talk given at RWC 2024 (2024). https:\/\/www.youtube.com\/watch?v=l-HrnrnB6dU"},{"key":"1_CR81","doi-asserted-by":"crossref","unstructured":"Kaptchuk, G., Jois, T.M., Green, M., Rubin, A.D.: Meteor: cryptographically secure steganography for realistic distributions. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1529\u20131548 (2021)","DOI":"10.1145\/3460120.3484550"},{"key":"1_CR82","unstructured":"Kara, S.: Cobalt red: How the blood of the Congo powers our lives. St. Martin\u2019s Press (2023)"},{"key":"1_CR83","unstructured":"Kennedy, M.: More than 1 million \u201ccheck in\u201d on Facebook to support the Standing Rock Sioux. NPR. org (2016)"},{"issue":"CSCW","key":"1_CR84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274357","volume":"2","author":"O Keyes","year":"2018","unstructured":"Keyes, O.: The misgendering machines: trans\/HCI implications of automatic gender recognition. Proc. ACM Hum.-Comput. Interact. 2(CSCW), 1\u201322 (2018)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"1_CR85","unstructured":"Keyes, O.: Counting the countless: why data science is a profound threat for queer people. Real Life 2 (2019)"},{"key":"1_CR86","unstructured":"King, M.L.: Letter from Birmingham City Jail (1963)"},{"key":"1_CR87","doi-asserted-by":"crossref","unstructured":"Kotturi, Y., Hui, J., Johnson, T.J., Dillahant, T.: Sustaining community-based research in computing: Lessons from two tech capacity building initiatives for local businesses (2024)","DOI":"10.1145\/3641017"},{"key":"1_CR88","unstructured":"Wells, I.B.: Just\u00a0Data Lab (2024). https:\/\/www.thejustdatalab.com\/about"},{"key":"1_CR89","unstructured":"Laura, C.T.: Being Bad: My Baby Brother and the School-to-Prison Pipeline. Teachers College Press (2014)"},{"key":"1_CR90","unstructured":"Algorithmic\u00a0Justice League (2024). https:\/\/www.ajl.org\/about"},{"key":"1_CR91","first-page":"20","volume":"14","author":"FLF Lee","year":"2020","unstructured":"Lee, F.L.F., Chan, M., Chen, H.T.: Social media and protest attitudes during movement abeyance: a study of Hong Kong university students. Int. J. Commun. 14, 20 (2020)","journal-title":"Int. J. Commun."},{"key":"1_CR92","unstructured":"Little, R., Qin, L., Varia, M.: Secure account recovery for a privacy-preserving web service. Cryptology ePrint Archive (2024)"},{"key":"1_CR93","unstructured":"Loewenstein, A.: The Palestine Laboratory: How Israel Exports the Technology of Occupation Around the World. Verso Books (2023)"},{"issue":"3","key":"1_CR94","doi-asserted-by":"publisher","first-page":"332","DOI":"10.24908\/ss.v16i3.6967","volume":"16","author":"T Lokot","year":"2018","unstructured":"Lokot, T.: Be safe or be seen? How Russian activists negotiate visibility and security in online resistance practices. Surveill. Soc. 16(3), 332\u2013346 (2018)","journal-title":"Surveill. Soc."},{"key":"1_CR95","unstructured":"Lorde, A.: The master\u2019s tools will never dismantle the master\u2019s house. The Personal and the Political Panel (1979)"},{"key":"1_CR96","unstructured":"Lorde, A.: Sister Outsider: Essays and Speeches. Crossing Press (1984)"},{"key":"1_CR97","unstructured":"Love, B.L.: We Want to Do More than Survive: Abolitionist Teaching and the Pursuit of Educational Freedom. Beacon Press (2019)"},{"key":"1_CR98","doi-asserted-by":"crossref","unstructured":"Lu, A.J., et al.: Shifting from surveillance-as-safety to safety-through-noticing: a photovoice study with eastside Detroit residents. In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, pp. 1\u201319 (2023)","DOI":"10.1145\/3544548.3581474"},{"key":"1_CR99","doi-asserted-by":"crossref","unstructured":"Luvison, E., Chatel, S., Sukaitis, J., Narbel, V.G., Troncoso, C., Lucks, W.: A low-cost privacy-preserving digital wallet for humanitarian aid distribution. In: 2025 IEEE Symposium on Security and Privacy (SP), pp. 1234\u20131250. IEEE (2025)","DOI":"10.1109\/SP61157.2025.00069"},{"issue":"1","key":"1_CR100","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1177\/1461444810365313","volume":"13","author":"AE Marwick","year":"2011","unstructured":"Marwick, A.E., Boyd, D.: I tweet honestly, I tweet passionately: twitter users, context collapse, and the imagined audience. New Media Soc. 13(1), 114\u2013133 (2011)","journal-title":"New Media Soc."