Preparing for Ethiopian Elections: Community Meeting Key Takeaways

On Wednesday, Localization Lab held a community call to discuss internet shutdowns and circumvention technology as it relates to Ethiopia and its coming elections. More than twenty participants attended, including activists, human rights defenders, journalists, trainers, tool developers, and internet freedom advocates. The one-hour call covered topics like which tools to bypass censorship are known and popular in Ethiopia, what barriers are keeping users from accessing the tools and resources they need, and which languages, tools, and resources should localization efforts be prioritizing, among others.

Key Takeaways:

  • There is an important difference between total shutdowns and partial shutdowns. At various times and in various places, Ethiopia has experienced both. Circumvention tools may be helpful during partial shutdowns, in which certain websites or apps are blocked or censored, but cannot help in total shutdowns when data connectivity itself is cut off. In supporting preparation for shutdowns and other censorship events, it’s important to provide tools and resources that can help in either scenario.

  • Internet shutdowns are not always predictable in Ethiopia, in that they do not only occur around elections or other scheduled political events. In 2020, there was a nationwide shutdown amidst protests following the shooting death of singer and activist Hachalu Hundessa. This underscores the need for wider preparation.

Challenges to Accessing and Using Tools

  • Many individuals simply aren’t aware of the applications and resources available to deal with censorship or throttling. One opportunity area is in training and spreading broader awareness, both among human rights defenders and journalists as well as the greater public, about what tools are available and how they may help.

  • With relatively low media and technical literacy rates, it is important to make sure technical terms and concepts are clearly explained - preferably using supporting images. As an example, terms like VPN should be broken down for average users; it should not be assumed that they will understand and be comfortable with terms.

  • The cost of data in Ethiopia is already relatively high, and when using a VPN, that cost is increased and individuals have no interest in staying online for extended periods.

Language Needs

  • Amharic, Afaan Oromoo, and Tigrinya are all languages that would be useful for localization. Somali is also widely spoken, and so should be included in localization efforts designed to support communities in Ethiopia.

  • Participants also shared very useful feedback about the ways that some tools and resources had already been localized. Many individuals have become accustomed to using applications in English out of necessity and as a result, sometimes translation of technical terminology into a local language can be unclear and confusing. Maintaining original English terms along with  translations, may be an effective approach when localizing documentation and educational materials.

Available Tools and Resources

  • As to which tools people prefer, one participant noted that, “People use what is accessible, not what is safe.” Psiphon, for example, is widely used in Ethiopia because it is easy to use, available on the app stores they trust, there is no trial period before being required to register the app, and it’s free.

VPNs

Guides

Afaan Oromoo:

Amharic:

Committee to Protect Journalists:

English:

Somali:

Committee to Protect Journalists:

Outreach and Information Sharing

  • Major media in Ethiopia tends to center around Addis Ababa, both in content and reach, especially print media. Outside of the capital, communities rely upon radio, television, and social media for information. There is especially a culture of sharing images via social media.

  • Participants also pointed to the emergence of blogging as a growing medium for news and commentary in all parts of Ethiopia. Many are under-resourced, and may be writing and editing their own blogs, maintaining their own websites, and relying upon their own photography, without the support of any staff or being fact-checked. Additionally, many bloggers do not know about internet freedom technologies that may help them in their work. This is another instance where training programs and education campaigns could be useful.

Next Steps:

Localization Lab will be reaching out to participants on the call and other partners working in Ethiopia to see how the information shared at the community meeting can be applied to making information and resources available for Ethiopian users prior to the elections in June.

We welcome additional input and feedback especially about:

  • Existing resources about censorship and shutdowns or using VPNs that you find very helpful that can be localized for users in Ethiopia or are already available in one or more language spoken in Ethiopia;

  • Mobile and desktop VPNs or other digital safety tools that work well in an Ethiopian context. If you are a digital security trainer, what tools are you recommending?;

  • Specific language needs that were not mentioned in the key takeaways; and

  • Key ways to distribute information about how to prepare for censorship and shutdowns. For example: specific influential bloggers to reach out to, popular Facebook groups, Twitter hashtags, popular Telegram channels etc.

If you would to be a part of collaboration on this project and are not already in touch with Localization Lab, please email us at info@localizationlab.org.

Building Resilience Ahead of the Next Internet Shutdown

By Collin Sullivan

Since the military coup in Myanmar on February 1st, we have shifted our priorities to focus on coordinating urgent localization efforts to support access to free and open internet and safe communication in Burmese and other local languages. This has meant working with contributors to localize tools requested by affected communities and local partners, which have experienced increased downloads and active users. These include tools like TunnelBear, a Virtual Private Network (VPN) that can help people access blocked content; Signal, a messenger that prioritizes privacy and security; and Briar, a messaging and publishing app designed to work without an internet connection; among others. 

Announcement for the release of TunnelBear for Android and iOS in Burmese.

Announcement for the release of TunnelBear for Android and iOS in Burmese.

We are very grateful for the rapid localization support we have received from several organizations and projects, allowing us to coordinate dedicated contributors to remove language barriers, making these tools accessible to millions more who could benefit from them. 

We also wish these urgent language needs had been addressed by projects before such a crisis hit.

A preparatory approach—one that prioritizes localization, accessibility, distribution and (if necessary) training prior to a crisis, instead of in response to one—needs to become the preeminent model for internet freedom tools. 

Shutdowns have become increasingly common, and circumvention tools commonly experience a spike in local interest as connectivity plummets. At Localization Lab, it is common to see a flood of new requests to make relevant apps available in local languages when a crisis breaks out, and for new contributors to join projects and work on those languages. 

Both are happening today in Myanmar. Within two days of the coup, Bridgefy, an app widely used by activists in Hong Kong during the protests in 2019 and 2020 to communicate via Bluetooth when internet connectivity was unavailable, was downloaded there more than a million times. After Facebook was blocked on February 4th, 2021, VPN usage in the country increased to more than seven times what it had been only days earlier. The Tor Browser saw a jump in interest and downloads, too, though usage dropped after various forums reported that military personnel were looking for people with the app installed on their devices.

Such was the case, too, in Belarus in August 2020, when internet access shrank to 20% of typical levels amid protests following a controversial presidential election. Psiphon, another proxy tool that we are localizing into Burmese, saw its adoption in Belarus escalate suddenly and dramatically, from around 10,000 users to more than a million in a single day.

Screenshot from Access Now’s #keepiton campaign website.

Screenshot from Access Now’s #keepiton campaign website.

One reason it was able to accommodate such a sudden spike in interest is that it is the only VPN provider available in Belarusian. As one Psiphon co-founder pointed out, "No one else is doing that."

Localized tools and guides need to be as diverse as the needs of the communities they are built to serve. Movements are dynamic and their needs and tactics shift according to which information is blocked and censored, and which circumvention tools are working. The more resources are available in local languages, the more tools they have available to choose from that fit their needs best–leading to stronger and more resilient movements and communities.

These preparatory models need not be imagined, only prioritized, expanded, and scaled. Internet shutdowns, to some degree, are predictable. For example, last August the Zaina Foundation hosted a localization sprint in Tanzania ahead of the upcoming elections there. Elections have become common trigger points for internet shutdowns, especially (but certainly not exclusively) in many parts of Africa and southeast Asia.

Psiphon Fact Sheet localized into Kiswahili at the Zaina Foundation and Arusha Women’s School of Internet Governance localization sprints.

Psiphon Fact Sheet localized into Kiswahili at the Zaina Foundation and Arusha Women’s School of Internet Governance localization sprints.

Anticipating a possible shutdown, Zaina Foundation and Localization Lab collaborated on a localization sprint where participants translated circumvention software, including Psiphon, so it would be available in Swahili, building upon the previous year’s work of localizing digital security guides. Just months later in another sprint organized with the Arusha Women School of Internet Governance (AruWSIG), contributors localized additional resources into Swahili, including a censorship circumvention guide.

As expected, internet connectivity was severely disrupted before and during the elections in Tanzania, and while the Tor network appeared to be blocked, Psiphon continued to work.

This need extends to written guides as well, which can be quite useful for preparation and self-training. And while there is a clear need for more localization (we are currently working with the Electronic Frontier Foundation to localize their widely-cited Surveillance Self Defense guides into Burmese), there is also a need for clear, concise, and specific guidance on how to prepare for an internet shutdown. An accessible, localizable, and widely available resource dedicated specifically to the common challenges and potential mitigations around internet shutdowns would serve many and support the preparatory model championed here.

But a shift like this will require more than a new guide, and will require all of our cooperation. It will take funders providing more resources to toolmakers and local organizations for long-term resiliency programs; developers writing their tools with multiple audiences and contexts in mind from the beginning; and training and support organizations building shared contextualized expertise with local communities around circumvention and resistance so plans to access information are established before the crisis hits. 

Most importantly, we can only expect a preparatory model to be effective if local partners and users are centered at every step. They know what tools and resources people need, how they use them, and the gaps that need to be addressed. Local partners are best positioned to develop the content that will work for their communities, and that can then be adapted to support regions experiencing similar challenges. Involving those communities should not be a box to be checked, but a central guiding tenet that shapes projects and partnerships.

We recognize, too, that there will always be a need for rapid response during crises. But by adopting a more preparatory approach, we shrink the number of challenges that require a rapid response when a crisis hits, so that funding and labor can be applied to different needs, ones that are now more urgent.

India Localization Sprint: Localizing Digital Safety for Indian Users

India L10n Sprint Banners.png

Early this summer The Bachchao Project contacted Localization Lab to propose a localization sprint (with the support of DataMeet and Random Hacks of Kindness) to address the language accessibility needs of users in India, particularly those of women and marginalized groups. With regular occurrences of online harassment, censorship, surveillance, internet throttling and all out shutdowns regularly occurring in India, The Bachchao Project selected a set of four tools to localize which would provide everyday users and human rights defenders alike with a basic digital security suite:

  • Safe Sisters (developed in Uganda by Defend Defenders and Internews for women and girls) was selected because it is one of few digital safety guides developed for women in the Global South, by women in the Global South. The guide was developed not only with a focus on the unique needs and concerns of internet users who are women, but also with an understanding of the different circumstances and constraints faced by users outside of Europe and North America.

  • Signal was chosen as an easy-to-use and already widely adopted messaging tool whose adoption could be increased through being made available in more local Indian languages (other than Hindi).

  • Psiphon was chosen as a secure and reliable circumvention tool which The Bachchao Project has successfully used in many environments (including low-bandwidth) in India and which is easy-to-use for new users.

  • Tella was selected as one of the only secure, open source and easy-to-use mobile documentation tools available. Human rights documenters in India are in need of an straight-forward tool that will allow them to document quickly from a mobile device and will work well through internet shutdowns and in low-bandwidth environments.

Often the assumption is that localization into Hindi or English will suffice for users across India. Most users do in fact access tech in Hindi or English, however neither is the first language of the majority of the population. While users are able to generally navigate mobile phones and desktops in a second language, they do not necessarily understand how these technologies work, the privacy and security risks associated with them, and tactics for accessing the open internet. To address this, the India Localization Sprint focused on localization into local languages other than Hindi, however not fully excluding it from the event.

While India and the rest of the world continue to struggle through a global health crisis, there is a need to collaborate, convene and build networks in safe ways. In order to achieve the lofty goals of localizing 4 digital security resources into a number of languages, The Bachchao Project and Localization Lab organized a virtual localization sprint to take place over the course of 2 weekends. The India Localization Sprint was hosted in 7-hour blocks with tool demos, localization discussion and collaboration as well as feedback and Q&A sessions with the developers and creators of the resources.

The sprint was widely advertised throughout November and received a total of 26 signups.  

The Sprint

The first weekend of the India Localization Sprint launched on the last weekend of November with localization of the Safe Sisters Digital Safety Guide for Women and Girls and Psiphon for Android.

_DSC5780.JPG

The first day of the event focused on the localization of Safe Sisters into Hindi, Marathi, Malayalam, Kannada, Konkani, Tamil, Manipuri and Assamese with a group of 13 attendees. Safe Sisters was highlighted for localization by The Bachchao Project (a techno-feminist collective serving women and gender minorities) because not only is it a guide developed by women for women, but it is one of the very few guides developed by women in the “Global South” and not form a European or North American perspective. The digital safety guide not only addresses women and girls and their unique digital safety needs, but originally developed for a Ugandan and East African audience, it keeps regional constraints in mind, many of which overlap with those faced by Indian users. 

Helen Nyinakiiza from Defend Defenders joined us from Kampala, Uganda to start the sprint with an introduction to Safe Sisters and an overview of the unique approach used to create the guide - engaging a group of about 10 regional collaborators to communally develop the resource. The attendees then read through the full Safe Sisters guide in small groups, keeping an eye out for elements of the guide that would need to be added/removed/changed to make it most relevant for Indian audiences. Once consensus was reached over any changes and the groups had reviewed and solidified translation of key terminology used throughout the guides, participants dove into translating the guides in small groups by language. By the end of the event the Safe Sisters Guide was fully translated into Marathi, and Malayalam, with Hindi, Kannada, Konkani, Tamil, Manipuri and Assamese translations still in progress.

Psiphon Fact Sheet

The second day of the sprint focused on localization of Psiphon for Android into Hindi, Marathi, Kannada and Malayalam with a group of 9 attendees. The event began with a presentation and Q&A with Keith McManamen of Psiphon who overviewed Psiphon, how it works and differs from other circumvention tools and most importantly, how Psiphon has been used in India in a period of increasing internet throttling and censorship. Psiphon was selected by The Bachchao Project for localization because a secure circumvention tool that is easy-to-use is essential in today’s India, a country which has had over 450 individual internet shutdown events in addition to long-term regional internet throttling. The Bachchao Project wanted a tool that would be usable and free for users in India, but would also be open source, not log identifying user information, and would actually work in India with differing regional internet connectivity. 

After a meaningful presentation and Q&A with Psiphon, the day’s participants spent an hour overviewing a long list of technical terminology used throughout the Psiphon application. Prior to localizing the Psiphon Android app itself, participants worked in small groups - using resources like the Microsoft Terminology, Fuel terminology and Localization Lab Glossaries - to ensure all of the technical terms were understood and had agreed upon translations. By the end of the day, Psiphon for Android had been fully translated into Hindi, Marathi, Kannada and Malayalam.

Learn more about Tella in the Localization Lab Ask Me Anything with the Horizontal Team.

Learn more about Tella in the Localization Lab Ask Me Anything with the Horizontal Team.

The second weekend of the India Localization Sprint focused on localization of Tella and Signal, both for Android.

Day one launched with an in-depth live demo of Tella from Raphael Mimoun of the Horizontal team (developers of Tella), sharing how Tella has been useful for defenders around the world. Tella has the capability of securely collecting and storing audio, video and forms for documentation and reporting. Raphael overviewed all of Tella’s features and then fielded questions from participants about how Tella would work in an Indian context. The Bachchao Project chose Tella because it is a useful documentation tool for defenders and journalists alike and participants were particularly pleased to hear about Tella’s icon “camouflage” feature and ability to work offline and with low-bandwidth. Raphael also shared more in-depth information about how form templates can be created using tools like KoBoToolbox in order to deploy surveys with Tella.

After the demo and Q&A, participants again reviewed the glossary to be sure that relevant technical terms were first understood and translated and then the group of 8 attendees dove into translation of Tella for Android into Hindi, Kannada, Marathi, Malayalam and Tamil. By the end of the event Tella was translated fully into Kannada, Malayalam and Tamil with translations into Marathi and Hindi in progress.  

The Last day of the India Localization Sprint was focused on Signal. Signal is a popular secure communication application used all over India and the Signal team has recently focused on translations into Indian Languages. The Bachchao Project wanted to support this effort further by updating and contributing to existing translations. As for other tools, the first goal for the Signal sprint was to review key technical terms and make sure that they were solidified in the glossary. Unlike with other projects which had no prior translations, the participants utilized features in the Transifex (the translation platform) to review existing translations and make sure the glossary was consistent with prior translations and highlight inconsistencies. Overall, 11 translators joined to contribute to Singal Android translations into Hindi, Kannada, Marathi, Malayalam and Tamil and by the end of the day, significant progress had been made updating the Android app across all of the languages with Malayalam and Tamil almost 100% updated.

To end the day and the India Localization Sprint, Riya from Signal Group joined the event to answer questions from the attendees about Signal Groups and other upcoming new features, and - maybe most importantly - Signal’s plans for increasing outreach and adoption of Signal in India.

The Outcomes

Progress Graph

Next Steps

After four days of collaboration contributors fully translated or made significant progress across all four projects, and we are now looking for volunteers to help us finish the effort. Are you interested in helping translate or review one of the following projects? Contact us!

Highlights from the Tella Ask Me Anything (AMA)

Tella ama.png

On October 27th Localization Lab hosted an Ask Me Anything (AMA) with the Horizontal team, developers of Tella, an open source mobile documentation tool.

The AMA was organized to give current and potential users as well as contributors to Tella localization an opportunity to learn more about the tool and ask any and all questions about how Tella works, use cases for the tool and how to support localization of the tool for individuals and organizations around the globe currently using the application for a myriad of documentation initiatives.

Below is a summary of the questions and answers shared at the event. Questions and answers have been edited and at times reframed to present them in a more organized, readable format.


What is Horizontal and what kinds of projects does the organization work on?

Horizontal was launched almost two years ago to do digital security work and does two things: 

  • Provide digital security training (workshops, coaching, etc); and 

  • Develop tools specifically for activists, organizers, and vulnerable communities. 

The organization’s tagline is "Leveraging technology for rights and justice" and its focus is specifically on those fighting for justice.

Horizontal is a small organization of seven staff distributed across the globe (North America, South America, North Africa, Europe, and Southeast Asia). The organization was named Horizontal because they hope to work as horizontally as possible, away from the traditional hierarchical models that companies or NGOs usually rely on. Part of the reason the organization staff is distributed is to be as close as possible to the communities they want to work with. 

Tella Overview and Features

What is Tella and how does it compare to other documentation tools for mobile devices and desktop?

Tella is a mobile app, currently exclusively on Android (with the hope of developing for iOS soon). Tella is designed for activist groups, movements, journalists, or any civil society organization that is collecting data or documenting human rights in challenging environments where there is a high risk of repression or barriers to internet connectivity. “Collecting data" can be taking photos or videos, recording audio, or filling out forms and surveys.

The objectives with Tella are threefold:

  1. Protect people who collect data from physical repression.

  2. Protect the data itself from being tampered with or destroyed.

  3. Make it as easy as possible for groups to collect high quality data

Tella addresses the above with with several key features:

  • All data in Tella is encrypted, meaning that without the user's security pattern, there is no way of accessing that data. If you have videos in the Tella gallery, those videos are not accessible from the phone's regular gallery or file system. Users can record audio directly within the app using a voice recorder and take photos and videos using a camera in Tella, or they can import files into the app from their phone's gallery.

  • The app itself can be disguised. You can change the app name and icon so that it's called "Calculator" or "EasyMath" or "Weather". This is not perfect, because if someone does open the "Calculator", they'll see that it's not an actual calculator. Tella also remains visible in the Android settings. This is a basic layer of protection, but for most of Tella’s users it's proved sufficient.

  • Tella supports customizable forms. If users work with an organization, they can fill out their organization's forms directly within the app. For example, an organization may ask specific questions on the type of violations the user witnessed, the perpetrators of the violations, etc. Users receive the forms in Tella, fill them out (online or offline), and can send them back to the organization within the app. Their organization can access all the data in an organizational repository that they set up.

  • Tella has "Verification Mode". In verification mode, Tella collects a whole bunch of verification information (metadata) when the user takes a photo/video/audio, to make it easy for others to verify the origin of the file.

How does Tella work in low bandwidth environments?

The main thing Tella offers to accommodate low-bandwidth and no-bandwidth environments is "Offline Mode". When connected to the internet, you download your forms, and then activate Offline Mode. When it's activated, rather than trying to send forms, they will be saved locally in Tella. When the user can deactivate Offline Mode (when they have internet access again) they can then send any stored forms. You can fill out 2, 20, or 200 forms while offline and they'll all be saved until you reach an internet connection.

In low-bandwidth environments, you can also choose to only send completed forms, without any multimedia file attachments. Any audio, video or photo attachments which are much heavier, can be sent later. Forms are usually super light and can be sent even if the internet is bad. The user simply needs to uncheck the attachments when sending a form, and then return to the form later to send the attachments when there is a stronger internet connection. 

Lastly, starting with Tella v1.7, which is about to be released, users will be able to record videos in lower resolution to save space on their device and also to have lighter files that can be sent with poor internet. In the future, Horizontal would like to offer the option to reduce the resolution as the user is sending the file, even if it's a high-resolution video.

Home Screenshot_20201019-120913_Tella.jpg
Data collection - Screenshot_20201019-154058_Tella.jpg
Camera Screenshot_20201019-121014_Tella.jpg

When installing Tella for the first time, the app requests many device permissions and the user is unable to continue without accepting them all. What is Tella’s privacy policy and why are so many permissions requested by the application? 

Tella’s new privacy policy page is available at https://tella-app.org/privacy for anyone to review.

The permissions requirements were a mistake made on the Horizontal side. They thought that it would be better for users to be asked to give permissions for all Tella features during the installation process so that when in an urgent situation, they are able to use all the features immediately without any delays or pop-ups asking for permission. 

Horizontal recognizes that this is not ideal for all users and several have already  mentioned that this is a concern. The Horizontal team is going to try to address the issue in v1.7 or very soon in v1.8.

What data collection standards is Tella compatible with?

Tella is compatible with the Open Data Kit (ODK) data collection standard. There are many tools that are compatible with ODK that allow you to create and fill out forms. One such tool is KoBoToolbox, which is the one a lot of Tella partners use because it's free and open-source. Because Tella is compatible with ODK, in theory it should work with any other ODK compatible tool for creating form templates.

For election monitoring projects, is Tella compatible with Election Monitoring (ELMO)?

ELMO is ODK compatible and so should be compatible with Tella. The forms a user creates on ELMO could be filled out and sent back to an organizational or personal repository, and users should then be able to store an organize all of the data in ELMO.

Does Horizontal offer customizable form templates for users who are just getting started using Tella?

Horizontal currently doesn’t offer customizable form templates, however they usually work directly with users to help them create their forms and set up the data collection infrastructure.

When data is uploaded from Tella, how is it stored? What is the backend service & infrastructure the organization uses?

There are two options for the back-end:

  1. Use any ODK-compatible tool, like KoBoToolbox. You can either use the public server provided by the development team (that is hosted at the Harvard Humanitarian Initiative), or install your own instance. Horizontal helps partners who work with sensitive data install and manage their own instance.

  2. Horizontal is releasing something called Direct Upload. There is no web app or GUI yet, but it's a simple server-side software to receive files from Tella users. All Tella users need to do is connect to the server in the Tella settings, and then they can quickly upload media files. They can also set up "auto-upload" so that files are immediately uploaded as soon as they are taken, and "auto-delete" so that the files are deleted from their phone as soon as they are uploaded. This is new and not battle-tested yet and is going through a security audit at this very moment.

Is the data encrypted via the app or by default. If by default, are the keys stored locally?

Data is encrypted by the application, and the key is derived and not saved.

Tella currently lets users create a pattern lock to lock the app. Are there any plans to allow biometrics or passphrases to lock the app?

Yes, the next version of Tella will offer PIN, pattern, and passphrase locks. The team is still weighing whether or not to offer biometric locks.

How is the Tella audio recording feature often used?

It's used a lot by journalists who interview people and want to protect the interview when they travel through checkpoints and borders.

Does the audio recording show the peak sound and have the ability to store in various formats?

Unfortunately, Tella doesn’t have have sound peaking. Horizontal really wants to do it but hasn’t found a good library to implement it.

Tella also doesn’t support a variety of formats. The format the app uses is: AAC (ADTS), 44100Hz, mono, 32000b. The app does not do any audio processing or visualizing however the development team is planning to do so in coming versions of the app.

Are there any filters available to deal with background noise while recording?

There is no filter for background noise.

How are the accessibility features in Tella? 

Currently the accessibility features are not good. Other than Horizontal’s continuous efforts to make the Tella as easy to use as possible, including for people with little or no tech literacy, they don't have any accessibility features.

Tella in Action on the Ground

What are some of the main Tella use cases?

Tella is deployed in about a dozen countries that Horizontal knows of. There is a really wide range of use cases for Tella: sometimes Tella is used simply as a vault on the user's device, to hide and protect photos and videos; more often, it's used to collect data in a structured way (for election monitoring, or human rights documentation, etc).

Are there any use cases from the MENA region?

Horizontal doesn’t know of any active deployments in the MENA region, however they have heard recently that local digital security trainers were training people on Tella to protect their files. 

Tella has also had a few dozen downloads recently from "Israel/Palestine". Horizontal doesn’t know who is using the app there, however they assume it's Palestinian rights defenders. When there are a few dozen downloads at a time, it's usually an organization.

Are there organizations or activists using Tella in Brazil? If so, what is the use case there?

Horizontal has partners who work with indigenous communities, mainly in the state of Bahia, who use Tella to document attacks against defenders and land rights violations.

How is Tella being used in Indonesia?

In Indonesia, Tella is used mainly to document during protests. Excessive force by security forces, assault of journalists, and confiscation and destruction of mobile devices have increased especially with the ongoing protests against Omnibus Law.

Tella has also been tested out at digital security convenings in Southeast Asia as a potential tool to use to document what is currently happening in Thailand, Indonesia and Myanmar.

How does Horizontal measure the impact of Tella?

Horizontal works closely with many groups deploying Tella measures impact based on how happy those users are. There are groups who have kept using Tella for 2+ years, so the assumption is that it works for them. The Horizontal team is also in touch with those groups, or with organizations that support those groups, to hear about feature needs and improvement suggestions. 

Tella actually has a relatively low number of users - about one thousand right now. However more and more organizations are deploying it, and reusing it for different projects after initial projects used Tella successfully.

Tella Language Access and Localization

In addition to Bahasa Indonesia, Portuguese (Brazil) and Spanish to support ongoing documentation work in Indonesia, Brazil, Nicaragua and Cuba, what other ongoing projects require language support?

Horizontal has had some projects, particularly on election monitoring, in Russian-speaking countries so keeping the app updated in Russian is a high priority. 

French is in use and needed in Sub-Saharan Africa, where some digital security trainers suggest Tella as a tool, particularly for journalists.

Horizontal has heard from friends and partners around the MENA region that they would like Tella available in Arabic.

What are Tella’s current localization needs?

For Tella’s upcoming 1.7 release, translation and review are needed by November 1st!

The languages in need of translation and review support for ongoing projects include: Arabic, Bahasa Indonesia, Belarusian, French, Portuguese (Brazil), Russian, Spanish

Tella is currently localized on a translation platform called Lokalise, not in the Localization Lab Hub on Transifex. For more details on how to  contribute to Tella localization, take a look at the Localization Lab wiki.

Get in Touch!

You can contact Raphael from the Horizontal team at raphael@hzontal.org with more questions, if you need support deploying Tella, or if you have feature requests. 

You can also join the Tella Team on Horizontal's Mattermost.

Horizontal is starting to work on Tella 2.0 next week, so if you have requests for features, or major improvements you want to see, even pie-in-the-sky ideas, now is a good time to share!

Localizing Internet Circumvention Resources ahead of Tanzania’s Election

The class of AruWSIG 2020 fellows.

The class of AruWSIG 2020 fellows.

“…localization helps bridge gaps that exist in the technical world, by making tools and information accessible in one's own language.”

By Rebecca Ryakitimbo

Tanzania moves into elections this coming October and as is the case in most african countries, the fear of Internet throttling, shutdowns and blockage of websites and/or apps is real.

Localization Lab has been supporting the Arusha Women School of Internet Governance (AruWSIG) since its very first edition in 2018 and each edition content was localized to Swahili language. During the second edition of AruWSIG, the internews Safe Sisters guide to digital security was translated to Swahili language.This was facilitated by Zaituni Njovu and Erin McConnell through a one day localization sprint. The sprint did not only lead participants to understand more about localization, but it also provided them insights on digital security.

With an upcoming election, there is so much uncertainty especially as it pertains to information controls. It was thus necessary to localize circumvention tools in the likely event that an Internet shutdown happens. This will be crucial in ensuring there is uninterrupted flow of information among the citizenry before, during, and after the election.

Screen Shot 2020-10-06 at 14.19.46.png
Day OneDSC_0013-2.jpg

African elections have been synonymous with Internet shutdowns, with governments terming them as “necessary in the interest of national security”. Should there be a shutdown, journalists (majority of whom were this year’s fellows) should be able to circumvent netblocks. The same case applies for the lawyers, techies and activists that formed part of the AruWSIG’s 3rd edition.

To ensure continued engagement the fellows have access to repositories with these tools, in order to share them with others that may find them useful. However in ensuring that these tools are taken up beyond the AruWSIG, the fellows have organized themselves into a working group that will make plans on how they make use of skills and knowledge gained from the school to complement their work and sensitize their different communities on the same.

Psiphon, an open source circumvention tool, was the focus of the AruWSIG localization sprint in 2020 as well as a localization sprint held in Dar es Salam one month prior.

Psiphon, an open source circumvention tool, was the focus of the AruWSIG localization sprint in 2020 as well as a localization sprint held in Dar es Salam one month prior.

Psiphon Fact Sheet.png

This year's fellows were carefully selected to ensure passionate and determined minds are recruited, this was in effort to ensure that knowledge gained extends beyond the AruWSIG. Majority are journalists and find the importance of having free flow of information during crucial times like the election period.

Holding a localization sprint was the right kind of event to do rather than localization through volunteers because not only did it engage the participants of the sprint to gain new knowledge but the ability to be in a space where in that moment they can personalize and comprehend the essence of what they are doing. Being able to commune and work collaboratively to localize creates a sense of “connection” and learning at the same time.

This year’s localization sprint built on the foundation laid at last year’s sprint where participants translated basic digital security guides. Building up from having digital security knowledge and content in Swahili language, this year’s sprint applied localization efforts to tools and a detailed circumvention guide that can enable access despite blockages. Both sprints helped prepare a group of fellows who will go out there with not only knowledge on how to protect themselves, but also on how they can maintain free flow of information in the face of challenging election times.