},{"key":"1_CR101","first-page":"2015","volume":"27","author":"A Mateescu","year":"2015","unstructured":"Mateescu, A., Brunton, D., Rosenblat, A., Patton, D., Gold, Z., Boyd, D.: Social media surveillance and law enforcement. Data Civ. Rights 27, 2015\u20132027 (2015)","journal-title":"Data Civ. Rights"},{"key":"1_CR102","doi-asserted-by":"crossref","unstructured":"Morrison, L.P., Team, B., Nguyen, B., Kannan, S., Ray, N., Lewin, G.C.: Airchat: ad hoc network monitoring with drones. In: 2017 Systems and Information Engineering Design Symposium (SIEDS), pp. 38\u201343. IEEE (2017)","DOI":"10.1109\/SIEDS.2017.7937749"},{"issue":"4","key":"1_CR103","doi-asserted-by":"publisher","first-page":"205630511880791","DOI":"10.1177\/2056305118807911","volume":"4","author":"M Mundt","year":"2018","unstructured":"Mundt, M., Ross, K., Burnett, C.M.: Scaling social movements through social media: the case of black lives matter. Social Media+ Soc. 4(4), 2056305118807911 (2018)","journal-title":"Social Media+ Soc."},{"issue":"2","key":"1_CR104","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSP.2013.45","volume":"11","author":"A Narayanan","year":"2013","unstructured":"Narayanan, A.: What happened to the crypto dream?, part 1. IEEE Secur. Priv. 11(2), 75\u201376 (2013)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"1_CR105","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2013.75","volume":"11","author":"A Narayanan","year":"2013","unstructured":"Narayanan, A.: What happened to the crypto dream?, part 2. IEEE Secur. Priv. 11(3), 68\u201371 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"1_CR106","unstructured":"Neef, A.: Infrared aerial surveillance used at Standing Rock to monitor and track protesters (2019)"},{"issue":"5","key":"1_CR107","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1177\/1461444810380863","volume":"13","author":"RK Nielsen","year":"2011","unstructured":"Nielsen, R.K.: Mundane internet tools, mobilizing practices, and the coproduction of citizenship in political campaigns. New Media Soc. 13(5), 755\u2013771 (2011)","journal-title":"New Media Soc."},{"key":"1_CR108","unstructured":"Noble, S.U.: Algorithms of Oppression. New York University Press (2018)"},{"issue":"4","key":"1_CR109","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1080\/13613324.2019.1592837","volume":"22","author":"F Nxumalo","year":"2019","unstructured":"Nxumalo, F., Ross, K.M.: Envisioning Black space in environmental education for young children. Race Ethn. Educ. 22(4), 502\u2013524 (2019)","journal-title":"Race Ethn. Educ."},{"issue":"6","key":"1_CR110","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1080\/13504630.2017.1291092","volume":"23","author":"S Owen","year":"2017","unstructured":"Owen, S.: Monitoring social media and protest movements: ensuring political order through surveillance and surveillance discourse. Social Ident. 23(6), 688\u2013700 (2017)","journal-title":"Social Ident."},{"key":"1_CR111","unstructured":"O\u2019Sullivan, D., Byers, D.: Exclusive: fake black activist accounts linked to Russian government. CNN Bus. 28 (2017)"},{"key":"1_CR112","unstructured":"Pacey, A.: The Culture of Technology. MIT press (1985)"},{"key":"1_CR113","unstructured":"Pagnin, E., Celi, S., Takahashi, A.: On Creating a More Inclusive and Supporting Community (2023)"},{"key":"1_CR114","unstructured":"Parham, J.: Russians posing as Black activists on Facebook is more than fake news. Retr. August 22, 2018 (2017)"},{"key":"1_CR115","unstructured":"Pe\u00f1a, L.G.: Community as Rebellion: A Syllabus for Surviving Academia as a Woman of Color. Haymarket Books (2022)"},{"issue":"2","key":"1_CR116","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1080\/07370008.2018.1413530","volume":"36","author":"TM Philip","year":"2018","unstructured":"Philip, T.M., Bang, M., Jackson, K.: Articulating the \u201chow,\" the \u201cfor what,\" the \u201cfor whom,\" and the \u201cwith whom\" in concert: a call to broaden the benchmarks of our scholarship. Cogn. Instr. 36(2), 83\u201388 (2018)","journal-title":"Cogn. Instr."