 An alumni mailing list and WhatsApp group were formed where interactions continue post the AruWSIG. With Louis (a former AruWSIG19 fellow) leading the AruWSIG localization sprint, we hope to host events where he can keep mentoring others to contribute to the work already being done. Ensuring these efforts are a continued process that engages different groups of communities.

The Psiphon app, in Swahili

The Psiphon app, in Swahili

The Psiphon Settings in Swahili.

The Psiphon Settings in Swahili.

When asked to describe what she took away from the sprint, Jenine, one of the fellows, said, “localization helps bridge gaps that exist in the technical world, by making tools and information accessible in one's own language”. Not only do we hope that these tools will play their role in ensuring everyone has access to exercise their constitutional rights during elections, but we believe that localization is the right link to connect the dots between access to information and enjoyment of Internet freedoms.

Day OneDSC_0012-2.jpg

Localizing Psiphon for the 2020 Tanzanian Elections

June 22nd, 2020. Ramada Resort, Dar es salaam.

June 22nd, 2020. Ramada Resort, Dar es salaam.

By Zaituni Njovu

Civic space is the cornerstone of a democratic society. An open civic space allows citizen journalists and human rights defenders to organize, participate and communicate without arbitrary interference. The phenomenon of ‘closing’ civic space is characterized by a prevalent trend of repressive laws and practices “designed to prevent organizations and people from organizing, speaking out their opinions, seeking accountability and transparency, engaging in democratic rights, and enjoying their rights.” (Anton Mavunge, Localization Sprint Attendee)

In Tanzania, surveillance and censorship have increased under the current administration and the deterioration of human rights has been reported frequently by international and local organizations. In recent years human rights defenders in Tanzania have gone missing and some human rights organizations have even had their advocacy activities suspended by the government. Freedom in the civic space is shrinking within Tanzania’s borders, and as Tanzania heads toward elections in October of this year, surveillance and censorship are expected to increase even more.

Psiphon, as a circumvention tool, aids journalists, activists and other human rights defenders in the face of deteriorating human and digital rights by allowing them to access the open internet and promote freedom of expression online. This is even more essential around an election period.

To ensure that Tanzanians (and the millions of Swahilli speakers across Sub-Saharan Africa) have access to circumvention options in preparation for the elections, Ziana Foundation with the support of Localization Lab hosted a full day localization sprint to localize the Psiphon mobile and desktop applications into Swahili.

Localizing Psiphon for Swahili Speakers

On June 22nd, 2020 Zaina Foundation, Localization Lab, Wikipedia Tanzania and several other stakeholders attended a day-long localization sprint to localize Psiphon for a Tanzanian context. The sprint included ten Tanzanians participants, five of whom were female and 5 male. The team worked for nine hours and in addition to localizing Psiphon, the participants also downloaded, installed and tested Psiphon on their own devices to share collected feedback with the Psiphon team.

Screen Shot 2020-08-19 at 17.02.58.png

In the morning participants enjoyed a virtual presentation from Localization Lab’s Localization Program Manager, Erin McConnell, who shared that “Localization Lab is more a community than an NGO,” with over 7,000 volunteers world-wide who localize over 50 open source internet freedom projects into 200 languages and regional dialects. Localization is not just about increasing access for non-English speakers, it is a path toward decolonizing and diversifying the internet.

Screen Shot 2020-08-19 at 17.03.10.png

In the afternoon, after the sprint participants had translated roughly 1,650 words of the Psiphon mobile and desktop interfaces, Localization Lab and Psiphon joined for another virtual meeting to close out the event. Participants learned more about Psiphon and how it works to bypass censorship and differs from other circumvention tools. They were also able to ask questions and share user feedback from earlier in the day. Participants were particularly interested to learn how Psiphon differs from basic VPNs and were pleased that it does not record or backup user data.

Screen Shot 2020-08-19 at 17.02.50.png

The Way Forward

At the end of sprint participants had translated roughly 30% of the Psiphon Android interface, with 50% more needed to reach the threshold for release. To follow up with the translations and ensure that they would be finished well before the elections participants discussed and organized strategies for remote contribution so that Psiphon across all platforms would be available for release in August. Zaina Foundation also planned a smaller mini localization sprint for mid-August to reach the translation goal.

Post-Event Updates:

Not only is Psiphon for Android ready to deploy in Swahili, but Psiphon for desktop and for iOS are also set to be released before the end of August. At the 2020 Arusha Women’s School of Internet Governance convening in September, attendees at a Localization Lab sponsored localization sprint will review the Swahili translations of the Psiphon website and focus on localizing Psiphon and circumvention educational and outreach materials.

Screen Shot 2020-08-19 at 17.02.38.png

Пратэсты ў Беларусі: бяспечныя паведамленні, абыход цэнзуры і бяспека вашых дадзеных

Secure Messaging, ,Circumventing Censorship, and Keeping your Data Secure at Protests (2).png

English

Для даведкі

9 жніўня ў Беларусі прайшлі выбары прэзідэнта. Аляксандр Лукашэнка абвясціў сябе пераможцам, але шмат хто аспрэчвае такія вынікі. Тысячы пратэстоўцаў патрабуюць сумленных выбараў і заклікаюць Лукашнку сысці ў адстаўку, паколькі ён абапіраецца гвалт з боку сілавікоў, жорсткія рэпрэсіі супраць пратэстоўцаў і незаконнае затрыманне журналістаў. У чаканні ўзмацнення хвалі пратэстаў з 9 жніўня 2020 году адключылі інтэрнэт-сувязь. [1] Улады заяўляюць, што прычына адключэння - кібератакі, аднак найбольш верагодна, што адключэнне інтэрнэт-сувязі ініцыявалі самі ўлады.

Што адбываецца

  • Паводле NetBlocks, "выкарыстоўвалася стратэгія блакавання, якая пачалася з так званай глыбокай праверкі пакетаў, што дазваляе цэнзару фільтраваць вэб-трафік і блакаваць доступ да пэўных сайтаў". Выглядае, што перабоі ўзнікалі ў сувязі з блакіроўкай усёй сеткі, а не ў выніку фільтрацыі  сістэмы на прыкладным узроўні. Блакіроўка тычылася VPN. [2]

  • Напярэдадні выбараў «дзве дзяржаўныя кампаніі, якія маюць манаполію на ўвесь доступ да сеткі інтэрнэт ў Беларусі, пачалі закрываць да 80% прапускной здольнасці OPv6, пратаколу, які накіроўвае інтэрнэт-трафік». [3]

  • Адключэнні прыкладнога ўзроўню часткова адбываюцца з-за фільтрацыі ключавых слоў DPI4.

Рэсурсы для бяспечнага доступу да інтэрнэт-паслуг на рускай мове

Беларуская мова пазначаецца пры наяўнасці.

 *Ці хочаце дапамагчы зрабіць больш тэхналогій і рэсурсаў даступнымі на беларускай або рускай мовах? Наведайце сайт Localization Lab wiki, там ёсць праекты для свабоднага карыстання інтэрнэтам з адкрытым зыходным кодам, якія мы падтрымліваем, і далучайцеся да супольнасці нашых валанцёраў.*

Адукацыйныя рэсурсы і парады

  • Umbrella App (адукацыйны рэсурс для Android і iOS з парадамі і рэкамендацыямі па фізічнай і лічбавай бяспецы)

  • Парады і рэкамендацыі як абысці цэнзуру

    *Удакладненне: гэта спасылка на асновы лічбавай бяспекі, распрацаваныя і шырока ўжываныя беларусамі, гэта не наш праект, і мы не можам праверыць ці пацвердзіць дадзеныя парады. Гэта кіраўніцтва звязанае з Telegram, які не з'яўляецца адным з тых месенджараў, якія мы падтрымліваем.

Інструменты абыходу цэнзуры для доступу да цэнзураванага кантэнту

  • Tor Browser - вэб-браўзер, які абыходзіць інтэрнэт-цэнзуру і ананімны вэб-трафік з дапамогай сеткі Tor. Ён абараняе карыстальніка, шыфруючы трафік праз тры ўзроўні і хаваючы IP-адрас.

  • Tor Tips (даступныя на беларускай мове)

  • Psiphon (даступны на беларускай мове)

Адпраўка / пампаванне файлаў

  • SecureDrop (маршрутызацыя камунікацыі / бяспечная адпраўка файлаў)

  • OnionShare (магчымасць ананімна дзяліцца / спампоўваць файлы)

Месенджары (поўнае скразное шыфраванне)

  • Signal (прапануе знікаючыя паведамленні і абарону паролем)

  • Wire (прапануе знікаючыя паведамленні і абарону паролем)

  • Briar (не завязаны на цэнтральны сервер, сінхранізацыя праз Bluetooth/ WiFi/Інтэрнэт)

  • Matrix (інтэрнет-тэлефанія, дэцэнтралізаванае сховішча размоваў)


Спасылкі

[1] https://netblocks.org/reports/internet-disruption-hits-belarus-on-election-day-YAE2jKB3

[2] https://www.wired.com/story/belarus-internet-outage-election/

[3] https://www.ft.com/content/3466da92-946e-4d29-81b3-e96ba599a63e

[4] https://netblocks.org/reports/internet-disruption-hits-belarus-on-election-day-YAE2jKB3

Protesting in Belarus: Secure Messaging, Circumventing Censorship, and Keeping Your Data Secure

Secure Messaging, ,Circumventing Censorship, and Keeping your Data Secure at Protests (1).png

Belarusian

Background

On August 9th, Belarus’ President Alexander Lukashenko claimed victory in a disputed election. Thousands of protesters have been demanding a fair election and urging the President to step down as he supports police brutality, violent crackdowns on protests, and unlawful detention of journalists. As social unrest ensues, internet connectivity and cellular service have been down since August 9, 2020.[1] Although the government blames cyberattacks, it appears that these outages are government imposed.  

What is happening 

  • According to NetBlocks, the “blocking strategy being used started with so-called deep-packet inspection, which allows a censor to filter web traffic and block access to specific sites.” The outages seem to be a “brute-force blocking strategy at the network layer, rather than a more refined filtering system at the application layer. The blackout included VPNs.[2]

  • Eve of the election, “the two state-owned companies that share a monopoly on all access to the global web in Belarus began shutting down up to 80% of bandwidth on OPv6, the protocol that routes internet traffic”[3]

  • Application layer outages are in part due to DPI keyword filtering [4]

Resources available in Russian for safe access to Internet services 

Belarusian is indicated when available.

*Do you want to help make more technology and resources available in Belarusian or Russian? Visit the Localization Lab wiki to browse the open source internet freedom projects that we support and join our community of dedicated volunteers.*

Educational Resources and Tips

*Disclaimer: This is a link to digital security basics created by locals in Belrussian and widely shared, but it’s not one of our projects and we can’t verify or confirm this advice. This guide is linked to Telegram, which is not one of the messaging apps we support.

Circumvention Tools to Access Censored Content

  • Tor Browser - Web browser that circumvents online censorship and anonymizes web traffic using the Tor network. It protects the user’s identity by encrypting traffic through three layers and hides the IP address.

  • Tor Tips (available in Belarussian)

  • Psiphon (available in Belarussian)

Sending/Downloading Files 

Messaging (All end-to-end encryption)

  • Signal (Offers disappearing messages and password protection)

  • Wire (Offers disappearing messages and password protection)

  • Briar (does not rely on central server, sync via Bluetooth/WiFi/Internet)

  • Matrix (VoIP, decentralized conversation store)

Citations

[1] https://netblocks.org/reports/internet-disruption-hits-belarus-on-election-day-YAE2jKB3

[2] https://www.wired.com/story/belarus-internet-outage-election/

[3] https://www.ft.com/content/3466da92-946e-4d29-81b3-e96ba599a63e

[4] https://netblocks.org/reports/internet-disruption-hits-belarus-on-election-day-YAE2jKB3

It Starts with Words: Unconscious Bias in Gender, Race, and Class in Tech Terminology

By Angeline Lee

In this moment, when we are reimagining our systems during calls to end racial structural violence and during a devastating pandemic, it’s important that we start with reforming language, replacing terms that exclude and reinforce oppression in our systems. Translating technical terms from English to other languages includes running the risk of unintentionally and unconsciously imposing Western values and constructs of gender, race, and individualism through technology. Terms like “whitelist/blacklist” and the “master/slave” programming command carry the weight of systemic issues deeply rooted in society. When these terms are localized into other communities, the values associated with them could be transferred into other cultures with different ideas of race and gender1. Though the intent may not be to reinforce existing stereotypes and inequality, the effect is proven in the lack of inclusive language for a spectrum of users.

Translating terms with sexual innuendos perpetuate ideas of sex and gender, often in a binary bias. Sexist terms “preserve the ways in which casual use of English serves to uphold maleness as the norm and femaleness as the exception.”2 Male domination, especially in decision making roles within the tech industry is evident by the exclusionary language used. By reinforcing sexist terminology, “gendered language performs some of the work of exclusion by reinforcing the message that female programmers are exceptions.”3 In order to systematically change tech culture and reach true inclusivity, language must also shift and reflect equitable values.

As we work in partnerships with marginalized groups, it is crucial that we are transparent about the problematic and at times violent histories of these terms; that we do not unconsciously pass on and perpetuate harmful ideology. For example, during our Localization Sprint in Thailand, participants collaboratively pushed back on existing constructs, intentionally careful in their methodology of language adoption. When technical terms are localized and translated, ideas are consequently transferred over, preserving or even promoting ideals of race, class, and gender onto other cultures without a clear understanding of possible harm. Language has the power to manipulate and change rhetoric, and it is our responsibility to acknowledge these problematic terms, change the narrative, and combat digital colonialism.

The tech industry is notoriously known as a heteronormative, white, male-dominated space; a bubble of intergenerational wealth, patriarchy, and privilege. The language and technical terms used in the tech industry are a reflection of those who are represented, hold the power, and control discourse. This exclusive fortress of power can create a hostile and uninviting environment for those who do not subscribe to, or identify with the norm; denying entry for diversity and inclusion based on colonial lines.

This article examines the technical terms used in cybersecurity, programming, and platforms with a gendered and racial lens, critiquing outdated and biased words used in the industry.

Racial & Ethnic Bias in Tech Terminology

0_8uhgPoipGU8f14ZX.jpeg

Master-Slave command (Programming)

The term “Master-Slave” is a common computer programming phrase that refers to the idea that “components have total control over other components, or are controlled by a component, respectively,” 4 a one-way direction of control and power. By continuing to directly connect its association with slavery, this term normalizes inhumane practices, perpetuating the 465 years of institutionalized systemic oppression of Black Americans 5 . In addition, modern slavery in the form of the prison industrial complex, domestic servitude, and child soldiers still exist today.

By reducing “master” and “slave” to computer parts, the term desensitizes and softens the painful, historical dehumanization of enslaved peoples. This terminology, which has already been removed by Django, Twitter, Python, and Github contributes to the “power dynamic that’s the blood in the heart of racism.” 6 The term “reflects the bigotry of those that dominated the field when much of the conventions for technology were formed.” 7 The Master-Slave command is easily replaceable with more appropriate terminology like “database credentials” and “main” instead of “master”.

Blacklist, Whitelist, Black hat hacker, White hat hacker

In the most simplest terms, the racist ideology of “white is good, black is bad” 8 is unfortunately echoed into the racist biases of society, which has then translated into the exclusionary binary of technical language. The dichotomy of the colors - white and black, which respectively equates to good and evil, desirable and undesirable, not only reflect racist and colorist sentiments, but mirrors the problematic racist stereotypes of people in society.

The terms “whitelist” and “blacklist” are used in digital security to differentiate approval and denial. Whitelisting has a “trust-centric approach, allowing access for approved entities” 9 . While “blacklisting” is “threat-centric and involves blocking access to suspicious or malicious entities 10 . The implications of good and bad associated with these terms have a historically racist past, accompanied by the hierarchical direct relationship between race, class, and power. Additionally, the term “white/black hat hackers” have similar connotations of good and evil, oftentimes compared to ethical and criminal hacking, respectively. Subconsciously, the implications of the colors white/black bleed into the problematic biases for people of color. Mallory Knodel, the former Chief Technology Officer at Article 19 addresses that “this trope has significant impact on how people are seen and treated. As we’ve seen with metaphors, its use is pervasive and, though not necessarily conscious, perceptions do get promulgated through culture and repetition.” 11 There is no technical need to use “white/black” in describing these mechanisms. In addition to reinforcing structural racism, the choice to continue this type of language reinforces overt prejudice and unconscious biases against a community that is already underrepresented in the field of technology.

Grandfathering

Though not exclusively used in the tech industry, phrases like “that product was grandfathered in” are directly related to the grandfather clause used to discriminate against African Americans in the nineteenth century. This phrase is usually used to describe “individuals or companies who get to keep operating under an existing set of expectations when new rules are put in place.” 12 Racialized in its origins, the grandfather clause was created to discriminate and institutionally disenfranchise black voters and “their descendants from voting, while allowing poor and illiterate whites to vote.” 13

Though the usage of grandfathering is now part of mainstream vernacular, its origins are rooted in oppressive policies enacted to institutionally disenfranchise African Americans. The term’s historical connections to slavery and casual reference to White supremacy does not reflect the ideals of an inclusive, safe, and equitable environment.

Mechanical Turk

Amazon Mechanical Turk (MTurk) is a crowdsourcing marketplace that allows for businesses to outsource their jobs to a distributed virtual workforce. 15 The original Mechanical Turk is a fake chess-playing device, created in the 18th Century by a Hungarian engineer. 16 The device was an automated machine that acted as a mechanical illusion, while a real person hidden inside the device played chess.

[14] Mechanical Turk. Digital Image. Untold History of AI: When Charles Babbage Played Chess With the Original Mechanical Turk. 18, March 2019. https://spectrum.ieee.org/tech-talk/tech-history/dawn-of-electronics/untold-history-of-ai-charles-babbage…

[14] Mechanical Turk. Digital Image. Untold History of AI: When Charles Babbage Played Chess With the Original Mechanical Turk. 18, March 2019. https://spectrum.ieee.org/tech-talk/tech-history/dawn-of-electronics/untold-history-of-ai-charles-babbage-and-the-turk

The name and use of the Turkish culture embodied in these two automated mechanisms is rooted in the idea of oriental, mysticism from the East; a stereotype pinned on those originating from Asia. Ayhan Aytes, a researcher on cultural history of Artificial Intelligence and Cognitive Labor, connects the way the West views the East as “performers of technological and cultural alterity, satiating the anxieties caused by the unfamiliar notion of mechanized cognition, by projecting them onto all-familiar ethnic and religious differences.” 17 The parallels of Amazon’s platform and the Mechanical Turk encompasses the idea of a mystic, hidden labor force; fulfilled by others, unbeknownst to the mainstream audience. Heavily criticized for its low-pay and lack of labor regulations, Amazon’s platform exploits those who are in desperate need of employment, yet have adept technical skills.

Through Amazon’s platform, the word “turk” has additional dimensions. Employees are called “turkers”, and the verb form is known as “turking”. The term “turk” has a derogatory history, a blanketed label used to describe anyone with ethnic origins from the Middle East. Racialized in nature, Amazon’s use of the name “Mechanical Turk” highlights how the West is “overlooking examples from Islamicate cultures as an extension of colonialist desires to exclude non-western cultures from the Western-centric histories of science and technology.” 18 Not only is it problematic as a platform, but the name reinforces the idea that “Orientalist undercurrents were exploited by Enlightenment discourse in order to configure the docile subject on the image of the Turk.” 19 Usually performed by marginalized communities, the hidden labor of automated work is portrayed in both of these machines.

Sexist, Classist, and Cishet-normative Terminology

0_mY7c3vfr9YsYeN4M.jpeg

Fingering, Penetration and Pentest (Digital Security)

Digital security has several problematic terms rooted in sexism, including but not limited to fingering, penetration, and pentesting.

The term “fingering” has had various meanings in tech throughout the years. The original and most common use comes from a computer science term; an old Unix command called “finger.”20 Created in 1971, it is used to find information on a particular user in a computer or a network.21 Though the origins of the term was not intended to be sexual, the meaning of the word has evolved to become so. “Fingering” as a computer command may be uncomfortable for a group of people, specifically women, who represent a minority in the tech industry.

The word penetration has many different meanings and has taken a definition of its own in the tech world. Phrases such as “internet penetration” and “penetration of products” insinuates a forceful entry and hints at a sexual innuendo. Though this term has entered mainstream vocabulary, it is important to address how it could conjure up past traumas or unpleasant imagery; especially for survivors of sexual assault.22

In addition, penetration testing or pen test is an “attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities.”23 Also known as ethical hacking, pen testing is a common method used in assessing security. While acknowledging this word can be used in nonsexual contexts, the mere use of penetration as technical terminology implies a sexual act and a masculine endeavor, a reflection of dominance in a majority male industry.

Male/Female Connectors

Female and male connectors are terms used in electrical and mechanical trades. A male connector is usually a “plug and has a solid pin for a center conductor.”24 A female connector is “a jack and has a center conductor with a hole in it to accept the male pin.”25 This mechanism is a direct analogy to sexual intercourse and the assumed binary nature of gender. By strictly promoting this cis normativity, we indirectly push this notion that gender and sex are binary, excluding and delegitmalizing those who identify as gender non-conforming or trans. In lieu of assigning a gendered relationship, using +/- could adequately represent this binary relationship.

John the Ripper

John the Ripper is a free, open source, “fast password cracker” used to detect weak Unix passwords.26 The name is a play on the infamous “Jack the Ripper”, a serial killer who preyed on low-income women and mutilated the bodies of five sex workers in 19th century London.27 The commemoration of a sadistic killer whose “crimes seemed to portray an abhorrence for the entire female gender”28 feeds into the solicitous headlines that disregard the real fear of sexual assault. If diversity in the tech community increased, tools like John the Ripper might instead have titles that describe their actual function, without conjuring violent imagery.

Evil Maid Attack

An evil maid attack is an “attack in which bad actors gain physical access to unattended computing devices for malicious activities.”29 This term originated from the idea that devices are left unattended in hotel rooms, where a maid has unsupervised access.30 Assigning this type of attack to a typically female, service profession can be seen as playing into the demonization and distrust of those in the lower income bracket and could perpetuate harmful and false stereotypes of stealing and dishonesty. From a translation perspective, the analogy supporting "evil maid attack" is also complex and the relationship is difficult to explain, making it a particular challenge to translate in addition to the term being problematic in nature.

SuCKIT

A rootkit is a “stealthy type of malicious software designed to hide the existence of certain processes or programs from normal methods of detection.”31 A type of rootkit created to detect this compromise is named “sucKIT.”32 The name is a play on the vulgar expression “suck it,” which is oftentimes used as an insult, insinuating phallic action. Frequently used colloquially, it is a condescending phrase often indicating gendered power and dominance.

Man-in-the-Middle Attack (MitM)

A man-in-the-middle attack is when “an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two.”33 Known as one of the oldest cyber attacks, this term does not translate well into other cultures nor does it accurately represent its description. Instead, the term “on-path attackers” is more accurate, as “attackers can then collect information as well as impersonate either of the two agents.”34 Assigning this position of power to a man again highlights the male dominance in this industry. Because this type of attack was assigned a binary gender, it further reinforces that cybersecurity, hacking, and tech are for men, excluding other identities and representation.

Moving Towards Inclusive Terminology

Inequitable terms can easily be replaced to create change without compromising the value of the technical work itself. Instead, a plethora of alternative, appropriate, and inclusive terms should be used and mainstreamed, creating a new norm.

Language and culture are intrinsically connected, reflecting societal norms and its values. 35 In a Western-centric industry, it is important to address and reconfigure the racist and sexist technical terms, even if unintentionally so, that are still used today. Knodel notes, “subtle configurations of sexist, racist, or ethnocentric language use[d] in technical documents can derail or interfere with readers’ ability and desire to comprehend and follow important information.” 36 When language serves to reinforce a dominant group’s values and power, marginalized groups are forced to work within these imbalanced power dynamics, stifling abilities of consent and inclusion.

Merely hiring people of color is not enough, and changing the problematic language used within the industry is one step towards shifting the culture. Although language sounds innocent and a relatively minute detail, its influence becomes exponentially elevated when translated and localized to adapt to other cultures. For example, languages that use a masculine/feminine form risk mainstreaming the male form and erasing female presence. 37 Practitioners must lead by refusing to use terminology that reinforces oppressive, exclusionary structures. These terms, which are embedded in the technical infrastructure of society, must represent an inclusive environment, as we work to reimagine and reconstruct societal foundations.

These expressions used in technology are a reflection of the historical biases within society. As we aim to create a diverse and inclusive industry, terminology matters. As we work to dismantle white supremacy and cultural bias, we must explore how Western binary definitions of race, gender, sexuality, class, and power affect those who rely on technologies developed in the West. When technology is localized to other cultures, especially adopted for minority groups, it is important that individuals feel safe and comfortable with the tools and language they are using. We need to replace terms that support casual racism, sexism, and cisheteronormativity with inclusive language, and ensure that dangerous ideologies are not perpetuated in other cultures, preventing harm in communities that rely on this technology. The tech industry has the power to change and shift its narrative, and it starts with inclusive language.

At Localization Lab, we hold localization sprints to discuss tech terminology and how to responsibly localize to different communities. This practice could be adopted for an English language sprint, bringing together diverse contributors in the tech space to tackle the complex and nuanced challenge of creating inclusive language and building a guide towards best practices.

Citations

1 Taha, L., & McConnell, E. (2020, April 14). On Absenting Women from Arabic Public Discourse. Retrieved July 29, 2020, from https://www.localizationlab.org/blog

2 Chevalier, T. (2014, February 24). Gendered Language: Feature or Bug in Software Documentation? Retrieved from https://modelviewculture.com/pieces/gendered-language-feature-or-bug-in-software-documentation

3 Ibid

4 Oberhaus, D. (2018, September 13). 'Master/Slave' Terminology Was Removed from Python Programming Language. Retrieved from https://www.vice.com/en_us/article/8x7akv/masterslave-terminology-was-removed-from-python-programming-language

5 Worland, J. (2020, June 11). America's Long Overdue Awakening on Systemic Racism. Retrieved from https://time.com/5851855/systemic-racism-america/ , Solomon, D., Hanks, A., & Weller, C. E. (2018, February 21). Systematic Inequality. Retrieved from https://www.americanprogress.org/issues/race/reports/2018/02/21/447051/systematic-inequality/

6 S. (2018, September 9). Even in Tech, Words Matter. Retrieved from https://deninet.com/blog/2018/09/09/even-tech-words-matter

7 Ibid

8 The New York Times, T. (2017, April 02). Readers Respond: Which Racial Terms Make You Cringe? Retrieved from https://www.nytimes.com/2017/04/02/us/racial-terms-that-make-you-cringe.html

9 Blacklisting vs. Whitelisting. (2019, August 12). Retrieved from https://consoltech.com/blog/blacklisting-vs-whitelisting/

10 Ibid

11 Knodel, M. (2019, September 12). Terminology, Power, and Offensive Language [Scholarly project]. In Network Working Group. Retrieved 2020, from [https://tools.ietf.org/html/draft-knodel-terminology-01][0]

12 Greenblatt, A. (2013, October 22). The Racial History Of The 'Grandfather Clause'. Retrieved from https://www.npr.org/sections/codeswitch/2013/10/21/239081586/the-racial-history-of-the-grandfather-clause

13 Riley, N. (2019, May 31). Words Matter: Why We Should Put an End to "Grandfathering". Retrieved from https://medium.com/@nriley/words-matter-why-we-should-put-an-end-to-grandfathering-8b19efe08b6a

14 Mechanical Turk. Digital Image. Untold History of AI: When Charles Babbage Played Chess With the Original Mechanical Turk. 18, March 2019. https://spectrum.ieee.org/tech-talk/tech-history/dawn-of-electronics/untold-history-of-ai-charles-babbage-and-the-turk

15 Amazon Mechanical Turk. (n.d.). Retrieved July 02, 2020, from https://www.mturk.com/

16 What is Mechanical Turk? (2016, July 11). Retrieved from https://www.pewresearch.org/internet/2016/07/11/what-is-mechanical-turk/

17 Aytes, A. (n.d.). Media Archaeology, Cultures of Automata, and Mechanized Cognition. Lecture presented at Cornell University. Retrieved 202, from http://complit.cornell.edu/sites/complit/files/Aytes_Talk.pdf

18 Ibid

19 Ibid

20 Finger protocol. (2020, May 16). Retrieved July 24, 2020, from https://en.wikipedia.org/wiki/Finger_protocol

21 Colbath, Sean. “Origins of the Finger Command .” Google Groups, Google, 1990, groups.google.com/forum/#!msg/alt.folklore.computers/IdFAN6HPw3k/Ci5BfN8i26AJ.

22 New, J. (2015, May 27). Asking Too Much, or Not Enough? Retrieved August 17, 2020, from https://www.insidehighered.com/news/2015/05/27/language-sexual-assault-surveys-criticized-students-triggering

23 Penetration Testing. (n.d.). Retrieved July 02, 2020, from https://www.coresecurity.com/penetration-testing

24 What is the difference between male and female connectors? (n.d.). Retrieved July 02, 2020, from https://www.l-com.com/frequently-asked-questions/what-is-the-difference-between-male-and-female-connectors

25 Ibid

26 John the Ripper Password Cracker. (n.d.). Retrieved July 02, 2020, from https://www.openwall.com/john/

27 Dickson, E. (2019, March 18). Jack the Ripper May Finally Have Been Identified, Says New Study. Retrieved from https://www.rollingstone.com/culture/culture-news/jack-the-ripper-identity-study-aaron-kominski-809808/

28 History.com Editors. (2010, November 08). Jack the Ripper. Retrieved July 02, 2020, from https://www.history.com/topics/british-history/jack-the-ripper

29 Yedakula, K. (2019, April 14). What is an Evil Maid attack and how is it different from Evil Twin attack?: Cyware Hacker News. Retrieved from https://cyware.com/news/what-is-an-evil-maid-attack-and-how-is-it-different-from-evil-twin-attack-8a73a96

30 Evil maid attack. (2020, June 07). Retrieved from https://en.wikipedia.org/wiki/Evil_maid_attack

31 Checking for Known Rootkits. (n.d.). Retrieved July 02, 2020, from https://security.web.cern.ch/recommendations/en/rootkits.shtml

32 Ibid

33 Swinhoe, D. (2019, February 13). What is a man-in-the-middle attack? How MitM attacks work and how to prevent them. Retrieved from https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html

34 “What Is an on-Path Attacker? .” Cloudflare, www.cloudflare.com/learning/security/threats/on-path-attack/.