},{"key":"1_CR117","unstructured":"Qin, L., et al.: Deploying MPC for social good. Talk given at RWC 2019 (2019). https:\/\/www.acsu.buffalo.edu\/~mblanton\/cse410\/rwc2019-lucy-qin.pdf"},{"key":"1_CR118","unstructured":"Qin, L., Rosenbloom, L.N., Shrishak, K.: Where do threat models come from? Challenging implicit assumptions (2023). https:\/\/namisa.art\/Threat_Modeling_Mismatches_condensed_slides.pdf"},{"key":"1_CR119","doi-asserted-by":"crossref","unstructured":"Rajan, A., Qin, L., Archer, D.W., Boneh, D., Lepoint, T., Varia, M.: Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct. In: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, pp. 1\u20134 (2018)","DOI":"10.1145\/3209811.3212699"},{"key":"1_CR120","unstructured":"Rogaway, P.: The moral character of cryptographic work. Cryptology ePrint Archive (2015)"},{"key":"1_CR121","unstructured":"Roose, K.: Social media giants support racial justice: their products undermine it. The New York Times (2020)"},{"key":"1_CR122","unstructured":"Rosenbloom, L.N.: Confronting Eurocentrism in math history education. In: UTeach STEM Educators Conference (2021). https:\/\/namisa.art\/files\/Confronting_Eurocentrism_in_Math_History_Education_slides.pdf"},{"key":"1_CR123","unstructured":"Rosenbloom, L.N.: Toward secure social networks for activists. In: Moving Technology Ethics at the Forefront of Society, Organisations and Governments, pp. 491\u2013502. Universidad de La Rioja (2021)"},{"key":"1_CR124","unstructured":"Rosenbloom, L.N.: Activists Want Better, Safer Technology. arXiv preprint arXiv:2209.01273 (2022)"},{"key":"1_CR125","unstructured":"Rosenbloom, L.N.: Stickers on webcams (2022). https:\/\/namisa.art\/stickers_on_webcams.html"},{"key":"1_CR126","doi-asserted-by":"crossref","unstructured":"Rosenbloom, L.N.: A living framework for abolitionist teaching in computer science. In: Proceedings of the ACM Conference on Global Computing Education, vol. 1, pp. 133\u2013139 (2023)","DOI":"10.1145\/3576882.3617923"},{"key":"1_CR127","unstructured":"Rosenbloom, L.N.: Cryptography for grassroots organizing. Brown University (2024)"},{"issue":"3","key":"1_CR128","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3674504","volume":"31","author":"H Saksono","year":"2024","unstructured":"Saksono, H., Parker, A.G.: Socio-cognitive framework for personal informatics: a preliminary framework for socially-enabled health technologies. ACM Trans. Comput.-Hum. Interact. 31(3), 1\u201341 (2024)","journal-title":"ACM Trans. Comput.-Hum. Interact."},{"issue":"1","key":"1_CR129","first-page":"1","volume":"2","author":"A Sium","year":"2013","unstructured":"Sium, A., Ritskes, E.: Speaking truth to power: Indigenous storytelling as an act of living resistance. Decolonizat. Indigeneity Educ. Soc. 2(1), 1\u201310 (2013)","journal-title":"Decolonizat. Indigeneity Educ. Soc."},{"key":"1_CR130","doi-asserted-by":"crossref","unstructured":"Skoric, M.M., Poor, N.D., Liao, Y., Tang, S.W.H.: Online organization of an offline protest: from social to traditional media and back. In: 2011 44th Hawaii International Conference on System Sciences, pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/HICSS.2011.330"},{"issue":"1","key":"1_CR131","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1177\/107780040200800103","volume":"8","author":"DG Sol\u00f3rzano","year":"2002","unstructured":"Sol\u00f3rzano, D.G., Yosso, T.J.: Critical race methodology: counter-storytelling as an analytical framework for education research. Qual. Inquiry 8(1), 23\u201344 (2002)","journal-title":"Qual. Inquiry"},{"key":"1_CR132","doi-asserted-by":"crossref","unstructured":"Spade, D.: Normal Life: Administrative Violence, Critical Trans Politics, and the Limits of Law. Duke University Press (2015)","DOI":"10.2307\/j.ctv123x7qx"},{"key":"1_CR133","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11133-008-9107-z","volume":"31","author":"A Starr","year":"2008","unstructured":"Starr, A., Fernandez, L.A., Amster, R., Wood, L.J., Caro, M.J.: The impacts of state surveillance on political assembly and association: a socio-legal analysis. Qual. Sociol. 31, 251\u2013270 (2008)","journal-title":"Qual. Sociol."},{"key":"1_CR134","unstructured":"Strong, L., Das, A., Morales-Doyle, D.: Abolition science praxis (part 1) (2018). https:\/\/www.abolitionscience.org\/home\/2018\/11\/27\/abolition-science-praxis-pt-2-dr-danny-morales-doyle"},{"key":"1_CR135","unstructured":"Strong, L., Das, A., Robinson, R.P.: The history of abolition (2018). https:\/\/www.abolitionscience.org\/home\/2018\/9\/4\/historically-grounding-abolition"},{"issue":"8","key":"1_CR136","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1080\/1369118X.2015.1043744","volume":"18","author":"E Trer\u00e9","year":"2015","unstructured":"Trer\u00e9, E.: Reclaiming, proclaiming, and maintaining collective identity in the #yosoy132 movement in Mexico: an examination of digital frontstage and backstage activism through social media and instant messaging platforms. Inf. Commun. Soc. 18(8), 901\u2013915 (2015)","journal-title":"Inf. Commun. Soc."