35 Birner, B. (n.d.). Does the language I speak influence the way I think? Retrieved July 02, 2020, from https://www.linguisticsociety.org/content/does-language-i-speak-influence-way-i-think

36 Knodel, M. (2019, September 12). Terminology, Power, and Offensive Language [Scholarly project]. In Network Working Group. Retrieved 2020, from [https://tools.ietf.org/html/draft-knodel-terminology-01][0]

37 McConnell, E., & Taha, L. (2020, April 14). On Absenting Women from Arabic Public Discourse. Retrieved July 29, 2020, from https://www.localizationlab.org/blog

On Absenting Women from Arabic Public Discourse

من تصميم: مادّة ١٩ | Designed by: Mada19

من تصميم: مادّة ١٩ | Designed by: Mada19

By Layla Taha

Translated from Arabic by Erin McConnell & Layla Taha

As an Arabic-English volunteer translator with Localization Lab, I often find myself addressing a “general” public; asking them to “download” this tool, or “open” that application. In doing so, the feminist in me and the woman whose mother tongue is Arabic are repeatedly interrogated.

In English, most technical communications, whether in an app’s interface or an organizational newsletter, address a given “you” in an attempt to sound personal. This creates a problem for English to Arabic translators because unlike English, Arabic has gender (masculine and feminine) incorporated into most aspects of its grammar — from nouns to adjectives to verbs. So, when using the imperative, such as “Open” or “Download” or “Install”, one must specify the recipient’s gender. Since it’s presumed you’re addressing a “person”, a masculine word in Arabic, most communications address a singular male.

To mitigate this, I started using the default masculine plural form to address “persons” of a mixed gender group, which is at least grammatically correct. But when I asked Rula Asad, the Executive Directorate of the Stichting “Syrian” Female Journalists Network, whether that’s a suitable solution, she casually responded: “Isn’t that a masculine plural?”

Rula was alluding here to another grammatical rule in the Arabic language which seemingly prioritizes male recipients of a message over their female counterparts. Much like French, there are masculine and feminine plural forms in Arabic. For example, in French you have the feminine singular madame (sayyidah in Arabic) and the feminine plural mesdames (or sayyidat in Arabic). The issue in Arabic however, is that when addressing a group of women and men, the masculine plural form, (al sadah) would suffice, grammatically-speaking. As for including the two plural forms, (similar to the French mesdames et messiuers or the Arabic al sayyidat wal sadah), that’s optional and left to the speaker’s discretion (or personal mannerisms).

In a long, virtual (and quite enjoyable) conversation with Rula, she said that the repeated use of the masculine form in public discourse in Arabic leaves women feeling excluded from the conversation. “There is an assumption that the language that is spoken and used is inclusive of women, despite the fact that it does not include women directly… In your mind’s eye, you still imagine a message intended for a group of men, rather than a group of women or a group of people with diverse gender identities.”

Rula believes that language is a tool and a medium that influences public opinion, shapes the discourse towards a given group or issue, and ultimately reflects itself in people’s daily lives, behaviors, and reactions.

When I asked her how the use of the masculine plural affects her personal reception of a given text, she replied: “I don’t feel involved in the subject and so I don’t get involved. I’m not exaggerating. It affects the extent of engagement or social responsibility that I feel. That’s why I am reticent to consume cultural production that doesn’t include me, or directly address me in its tools.”

It’s really not an exaggeration. In her book Invisible Women: Data Bias in a World Designed for Men, Caroline Criado-Pérez provides numerous examples that the data we use to inform economic, health, or other public policies does not take women into account. This exclusion often causes women to pay an extremely high cost in terms of time, money, and sometimes even with their lives.

Caroline explains that heart attacks, for example, are often misdiagnosed in women (one out of two times in Britain according to The Guardian) because the symptoms of the illness that appear in women are completely different than those of men — whose data is primarily used to inform medical research. In men, chest pain is one of the most common symptoms of a heart attack, whereby this is only the case for 1 in 8 women who suffer from a heart attack. For women, stroke symptoms are more likely to take the form of fatigue or digestion issues.

In her book Caroline argues that this phenomenon is also pervasive in the technology sector, from hardware architecture (eg. mobile phone size) to algorithms. Google’s speech recognition software for example is 70% more likely to understand men. Most “fitness tracking” applications underestimate the number of steps taken while doing housework at an error rate of up to 74%.

In an interview with Wired, Caroline explained that this is “both a cause and a consequence of a kind of unthinking that envisions humans as exclusively male.”

So we return to how we envision our humanity as we narrate, describe, and express it in our public discourse in Arabic, what could the consequences of continuing to “unthink” of women in nearly everything we write be?

“In its current form, Arabic is unfair, not only to women, but also to non-gender conforming individuals…”

“In its current form, Arabic is unfair, not only to women, but also to non-gender conforming individuals. If we take baby steps, our public discourse doesn’t even begin to reflect what is acceptable to society… We also have to take into account unspoken signifiers, or what is implied when unsaid. The use of language must be inclusive and fair. It must respect peoples’ choices and be free from judgment or stereotyping of specific social groups. This is the sort of public discourse we aspire to create,” says Rula.

Towards Finding Local Solutions

On the sidelines of the Internet Freedom Festival of 2019, Erin McConnell of The Localization Lab organized a session on “Exploring Approaches to Gender Inclusive Language in Arabic”. Farah Barqawi, co-founder of the Wiki Gender project, a participatory platform that produces open feminist knowledge on gender issues and women in Arabic, moderated the session.

The session brought together a number of people interested in this localization dilemma including Ahmed Gharbia, the former artistic director of the Arab Digital Expression Foundation (ADEF).

When I asked Ahmad why he participated in the session, he said that he is specifically interested in this issue and in contemporary Arabic linguistic phenomena in general. “This issue has many dimensions: linguistic, morphological, as well as semantic and rhetorical. It’s important for me professionally to take part in creating an environment where women and men can cooperate in different areas of their lives — one that is more reflective of womens’ visions of the world.”

In the session, Farah presented a background of local attempts to deal with the dilemma of inclusion in Arabic.

A Summary of Current Approaches to Gender Inclusion:

The Backslash
Using the feminine suffix after a backslash (‘/’) may be one of the first attempts to address gender inclusion by some Arab media organizations. Farah advises against this approach as much as possible because the plethora of backslashes “break the flow of the text visually, linguistically and otherwise.”

The Masculine Plural
This approach, simply using the masculine plural instead of the masculine singular, is usually accompanied by using nouns as opposed to verbs when possible, in an attempt to avoid verb conjugation altogether.

In response to the use of the masculine plural, Farah says: “We settle for the plural because it addresses a group, however it is still the masculine plural. If there is a group of 9 women and a lone male suddenly joins, the feminine plural no longer applies. Even in our cultural heritage the masculine is given high status. It is not blatant discrimination, but that does not mean it is not descriminatory. In these situations, let’s just use both plurals (masculine and feminine).”

As mentioned at the beginning of this post, I myself often use the masculine plural in my writing. I see this as an approach that addresses women and men (Admittedly I wrote “men and women” and then corrected myself!). I take this approach because it does not draw much attention to itself and away from the content (like replitive conjugations or backslashes do). It is also commonly used in colloquial language. When speaking to a group of women in colloquial Arabic you say: “Shall we (m.pl.) walk (m.pl.)? Do you want to drink (m. pl.) something?”, as opposed to using the feminine plural which would require more thoughtful deliberation.

To this Ahmad adds that colloquially, “Arabs use masculine and feminine forms without paying attention to the actual significance of gender, and they use other determinants when there is an actual desire to determine gender. These determinants are considered excessive or erroneous if we strictly apply the rules of morphology and grammar. For example, ؛Today I saw two women engineers (f. pl.).؛ This phenomenon exists in various forms in the Arab world. For example, most Egyptians have united around use of the masculine plural for demonstrative pronouns (this, that, these, those) and most plurals. However, Levant dialects have standardized use of the feminine plural for demonstrative pronouns even when the aforementioned contain masculine nouns. In the dialects of the Maghreb we find variety in the use of some verbal tenses. This is all to say that maybe the solution is to ignore masculine and feminine markers all together and not count any customization of gender… In my opinion, the most important thing is the discourse, the ideas and the concepts, and how they are presented, treated and analyzed.”

Using both Genders
Using both the masculine and feminine plurals as it appears in the Quran:

“المُسْلِمِينَ وَالْمُسْلِمَاتِ وَالْمُؤْمِنِينَ وَالْمُؤْمِنَاتِ”

“Muslims (m. pl.) and Muslims (f. pl.), believers (m. pl.) and believers (f. pl.).” As for Wiki Gender, its editorial policy prefers giving precedence to the feminine plural over the masculine plural, or only using the feminine plural.

Alternation of Gender Within the Text
Farah, the co-founder of Wiki Gender and the moderator of the IFF session, stated that this problem of discourse originates from imagining that we are addressing a “person”, a masculine word. “Person” is a word that claims neutrality. It refers to an unknown person (sex, gender, etc.), which can be pluralized, such as “people” (m.pl.) and “persons” (m.pl.), but may not be feminized in the plural form. Hence the idea of diversification (which requires imagination) or switching gender signifiers throughout the same text and in the plural forms of speech (eg: journalists (f.pl.), researchers (m.pl.), students (f.pl.) and interested parties (m.pl.))

An Experimental Portmanteau
Farah says that some time ago, the members of Wiki Gender began experimenting with solutions to the problem of the backslash, which often separates the masculine and feminine suffixes when addressing a group of people (much like “s/he” in English). They played with removing the backslash and combining the two suffixes into one word. The result was a completely new word that signified both genders, rolled off the tongue, and was still declensional.

Ahmad says he discovered similar experimentation in the Maghreb, but he doesn’t know how it originated or who is behind it. .

For her part, Rula believes that this method is truly creative and adds to the language from within. She advocates for linguistic experimentation and sees that finding a solution will require patience: “For so long, people tolerated gender stereotyping and exclusion in most public discourse and knowledge production. So why can’t we be patient with these texts that are in an experimental stage? So long as there are no solutions, people can eventually get used to it.” She adds, “Alternative media outlets, who are advocating for gender equality or female empowerment, should understand the social and emancipatory aspects of such experiments, rather than simply treat media discourse as something to be sold and consumed.”

On Not Falling into the Translation Trap

Following the session, I followed up with Farah on what motivates her. In a Jitsi call she said, “Arabic has a rich vocabulary and a legacy of a popular imagination that was sexually abundant and had no problem in naming sexual acts or acknowledging diversity of gender and sexual orientations. But with the establishment of organized religion, states, and wars, and the spread of capitalism that engulfed the region as well as the rest of the world, entered a holy reverence for heterosexuality and stereotyped gender roles that consist of the productive family of children, the working father and the mother doing unpaid domestic work. So, to treat the subject of inclusion as a novelty, because it’s surfacing in a North American context is to fall into the trap of translation first. It’s also a trap of borrowing things that may not be essential in our contexts.”

She adds: “A common manifestation of this is the obsession with finding one word in Arabic, when Arabic is not a language of single words. How many words do we have in Arabic for “love” compared to in English? Why don’t we celebrate this diversity? I’m not saying we shouldn’t address the issue, I’m saying we must be careful to ask the questions that arise from these dilemmas, in our organizations, in writing, in discrimination against female writers, etc. Who are the editors and the publishers and how do they produce what is written or published in Arabic?”

DIGITAL SECURITY GUIDELINE FOR HUMAN RIGHTS DEFENDERS AND JOURNALISTS IN ETHIOPIA

Screen+Shot+2020-07-01+at+16.46.00.jpg

We are happy to announce that the Digital Security Guideline for Human Rights Defenders and Journalists in Ethiopia developed by Atnafu Brhane is now available on the Localization Lab website in English, Amharic, and Afaan Oromo for human rights and media workers working throughout Ethiopia.

Human rights defenders and journalists have regularly been targeted by authorities in Ethiopia simply for expressing themselves freely and for standing for their beliefs. Many reports show that authoritarian governments hire international hacking companies to target human rights defenders. Ethiopia is one of those countries. This digital security guideline, developed in three languages - Afaan Oromo, Amharic and English - aims to empower human rights defenders and journalists with the skills to protect their presence online.

For access to these guides and more localized digital security and safety guides, visit the Resources page of the Localization Lab website.

Beyond Translation: Localization Sprints for Sustainable Tech Adoption

Thai Localization Sprint Participants.

Thai Localization Sprint Participants.

By Erin McConnell

“I wish to see [human rights defenders who] are at risk, especially in rural areas, using these tools as efficiently as urban-based activists. Thanks Localization Sprint for making these apps more accessible!”

- Thai Localization Sprint Participant

In June 2019, Localization Lab facilitated a digital security workshop in Thailand with Internews and a number of amazing, local civil society groups. The main goal was to collaboratively localize and provide user feedback for four digital security tools that the Thai participants had identified: Mailvelope, Tor Browser, TunnelBear and KeePassXC.

With only 5 days, the Localization Sprint had lofty goals:

  • Support freedom of speech online;

  • Collect qualitative feedback on the tools from the community;

  • Give Thai users ownership over digital security tools to ensure sustained use and engagement; and

  • Strengthen the existing network of Thai localizers and users of digital security tools.

Participants joined from a diverse set of backgrounds and several had never heard of these tools before. A localization sprint is inherently collaborative. People with more technical experience helped those with less, and everyone put forth their best effort. It takes considerable work for a small group to translate and review four different applications in five days. And yet the feeling in the room was upbeat - people played their favorite music and felt empowered to use and contribute to these technologies. The process also challenged everyone in the room to think about how normal Thai people could use digital security tools to protect themselves online.

“I really liked this workshop, especially the tool training parts which helped me understand the tools more clearly and understand how - and in which situations - I should use these tools, which I never knew before.  These tools are very useful for Thai people and we should help spread their use.”

- Thai Localization Sprint Participant

Sprint participants collaboratively translating. Photo courtesy of Erin McConnell.

Sprint participants collaboratively translating. Photo courtesy of Erin McConnell.

Localization and User Feedback: A match made in Pattaya

Incorporating user feedback into the localization process is the perfect opportunity to gain insight into the needs and preferences of users from a diversity of backgrounds.

The sprint participants came with varied technical backgrounds. Some attendees had trained others on several of the tools that were being localized, and others had  never used them before. This provided a valuable chance to better understand the user experiences of absolute beginners and more seasoned users of each tool.

To capture some of this  feedback, participants were asked to follow and fill out USABLE Tool Task Ranking forms, customized for both Mailvelope and KeePassXC. Participants rated the difficulty and commented on tasks as they walked through steps like creating a keypair and sending encrypted email with Mailvelope, or creating an encrypted password database in KeePassXC.

“Adaptation of marketing tools like these personas are really beneficial. We can use them in our sector [non-profit].”

- Thai Localization Sprint Participant

Snapshot of the Okthanks One Liners available for download on their website.

Snapshot of the Okthanks One Liners available for download on their website.

At the end of each day, after participants had gone through training and localization of the tools, they were given a One Liners form developed by Okthanks to capture concise feedback about the user experience. The One Liners forms glean meaningful information from users about their first impressions of an app and their understanding of its function:

Integrating both of these feedback activities into the localization process -  in addition to observations from throughout the day - the sprint documented valuable information about Thai user needs and preferences  for all of the projects localized.

Diving into Local Needs: User Stories and Persona Building

The Thai Localization Sprint challenged sprint attendees to imagine different Thai user profiles and their digital security needs and motivations through user story creation and persona building (for example, imagining a middle-aged farmer or a teenage student and their needs.) This helped the participants better understand Tor, its diverse use cases and the large breadth of individuals who could benefit from using it. Particularly with tools like Tor that come with a lot of misconceptions, it is important for users to imagine themselves and others in their networks using the application. It’s imperative that individuals be able to create narratives that resonate with their communities so that they better understand the tools and adopt them when appropriate.

The persona building and user story activities - done in small groups - resulted in very different outputs, drawing from experiences in the human rights sphere and outside of it. The personas and stories highlighted how Tor and other digital security tools are not limited to those in activist or human rights work. Digital security issues are relevant to all and tools like Tor can address the needs of a social media influencer, a land rights activist, or someone who wants to privately used a shared computer or mobile device.

Collaborative user persona activity resulted in two drastically different user profiles. N shares Group 2’s user profile, Gibza.

Collaborative user persona activity resulted in two drastically different user profiles. N shares Group 2’s user profile, Gibza.

Imagining Thai User Personas

Persona Builder activity developed by Okthanks. Photo: https://okthanks.com/persona-builder

Persona Builder activity developed by Okthanks. Photo: https://okthanks.com/persona-builder

The Okthanks Persona Builder gamifies the creation of user personas to help organizations and developers explore the security concerns of individuals from different backgrounds and working in different contexts. The activity was used to introduce and explore Thai personas, using USABLE personas as a guide, so that participants could integrate them into their future work. 

Following an adapted version of the Persona Builder game, each group determined the name, age, education, location and job title or role of their persona and then picked four more user persona components at random from a shuffled stack of options. Examples of available persona components included: the individual’s unique priorities, the devices and applications they use, their technical strengths and frustrations, information about their connectivity, political dynamics in their region etc.

“We work on digital security in urban areas, and we often forget the limitations and difficulties that those in rural areas are facing. This was a good exercise to look back on these issues.”

- Thai Localization Sprint Participant

Nu Nui, the farmer and land rights activist from the Upper South of Thailand.

Nu Nui, the farmer and land rights activist from the Upper South of Thailand.

Git shares the user persona of community organizer, Nu Nui.

Git shares the user persona of community organizer, Nu Nui.

The end result was two drastically different personas. The first user persona, Nu Nui, reflected the experience of participants who worked with land rights issues in Thailand. Nu Nui was a farmer in the Upper South of Thailand who was involved in community organizing around land rights. She had little technical literacy and faced physical threats from corporate developers trying to acquire land. Through the activity, the group identified several digital security threats and needs for Nu Nui and her community, including: secure communications, a panic button application in case of physical threat, secure information storage for legal documents, secure backup, and the ability to delete sensitive content quickly on a mobile device.

The second group imagined a very different persona than Nu Nui. They profiled Gibza, an social media influencer and owner of an online business. Gibza, whose priorities revolve around her physical appearance and social status, would only use Apple devices, which participants noted is a status symbol in Thailand, limiting her to applications for iOS and macOS. One of her key concerns was keeping banking and financial information secure from government and family members to avoid paying import taxes on resale items and to avoid family requesting financial aid. While Gibza had security concerns, any solutions would have to fit seamlessly into her carefully curated image.

Gibza, the social media influencer.

Gibza, the social media influencer.

Who is the Thai Tor Browser User?

While many individuals are familiar with the Tor Project, the project’s image remains fraught with myths and misconceptions. Particularly in certain regions, the browser is associated with illegal activity or dismissed as a tool only for those with “something to hide”. To challenge these perceptions and explore the myriad of uses for Tor the group was tasked with creating user stories based on an overview of Tor earlier in the day.

Participants were split into two groups and each received copies of the recently released Tor outreach fliers, which contain user stories focusing on key uses for Tor (anti-censorship, anonymity, privacy). Each group wrote a Tor user story in Thai for a local context which identified an individual, the goal they wanted to achieve and how Tor helped them reach that goal.

User Story 1:

แอ๋ม เป็นสาวพนักงานธนาคารแห่งหนึ่ง แอ๋มสนใจอยากซื้อ Sex Toy แต่จะเซิร์สดูก็กลัวว่าเพื่อนร่วมงานจะรู้ว่าแอ๋มเป็นคนเปิดดู เพราะในออฟฟิศมีฝ่าน ITคอยตรวจสอบการใช้งานอินเทอร์เน็ต บวกกับที่บ้านใช้คอมพิวเตอร์ร่วมกันจึงมองหาเครื่องมือที่ปลอดภัย โดยไม่สามารถระบุ IP Address หรือมีประวัติการใช้งาน แอ๋มบังเอิญได้ดูคลิปของเจ๊ตุ๊ก ซึ่งเป็นนักกิจกรรมผู้หญิงบน Facebook แนะนำให้ใช้ Tor Browser จึงหันมาใช้ Tor Browser ตอนนี้แอ๋มรู้สึกสบายใจค้นหาความรู้ด้าน sex toy อย่างสบายใจและมีความสุข

“Am” is a bank worker who wants to purchase a sex toy for herself online. Since selling sex toys in country A is illegal, there is no sex shop where Am can purchase the toy. However, she’s worried that if she searches or purchases the sex toy with her work’s laptop, the IT staff could trace the traffic and expose her activity. She also cannot use her personal laptop at home since there is only one shared laptop for the whole family. Am wants a tool that would allow her to be anonymous and keep her IP address and search history from being traced. Am saw a clip on Facebook of a woman activist mentioning Tor Browser. She therefore used Tor to search for and purchase a sex toy.

The user story was inspired by the recent doxing of a Thai woman who purchased a sex toy online. According to the group members, when the toy was being delivered, the box was damaged allowing the delivery person to see inside. The delivery person took photos of the contents and the woman’s full name and address and shared them on social media. Participants shared that sexuality is still very taboo in Thailand, and particularly for women. Being exposed purchasing a sex toy can have serious social and professional ramifications.

User Story #2. Building Tor User Stories for a Thai context.

User Story #2. Building Tor User Stories for a Thai context.

The second user story was also born out of a real-life situation in which an activist was arrested after online political activity was traced back to him through his IP address. When sharing these user stories, it was important to remind participants that logging into accounts or making purchases using identifying information - even via Tor - affects security and anonymity significantly.

User Story 2: 

น้องยีราฟเป็นนักศึกษาและนักกิจกรรมที่อยากจะเริ่มรณรงค์เรื่องความโปร่งใสและเป็นธรรมของการเลือกตั้งบนโซเซียลมีเดีย แต่ก่อนหน้านี้ ยีราฟอ่านข่าวพบว่ามีคนเคยโดนแจ้งข้อหาจากการวิพากวิจารณ์ กกต. บนโลกออนไลน์ โดยใช้ IP Address เป็นหลักฐาน น้องยีราฟจึงมองหาเครื่องมือที่ปลอดภัยที่สามารถรณรงค์ได้โดยไม่ถูกตามจับจาก IP Address เพื่อนนักกิจกรรมหลายคนจึงแนะนำให้ยีราฟใช้ Tor Browser ยีราฟจึงหันมาใช้ Tor แทนเบราว์เซอร์ทั่วไป ยีราฟรู้สึกแสดงความคิดเห็นเสรีและปลอดภัยมากขึ้น

“Giraffe” is a student activist who wants to create an online campaign on transparency of country B’s national election. However, Giraffe read a news article about a case in which a person shared an online petition to dissolve country B’s Election Commission because the election was a fraud, and that person was then arrested. The police arrested that person by tracing their IP address. Giraffe is worried that she could be arrested if she does online campaigning. Therefore, she’s looking for a tool that would help her do an online campaign without sharing her IP address. Her activist friends recommended she use Tor Browser, instead of normal browser. Giraffe used Tor and felt more comfortable to express her opinion online and mobilize her campaign.

Localization as a Tool for Education, Feedback and Outreach

Localization Sprints are not only a way to efficiently localize technologies. They are an opportunity to introduce new technologies and technical concepts, provide culturally & regionally specific feedback for developers, create stronger regional networks, and devise outreach and localized marketing strategies for sharing localized tools with the community. Together these elements can lead to more informed and sustained adoption of technologies as sprint participants better understand the tools they are using, have them available in their preferred language, identify clearer lines of communication with developers, and have more ownership over the tools as contributors to them themselves.

“I have more understanding of the concepts behind the tools. I've also learned that these tools are important in daily life and we can use them in real life.”

- Thai Localization Sprint Participant

If  you are interested in learning more about Localization Sprints or would like to coordinate one, you can connect with Localization Lab via localizationlab.org or Twitter.

في تغييب النّساء من لُغة الخِطاب | On Absenting Women from Public Discourse

من تصميم: مادّة ١٩ | Designed by: Mada19

من تصميم: مادّة ١٩ | Designed by: Mada19

On the sidelines of the Internet Freedom Festival in early 2019, Localization Lab organized a session on 'Exploring Approaches to Gender Inclusive Language in Arabic.' The session brought together a diverse group of Arabic speakers including feminists, writers, and translators to discuss: the importance of addressing women in public discourse in Arabic, previous and experimental linguistic approaches to achieving better representation, and increasing public awareness of the issue. Layla Taha of Mada19 followed up with several participants after the Internet Freedom Festival and synthesized insights from the session discussion and one-on-one interviews.

بقلم: ليلى طه

"لم لا تجرّبوا"، "كل ما تحتاجونه للاتصال بالإنترنت المفتوح"، أو "افتحوا التطبيق واضغطوا ..." هذه عبارات أردّدُها كثيرًا في إطار حياتي العمليّة، أُخاطب فيها "متابعين" مادّة ١٩ و"المهتمّين" بأدوات الخصوصيّة الرّقميّة وتجاوز الحجب. هل هذا يعني أنّني، وأنا امرأة ونسويّة ولُغتها الأم هي العربيّة، لا أخاطب متابعات مادّة ١٩ والمهتمّات بالأدوات التي تُقدّمها؟ طرحتُ هذا السّؤال على رولا أسد، المديريّة التّنفيديّة لشبكة الصّحفيّات السّوريّات، فأجابت عن السؤال بآخر: "أليس جمع مذكّر سالم؟"

في محادثة طويلة (ولا أُخفي مُمتعة) مع رولا، قالت بأنّ الاستخدام المتكرّر لصيغة المذكّر في الخطاب العام بالعربيّة فيه إقصاء للمرأة. "عندما يكون هناك افتراضات بأنّ اللّغة العربيّة المُتداولة والمُستخدمة هي متضمّنة للنساء رغم كونها غير متضمّنة للنّساء، ليس بشكل مباشر... يبقى التّخيُّل هو مجموعة رجال وليس مجموعة نساء، أو مجموعة من النّاس متنوّعي الهويّات."

تؤمن رولا بأنّ اللّغة أداة ووسيلة تؤثّر على الرّأي العام وتُشكّل الخطاب تجاه فئة أو قضيّة ما، وتعكس نفسها أخيرًا في حياة النّاس اليوميّة وفي سلوكيّاتهم وردود أفعالهم.

عندما سألتُها عن كيفيّة تأثير استخدام جمع المُذكّر السّالم على استقبالها لنصّ ما، أجابت: "لا أشعُر بأنّي معنيّة في الموضوع المطروح، فلا أنخرط في المسألة. وهذه ليست مُبالغة، فهذا يؤثّر في مدى الفعاليّة أو المسؤوليّة التي تتكون لديّ اجتماعيًّا. لذا لديّ موقف من الإنتاج المعرفي الذي لا يُضمِّنُني في أدواته."

هي فعلاً ليست مبالغة. في كتابتها "النّساء اللاّمرئيّات"، تقدّم كارولين كريادو-بيريز العديد من الدّلائل على أنّ البيانات التي نستخدمها في رسم السّياسات الاقتصاديّة والصّحيّة والحياتيّة بشكل عام لا تأخُذ النّساء بعين الاعتبار، ممّا يتسبّب في دفعهن لأثمان باهظة من وقتهن ومالهن وحتّى أحيانًا بحياتهن.

تفسّر كارولين في كتابها مثلاً بأنّ النّوبات أو الجلطات القلبيّة لا تُشخّص بشكل صحيح لدى النّساء في كثير من الأحيان (٥٠٪ في بريطانيا بحسب صحيفة الجارديان) لأنّ أعراض الجلطة لديهن تختلف عنها لدى الرّجال الذين تكون غالب البحوث الطبيّة مبنيّة على جنسهم. فمثلاً، لدى الرّجال، يكون الألم في الصّدر هو أحد أهم أعراض النّوبة القلبيّة وأكثرها انتشارًا، بينما لا تُبديه سوى واحدة من بين ٨ نساء يُعانين من نوبة قلبيّة. لدى النّساء، تظهر أعراض الجلطة على شكل إرهاق أو شعور بسوء الهضم. وتجادل كارولين بأنّ هذه الظّاهرة مُنتشرة أيضًا في قطاع التّكنولوجيا من بنية الأجهزة (مثلاً حجم الهواتف المحمولة) إلى الخوارزميّات. مثلاً، برنامج جوجل للتعرّف على الكلام أكثر قدرة على فهم الرّجال بنسبة ٧٠٪. كما أنّ تطبيقات "مُتابعة اللّياقة البدنيّة" التي تُسجِّل مثلاً عدد الخطوات التي تمشيها يوميًّا، تبخس في تقدير عدد الخطوات عند القيام بالأعمال المنزليّة بنسبة خطأ تصل إلى ٧٤٪، رغم كون العمل المنزلي يستهلك الكثير من المجهود البدني.

بحسب كارولين، ذلك هو "سبب ونتيجة في آن واحد لنوع من اللاّ-تفكير الذي يتصوّر الإنسانيّة بالمذكّر حصرًا."

وإن عُدنا لتصوّرنا لإنسانيّتنا كما نسرُدها، ونوصّفها، ونُعبّر عنها بخطابنا العام بالعربيّة، وب"لا تفكيرنا" في النّساء في كل ما نكتب تقريبًا، فبتقدير رولا: "اللّغة العربيّة في شكلها الحالي المتداول غير مُنصفة، ليس فقط للنساء ولكن يمكن أن نوسّع ونقول للهويّات الجندريّة الأخرى. إذا رح نمشي خطوة خطوة فالخطاب لا يخاطب على الأقل ما هو مقبول للمجتمع … وهناك إشارات اللّغة أيضًا، أو ما لا يُقال. يجب أن تكون استخدامات اللّغة مُتضمّنة وعادلة، وأن يكون فيها احترام لخيارات الناس، وتكون خالية من إطلاق الأحكام أو خلق تنميط مُعيّن لفئات في المجتمع. هذا الخطاب الذي نحاول أن نصل إليه -ونحن في مرحلة تحليله ووضع يدنا على الوجع، ومن ثمّ إيجاد حلول محليّة."