},{"key":"1_CR137","doi-asserted-by":"crossref","unstructured":"Trer\u00e9, E.: The banality of whatsapp: on the everyday politics of backstage activism in Mexico and Spain. First Monday 25 (2020)","DOI":"10.5210\/fm.v25i12.10404"},{"key":"1_CR138","unstructured":"Truth, S.: Ain\u2019t I a Woman? (1851)"},{"key":"1_CR139","doi-asserted-by":"crossref","unstructured":"Tuck, E., Yang, K.W.: Toward what justice. In: Describing Diverse Dreams of Justice in Education. Routledge, Abingdon (2018)","DOI":"10.4324\/9781351240932"},{"issue":"2","key":"1_CR140","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1111\/j.1460-2466.2012.01629.x","volume":"62","author":"Z Tufekci","year":"2012","unstructured":"Tufekci, Z., Wilson, C.: Social media and the decision to participate in political protest: observations from Tahrir Square. J. Commun. 62(2), 363\u2013379 (2012)","journal-title":"J. Commun."},{"issue":"7","key":"1_CR141","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1177\/0002764213479375","volume":"57","author":"S Valenzuela","year":"2013","unstructured":"Valenzuela, S.: Unpacking the use of social media for protest behavior: the roles of information, opinion expression, and activism. Am. Behav. Sci. 57(7), 920\u2013942 (2013)","journal-title":"Am. Behav. Sci."},{"key":"1_CR142","unstructured":"Venkatasubramanian, S., Gebru, T., Topcu, U., Griffin, H., Rosenbloom, L.N., Sonboli, N.: Community driven approaches to research in technology & society. In: CCC Workshop Report (2024)"},{"issue":"1","key":"1_CR143","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-030-15636-7_4","volume":"13","author":"M Vollstedt","year":"2019","unstructured":"Vollstedt, M., Rezat, S.: An introduction to grounded theory with a special focus on axial coding and the coding paradigm. Compend. Early Career Res. Math. Educ. 13(1), 81\u2013100 (2019)","journal-title":"Compend. Early Career Res. Math. Educ."},{"key":"1_CR144","doi-asserted-by":"crossref","unstructured":"Vossoughi, S., Vakil, S.: Toward what ends? A critical analysis of militarism, equity, and STEM education. In: Education at War, pp. 117\u2013140. Fordham University Press (2018)","DOI":"10.2307\/j.ctt2204pqp.9"},{"key":"1_CR145","doi-asserted-by":"crossref","unstructured":"Wade, K., Brubaker, J.R., Fiesler, C.: Protest privacy recommendations: an analysis of digital surveillance circumvention advice during Black Lives Matter protests. In: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems, pp. 1\u20136 (2021)","DOI":"10.1145\/3411763.3451749"},{"key":"1_CR146","doi-asserted-by":"crossref","unstructured":"Watson, H., Moju-Igbene, E., Kumari, A., Das, S.: \u201cWe hold each other accountable\u201d: unpacking how social groups approach cybersecurity and privacy together. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312 (2020)","DOI":"10.1145\/3313831.3376605"},{"key":"1_CR147","unstructured":"Wilkerson, I.: Caste: The Origins of Our Discontents. Random House (2020)"},{"key":"1_CR148","unstructured":"Yadav, T.K., Gosain, D., Seamons, K.: Cryptographic deniability: a multi-perspective study of user perceptions and expectations. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 3637\u20133654 (2023)"},{"key":"1_CR149","unstructured":"Zuberi, T.: Thicker Than Blood: How Racial Statistics Lie. University of Minnesota Press (2001)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06754-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:25:06Z","timestamp":1759307106000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06754-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032067531","9783032067548"],"references-count":149,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06754-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Medell\u00edn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ciencias.medellin.unal.edu.co\/eventos\/latincrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}