نحو إيجاد حلول محليّة

على هامش مهرجان "انترنت فريدوم" في بداية ٢٠١٩، قامت أرين مكونل من منظّمة "لوكالايزاشن لاب" (مختبر التّوطين) بتنظيم جلسة للبحث في "الحياديّة تجاه الجندر واللّغة العربيّة". جمعت الجلسة عددًا من المهتمّين ب"وضع اليد على الوجع" بكلمات رولا، من بينهم أحمد غربية، المدير الفنّي في "مؤسّسة التّعبير الرّقمي العربي" المعروفة بِ"أضف". عندما سألتُ أحمد عن سبب مشاركته في الجلسة، أجاب: "لأنّي مُهتم بالمسألة وموضوع النّقاش، وبالظّواهر اللّغويّة العربيّة المعاصرة عمومًا. لهذه المسألة أبعاد عديدة: لغويّة، نحويّة-صرفيّة وكذلك أسلوبيّة-خطابيّة. والمُهم عمومًا في نظري من النّاحية المهنيّة هو إيجاد بيئة مواتية للتّشارك بين النّساء والرّجال في مجالات الاهتمامات والعمل العام المختلفة، والسّعي لإبراز تصوّرات النساء عن العالم بأكثر مما هو."

الكاتبة فرح برقاوي، وهي إحدى مؤسّسات مشروع "ويكي الجندر"، منصّة تشاركية تنتج معرفة نسوية مفتوحة في قضايا الجندر والنّساء باللّغة العربية، أدارت الحوار في الجلسة، التي ابتُدأ النّقاش فيها في ملتقى "خبز ونت" في بيروت العام الماضي والذي تنظّمه "سمكس".

في الجلسة قامت فرح بعرض تاريخ من المحاولات (المحليّة بامتياز) للتّعامل مع هذه المُعضلة.

هنا نستعرضها:

الشّرطة المائلة

لعلّ إضافة صيغة المؤنّث بعد علامة "/" (مثل المستخدم/ة) هي من أولى المحاولات التي جرّبتها بعض المؤسّسات الإعلاميّة العربيّة للتطرّق إلى حل لمعالجة هذه المشكلة. إلّا أنّ فرح تنصح بتفادي هذا الأسلوب قدر المستطاع لأنّ الشّرطة "تكسر تدفّق النّص بصريًّا ولغويًّا وغيره".

جمع المذكّر السّالم

عادةً ما يصاحب هذا الأسلوب محاولة للابتعاد عن تصريف الأفعال، فنقول "يرجى زيارة الموقع" بدلاً من "زوروا الموقع" حين أمكن.

في تعليقها على هذا الأسلوب تقول فرح: "نحن مُتصالحين مع الجمع لأنّه يكلّم مجموعة لكنّه أيضًا جمع تذكير. إذا كانت هناك مجموعة من ٩ نساء وفجأة جاء ذكر واحد لا يصلح التأنيث. حتى في الموروث الثّقافي يكون لهذا الذكر مكانة مرتفعة. هو ليس صارخ التمييز لكن هذا لا يعني بأنّه غير مُميِّز. إذا كانت هذه الحالة، لِنستخدم الجمعين."

 كما سلف الذّكر، أنا من مستخدمي جمع المذكّر السّالم في ما أكتُبه لمادّة ١٩، لأنّي أرى بأنّ هذا الأسلوب يُخاطِب النّساء والرّجال (وأعترف أنّي كتبت الرّجال والنّساء بديهيًّا ومن ثمّ صحّحت نفسي!)، وهو لا يلفِت الأنظار كثيرًا إلى مشكلة التّذكير والتّأنيث، كما الشّرطات، كما أنّنا نستخدمه في العاميّة عندما نكون مجموعة من النّساء فنقول "قوموا نمشي؟ تشربوا شي؟".

ويضيف أحمد على هذا أنّه بالعاميّة "العرب يستعملون صيغ المذكر والمؤنّث بغير التفات إلى دلالة الجنس الفعليّة، ويستخدمون محدِّدات أخرى عند الرّغبة الفعليّة في تعيين الجنس، وهي محدِّدات تُعدّ زائدة أو أخطاء إذا ما طبّقنا قواعد الصّرف والنّحو بحذافيرها، مثل "شفت اليوم اثنين مهندسات ستات"، وهذا موجود بأشكال متنوعة في العالم العربي. فمثلاً نجد أغلب المصريين قد وحّدوا على جمع المذكّر في أسماء الإشارة وكثير من الجموع، ولهجات شاميّة قد وحّدت على الجّمع المؤنّث في ضمائر الإشارة حتى عندما يكون المشار إليهم رجالا، وفي لهجات مغاربيّة نجد خليطًا في استعمال الأفعال في بعض الأزمنة. المقصود أن الحل ربمّا كان في تجاهل دلالة المذكّر والمؤنث، وعدم عدّ أيّها تخصيصًا لجنس... الأهم في رأيي هو الخطاب، الأفكار والمفاهيم، كيفيّة عرضها وتناولها وتحليلها."

الجمع بين الجنسين

كما يرد في القرآن "المُسْلِمِينَ وَالْمُسْلِمَاتِ وَالْمُؤْمِنِينَ وَالْمُؤْمِنَاتِ". (أمّا "ويكي الجندر" فهي تفضّل في سياسة تحريرها تقديم المؤنّث عن المُذكّر مثل المستخدمات والمستخدمين، أو الاقتصار على التّأنيث.

التنويع في النّص الواحد

ذكرت فرح بأنّ مُشكلة الخطاب هذه تأتي بالأصل من التّخيُّل بأننّا نخاطب "شخص" ما وهي كلمة مذكّرة. "الشّخص" كلمة تدّعي الحياديّة، وهي تدل على شخص مجهول (الجنس والجندر وغيره)، فيُمكن جمعها (الأشخاص والشّخوص) ولكن لا يجوز تأنيثها. من هنا جاءت فكرة التّنويع (الذي يبدأ في المُخيّلة)، والتّبديل بين الجنسين في النّص الواحد، وفي صيغ الجمع في المُخاطبة (مثال: الصّحفيات والباحثون والطّالبات والمهتمون).

جمع لواحق تمييز الجنس

تقول فرح، أنّ أعضاء ويكي الجندر فكّروا في تبادلات تجريبيّة ويوميّة أكثر من كونها تبادلات عصف ذهني، في كيفيّة التخلّص من الشّرطة المائلة بين لهم/ن أو لكم/ن، فوجدوا أنّه "طالما النّون حرف متّصل، يمكن أن يتّصل بالحرف الذي يسبقه، لما لا نربطهم ببعض ونجرّب وندمج الكلمتين؟ سنحصل على "لهمن"، و"لكمن". هل الكلمة لا تُقرأ بلى تُقرأ وبسهولة..."
"حلوة سماعيًّا،" أُقاطعها.
 تُتابع: "عندما تقرأها النّساء سيشعرن بنون النسوة، وكذلك الرّجال، هناك الميم وهي قوية وتظهر بوضوح أثناء النطق أو القراءة، فلا يشعرون أنّهم مُستثنون"

وفي حال الجمع، هناك دائمًا التّاء في جمع المؤنّث السالم (مثل الكاتبات والقارئات)، والنّون التي تأتي بعد الياء أو الواو في جمع المذكّر السّالم (الكاتبون والقارئين)، دمجوها أيضًا، وحصلوا على "المشاركوت والمشاركيت".
"وهكذا ينفع استخدامها وصرفها فتكون مقبولة نحويّاً،" تُضيف فرح.

يقول أحمد بأنّه أكتشف "وجود تجارب مُشابهة في المغرب العربي من قبيل الكاتبينات والمحرّرينات المهتمينات، [ولكّنه] لا يعرف مصدرها ولا من بدأها."

من ناحيتها ترى رولا بأنّ هذه الطّريقة خلاّقة فعلاً، وأنّها أضافت إلى اللُّغة من ذاتها. وهنا نقتبس من ردِّها على نقاشات مع مؤسّسات إعلاميّة سوريّة من باب أنّ تذكير وتأنيث المفردات والأفعال والأسماء سيجعل النّص طويلاً وبحاجة إلى تفكيك فترد: "إذا كان هناك كل هذا الصبر لكل هذا الوقت على كل هذا التنميط والإقصاء وللعلاك يلي بيجي أصلاً في كل الخطابات وكل الإنتاج المعرفي على مدار سنوات طويلة، لِم لا نصبر على هذه النّصوص التي هي في مرحلة تجريب، طالما ليست هناك حلول، النّاس ستتعوّد." وتضيف: "مفروض الوسائل الإعلاميّة البديلة المُناصرة لهذه القضايا أن تفهم البعد الاجتماعي والتحرّري للموضوع ليس فقط الاستهلاكي كتجارة للإعلام".

عندما سألت رولا لم على النّاس الاهتمام بهذا الموضوع، قالت: "إذا بدهم يهتمّوا فيه هنّ بدهم يفهموا ليش لازم يهتمّوا فيه، لازم معناها نحكي عن كل الهويات اللي لازم تتضمن بالخطاب، عن كل النّمطية التي كانت تقع على النّساء والرّجال ... إنّه في نمطيّة معيّنة وقت ما بنسحبها، بنكون عم بنحاول نحرّر بما معناه الخطاب العام وشو التّوقعات من الناس. طالما هذا الشّي غايب وعم بنحكي على آخر جزئية من موضوع التحرّر وهو عدم جندرة اللغة مثلاً، رح يضل أصعب، لإنّه البدائل يلي عم تنطرح عم بتكون جهود مجموعات صغيرة وفي أغلب الأحيان هي محاربة من محيطها ومن مجتمعها ومن حكومات الدّول التي تعمل فيها."

عن عدم الوقوع في فخّ الترجمة

"اللغة العربية فيها كلمات وفيها إرث مخيال شعبي كان غزير جنسيًّا وما عنده مشاكل سواء في تسمية الأفعال الجنسية أو مع التنوّع الجندري. كان في ناس مُخنّثة، في رجال مثليين، في نساء ثنائيّات الميل الجنسي، ما كنش الموضوع ظاهر على السّطح كقضيّة، لأنّه كانت المُمارسات تحدُث بشكل غير منظّم. لكن مع تنظيم الأديان، والدّول، والحروب، دخولاً على الرّأسمالية التي ابتلعت المنطقة كما ابتلعت باقي العالم، أصبح هناك تقديس للمُغايرة الجنسيّة وللأدوار الجندريّة النّمطيّة التي تكوّن الأُسرة المُنتجة لأطفال، وتكوّن الأب العامل والأُم التي تقوم بعمل منزلي غير مدفوع الأجر. فأن نتعامل مع الموضوع كأنّه شي جديد علينا، إنّه أصلاً في تنوّع جندري عشان في خطاب في أمريكا الشّمالية يحثّ على الموضوع؟ أو إنّه فجأة في كلمات علشان ظهرت بالإنجليزي وانتشرت، فنفترض إنّه عُمره ما كان إلها مقابل يجعلنا نقع في فخّ التّرجمة أوّلاً، وثانيًا في فخ استعارة أشياء رُبّما غير أساسيّة في سياقاتنا،" قالت لي فرح في مقابلة تحدّثنا فيها عن الجّلسة.

وتُضيف: "كما الهوس في إيجاد كلمة واحدة، واللّغة العربيّة ليست لغة الكلمات الواحدة. اللّغة العربيّة فيها حب وعشق ووجد وهيام وغرام، وليس لكل ذلك مرادفات سوى "love" بالإنجليزيّة؟ لم لا نحتفل بهذا التنوّع؟ لا أقول بأن لا نهتم وإنّما لا ننهوِس بسؤال مطروح في الخارج. يجب أن ننهوِس في طرح أسئلتنا التي هي قادمة من مآزقنا، في التنظيم، في الكتابة، في التّمييز ضد الكاتبات، وما معنى كل ذلك؟ مآزقنا في من هم المحرّرين وكيف يحرّرون ما يُكتب أو يُنشر بالعربية؟"

We Can’t Give Up: Localizing Digital Safety for Swahili Speakers

Zaituni Njovu of Zaina Foundation assists Localization Sprint participants working on the Safe Sisters digital safety guide.

Zaituni Njovu of Zaina Foundation assists Localization Sprint participants working on the Safe Sisters digital safety guide.

By Erin McConnell

When discussing access to the internet, information, and technologies the role that language plays in encouraging or inhibiting that access cannot be ignored. Recognizing this and the fact that the majority of online content and tools are available in English and not in local languages, organizers have hosted a full day Localization Sprint prior to each Arusha Women’s School of Internet Governance (AruWSIG). This year, the focus of the Localization Sprint was adapting digital safety educational materials for Swahili speakers.

The 2nd edition of the AruWSIG brought about 30 participants from across Tanzania to the feet of Mt. Meru. Over the course of 4 days, they learned about local and international internet governance and the challenges facing Tanzanians as they navigate the digital sphere and try to gain access to it.

Adapting Digital Safety Guides for Swahili Speakers

The localization sprint focused on 3 digital safety guides that address real and pressing needs for Tanzanian and Swahili-speaking netizens.

The Safe Sisters digital safety guide.

The Safe Sisters digital safety guide.

The Safe Sisters digital safety guide was developed through The East African Women’s Digital Safety Fellowship, for and by East African women. The guide emphasizes digital safety practices addressing some of the most common issues faced by women online: using social networks securely, creating strong passwords, securely sharing devices, and being aware of how information shared online can be monitored and collected by others.

The two Surveillance Self-Defense guides, How to Use WhatsApp on Android and Protecting Yourself on Social Media Networks, supplement the Safe Sisters guide by taking deeper dives into how to understand and use social media networks and WhatsApp more securely. Both guides were fully translated by sprint participants and once the guides have been fully reviewed, they will be formatted and shared on the Localization Lab website and distributed by partners and sprint participants.

Why Localize for Swahili Speakers?

Despite having such a large number of speakers and an official presence in East Africa, the amount of localized technology and original content in Swahili online is relatively small and efforts to further develop and standardize technical terminology — like that of the Open Swahili Localization Project — lack resources.

This lack of information in Swahili (and other regional languages) can contribute to a litany of challenges faced by East African users as they enter into and interact in the digital sphere. Maybe of most concern is how it can affect already marginalized populations. The continued gender gap affecting womens’ access to technology and the internet was one issue highlighted by participants in an AruWSIG session on the feminist principles of the internet, hosted by Rebecca Ryakitimbo, Founder and Programs Manager of KSGen. Participants shared that the lack of content in Swahili and other local languages disproportionately kept women from obtaining technical literacy, access to the internet, and to information.

“Language is very key with the issue of connectivity,’’ said Ms. Ryakitimbo. She then asked the room how much information on family planning and medical issues was available in Swahili and local languages.

The issue of accessibility was echoed by other sprint participants, and was highlighted by Zaituni Njovu as she introduced the Localization Sprint:

“Some people cannot access content online because it is in English or in other languages. We are empowering Swahili speaking people to use the internet.”

When asked why they were personally motivated to participate in the Localization Sprint, another participant stated, “Our whole life is online and our 1st language is Swahili.” While many Tanzanians do speak English, the majority speak Swahili and access to English language education is largely determined by an individual’s financial resources.

“We need [content in Swahili] for user protection,” shared an attendee, emphasizing the need to break down language barriers for users, particularly around terms of service and privacy settings. “We are part and parcel of these technologies, including social networks,” added Diana Damson, an ICT Law student at Iringa University. “If something goes wrong, we are affected.”

For sprint participants, making technology and more online content available in Swahili was about more than basic access. It was also clear that expanding the presence of Swahili in the digital sphere had cultural and sentimental value. Zaituni Njovu shared:

“It is our culture. It is one of our cultures…People feel more comfortable when they use [content] online in their native language”

Technical Terminology and a Case Against Borrowed Words

Across the board, technical terminology in Swahili was shared as both a challenge and takeaway.

The majority of localization sprint participants shared that their biggest takeaway was becoming familiar with new terminology in Swahili and being able to talk about digital safety without relying as heavily on borrowed words from English. One participant added:

“It’s important to localize into Swahili and learn new terms in Swahili. At times we were using English terms to explain English to someone who speaks Swahili.”

Not all localization sprint attendees were ideologically aligned when it came to use of technical terminology in Swahili however. A few participants shared that using Swahili translations could make it more complicated for users who already have familiarity with English terms. They reported that some technical translations in Swahili, though following Swahili word formation norms, can be confusing or even appear nonsensical.

The overwhelming consensus of facilitators and participants was that using Swahili, and avoiding borrowed terms was the best approach. Translation should follow the standards set by projects like the University of Dar es Salaam’s Open Swahili Localization Project as well as the University of Zanzibar, one of the premier institutions for Swahili expertize according to event facilitator Bonface Witaba of the Centre for Youth Empowerment.

Diana Damson broke down her dedication and the responsibility of Swahili speakers to localize, despite the challenges:

“Changes need time. We need to be patient. We can’t give up. Going back to English will not help us. We need to put in more effort to make our language keep up with technical development.”

Special thanks to Bonface Witaba and Rebecca Ryakitimbo for organizing the 2nd edition of AruWSIG and inviting the Localization Lab to co-facilitate the Localization Sprint with the inspiring Zaituni Njovu.

Localization Sprint participants at the 2nd Edition of the Arusha Women’s School of Internet Governance

Localization Sprint participants at the 2nd Edition of the Arusha Women’s School of Internet Governance

Localization Lab Summit at IFF: Design "World Cafe"

The 5th annual Localization Lab Summit was one of the largest and most professionally diverse, bringing volunteer contributors from around the globe along with developers, UX/UI designers and content creators working on Localization Lab supported projects and beyond.

With UX/UI designers from Okthanks, Simply Secure, Tor Project and Ura Design in attendance, we dedicated an entire session to the space where design, development and localization overlap and how co-design and better coordination can lead to more usable and culturally relevant tools.

With input from Eileen of Simply Secure, we decided on a “World Cafe” structure for the session which broke summit participants into small groups which would rotate every 15 minutes between 5 stations. Each station was facilitated by one of the designers and focused on a different question or topic related to design and localization.

Station 1: Elio (Ura Design, OONI Probe)

In our design session we discussed how we could address localization and design processes in an environment utilizing a building block approach. UX Design, User Research and Localization are 3 very interdependent elements and each of them can influence the other heavily in a development process. Having this in mind, our group came to the concept of functional sprints rather than handing off a feature to another team once it's "ready".

The potential advantages of this would be that team members from various disciplines would work closely together on the same feature, enabling short feedback cycles with the assumption that revisions can be handled faster than handing off deliverables from one team to the other. Releases would happen often with very small incremental changes.

The motivation behind this process is being able to spot issues right away as all team members still have control over the process. One downside to this could be the intense, yet slow development process, since all development is cut into small chunks. Of course this is all hypothetical based on our experience from other open source projects.

Last but not least, a big issue we identified is that current funding models are completely incompatible with more efficient ways of developing software, since a large number of grants are given out based on deliverables and a timeline which doesn't correspond with the actual development process.

Station 2: Tiffany (Okthanks)

At our station, the topic of discussion was feedback. We began by asking the question, "what motivates people to give feedback?" This led to some great conversations around gamification, recognition and thanking all those who contribute (in any capacity). We want to encourage feedback and help foster relationships, which may make individuals want to contribute in the future. It was clear people like to give feedback when something works really well or really poor. Which begs the question, how to make giving feedback easy? This led to conversations around the challenges of giving feedback. The process of giving feedback should be quick and easy and with a clear direction of what type of feedback is helpful or useful at that time. The goal of feedback should be to continue the cycle of engagement with end users and communities, therefore finding ways to get them invested in the process from the beginning, creating a long-term relationship and establishing that their feedback is valuable for the design of the solution, may help the overall goal of creating solutions better fit for communities. We also briefly made adjustments to a user story (I will include the photo here, in case you want to use it). Main takeaways, were:

  • say "Thank you!" to everyone!

  • If you can't get to the feedback or it's not in the current scope, communicate this when able.

  • Speak to the impact, show impact, or communicate it someway....The feedback you give is valuable in making decisions for the design and development process. Shaping future products and goodness.

  • Maybe giving feedback should be anonymous by default, uncheck a box if you want to be known.

Station 3: Eileen (Simply Secure)

This session looked at the other side of user research: how to incorporate user feedback into Internet freedom projects. We began by mapping types of feedback the projects receive, either reactively or proactively. Reactive feedback can be incoming messages, bug reports, social media comments or in-person complaints. Proactive feedback, on the other hand, describes information gathering as part of a user research process, such as survey data, tracking data, or user interviews, testing, and observations.

In a next step, the group looked at emerging issues with the current forms of feedback gathering. Beyond the usual complaints (feedback is often too little information, and too negative), three systematic issues stand out: with reactive feedback, it is difficult to understand underlying issues (asking ‘why’). It also is heavily biased toward superficial or minor changes, and leaves out important requests. Finally, users are good at expressing what they want, but not skilled in identifying what they need. This makes adapting the project to user feedback especially hard.

Lastly, the group looked at existing ways to incorporate incoming feedback, such as issue trackers, systems for prioritisation, team communication tools, and visualisations. People agreed that factors for triaging include: number of people requesting feature, funding attached to issue, difficulty of implementation, as well as how important the team deemed the request ("security and privacy matter more than colours and buttons”). For contributors, people brainstormed ways to include them. At the very least, they deserve a response; in the best case, they can be invited for testing, and attributed in some way. Gifts and other types of compensations are options, too.

Station 4: Antonela (Tor Project)

Station 5: Kaci (Okthanks)

I held the station of “Designer FAQ/AMA”. The first round of participants took a little bit to get started because it was such a broad topic to discuss. Especially for those who hadn’t worked closely with designers before. Once conversation got going, though I could tell that everyone was interested. Once the rounds kept going, I could tell the participants who have worked closely with designers and have had burning questions for ages ;) these almost always had an “oh yeah!” or " Good question” mumbled in the background.

As a designer who deals more intently with graphics and interface, and who has a bit of a different working environment (since we work so closely with our developers), I sometimes get thrown by questions or assumptions that others have about the design process so I was a bit nervous. But I think the session went very well! The two biggest takeaways that we had were (note: these answers are my opinion, and could very much be discussed among other designers):

Have designers in on the project as early as possible! And if you are having to choose between UX and UI designers in your budget, choose UX — it’s better to have something ugly that works than something pretty that doesn’t work. :)

This could help with the frustrations of them designing solutions that have already been tried or them not understanding the users. Designers are your friends! We want to help and we want to understand the project and make beautiful, seamless, helpful solutions. The more we know and the more we learn throughout the project the more productive the entire team’s time can be because less time is spent explaining all of the “known” info to the designers.

Push for Marketing Budgets.

Many frustrations of the participants dealt directly with adoption/putting things in front of users, and how to make tools look good. Overall, designers have to design within the means of the project scope. The more the project is set up for design and for visuals, the more time the designer can spend, the better it looks! As designers, we want our work to also help people and to work and to be used!

Localization Lab at RightsCon Tunis

We’re coming to RightsCon this week! Come say hello, as we’ll be participating and hosting a number of sessions this year:

June 12th

The Digital Language Divide: Why Prioritizing Underrepresented Languages Matters.

As policymakers continue to address the growing digital divide, special attention must be paid to underrepresented language users who are continually relegated to the peripheries of the Internet. What obstacles do underrepresented language communities face as a result of their online exclusion? And what role can policymakers, developers, and activists play to bring linguistic diversity to the forefront? Our panel discussion brings together key stakeholders to shed light on the challenges they face, both as Internet users and as individuals working to promote their languages online. The session will discuss issues from digital security risks and economic obstacles to technical challenges when incorporating languages with no script and creating keyboards with new font types. We will also discuss the ways that communities are successfully leveraging technology to preserve and promote language.

"Data Driven" Foreign Aid and "Digital Development" Strategies: Are we disrupting disenfranchisement - or scaling It?

Public and private donors and INGOs increasingly highlight the importance of "data-driven" programming, and the launch of GDPR in 2018 deepened internal discussions throughout Europe and North America on data management and acquisition standards. But where are the voices of the "beneficiaries" of foreign assistance in these strategies, and how are their perspectives and rights informing the decisions donors and INGOs make with regard to data collection, aggregation and use within foreign aid? With current legal and procurement structures, and the political drivers, inherent in foreign aid, can our current assistance structures truly "empower beneficiaries" in new or powerful ways by shifting to data-driven or digital strategies, or are these moves primarily designed to diminish costs and increase efficiency among large Western institutions?  

If you keep suggesting blockchain, I swear to God I will f—ing scream

When we make decisions in humanitarian and development projects based on solutions we want to use, instead of user needs, we could be exposing beneficiaries to bigger risks, by leaving them out of decision-making process. Our panel of experts will discuss the following points: *What is technosolutionism and how to avoid it in projects? *How organizations and individuals can deal with technosolutionist demands from funders and partners. *So, what is blockchain and when *should* it be used in projects? *In praise of low-tech or no-tech solutions: How to shift media focus from shiny new toys in tech, to the mundane, consentful, and trusted solutions--and the complexity of the development work, participation, and research necessary that leads to successful and sustainable projects.

June 13th

Digital Identity for Refugees: Special considerations for protection and privacy

How does Digital ID apply to refugee communities?

Data Protection and Refugees: Informed consent in asylum process and access to aid

Refugees must give biometric data, as well as very sensitive information about why it is that they left their country and why they are afraid to go back. This information might include details about war crimes, crimes against humanity, or sexual violence--information that is extremely sensitive and must be protected. In this panel session, we will discuss how this affects the asylum process.

Datafied Refuge: Navigating new digital borders for refugees in the city

This workshop convenes a critical session surrounding the development, use, and experience of emerging ICTs for ‘integration’ amongst refugees, asylum seekers, and vulnerable migrant populations at destinations. With smartphones to hand, many refugees today document their traversals and communicate with family scattered across the globe, creating and leaving data trails. Once they reach an intermediary or final destination, biometric data is recorded in order to process visas or asylum documents, even to grant access to benefits schemes.

June 14th

More Than Words Can Say: Localization as a human rights issue

This session will review different types of human rights manuals, digital security training manuals and immigration legal manuals that are available online, and what user needs they meet before discussing localizability and adoption challenges. We will work in small groups to identify challenges and opportunities in adopting the framework in the guide for a particular audience.

Internet Freedom Memes

Earlier this month, at our 5th annual Localization Summit in Valencia — a convening for our language contributors, tool developers, UX designers, and partner organizations— we ran our first meme-a-thon competition with attendees focusing on internet freedom themes, and we got some truly amazing results.

Scroll through some of our favorite ones here:

Psiphon AMA (Ask Me Anything)

siphon.png

Psiphon is an open-source Internet censorship circumvention tool, allowing access to blocked content and websites on Windows, iOS or Android.

  • How can Psiphon help you and your community securely and freely access content online?

  • How does Psiphon differ from other VPNs?

  • How can you contribute to Psiphon localization?

Localization Lab is hosting an AMA with the Psiphon team this Thursday, April 5th at 13:00 UTC (09:00 EST)!

What is an AMA? This is an opportunity for people around the globe to ask Psiphon any and all questions about using Psiphon, and localizing it for their regions and communities. 

This is the perfect opportunity to speak directly to the Psiphon team!

In addition to answering all of your questions about using and localizing Psiphon, the team also wants to hear your feedback. What challenges have you faced using Psiphon? When and where has Psiphon successfully connected you to the Internet in the face of censorship? What features and functionality would make Psiphon easier to use for your community?

WHEN: Thursday, April 25th at 13.00 UTC (09:00 EST) (Google calendar invite)
WHERE: Localization Lab Mattermost Channel (Contact us to join the channel)

Not able to join the AMA? Send us your questions and feedback for the Psiphon team and we will share it on your behalf during the AMA.
For encrypted communications, contact
erinm (PGP) directly.

Contributor Spotlight: Why Prioritizing Indonesian Users Should Be at the Top of the Internet Freedom Agenda

Untitled design.png

By Andrea Brás

Localization Lab knows that the work we do would be impossible without the help of incredible contributors who make up the community. The Contributor Spotlight is a way to highlight some of the community members who are unlocking access to digital security technology for users around the world.

This month we want to highlight the work of Indonesian language contributor, Ical. Since joining the Localization Lab community in 2017, he has been answering our calls for the translation and review of tools that his community needs the most. If you have used or shared the Indonesian versions of Tor Browser, Tor Browser Support Portal, Psiphon, Signal (and more), it is because Ical has been a driving force behind their availability.

Localization Lab spoke with Ical about his advocacy work around digital security issues, what motivates him to localize Internet Freedom tech, and why he feels Indonesian users need to be prioritized.

How long have you been interested in tech and digital rights?

I am a digital security trainer who works with activists. I started giving digital security trainings 4 years ago, but I’ve been interested in tech and digital rights for about 7-8 years.

Why are you concerned about digital security? Why do you think that other people should care about protecting themselves online?

Everything we put online is used by corporations and governments without our consent for profit and political purposes. People think targeted ads are helping them, but they don’t realize that corporations are just trying to sell us more products we don’t really need.

There’s no distinction between online and offline life anymore now. There are a lot of online threats which could lead to physical threats as well, and most people don’t realize that. That’s why I think digital security is important to keep our lives secure — both online and offline.

How did you get involved in digital security training? What motivates you to work as a trainer?

I started out because a colleague asked me to be her co-trainer — we have the same concerns about digital security. What motivates me is that digital literacy in Indonesia is so low despite internet penetration being one of the highest among the Southeast Asian countries, and Indonesians have really bad perceptions about privacy and security. I have also heard a lot of cases of outing, doxxing, etc. in the LGBTIQ+ community who are my friends.

What are some of the biggest challenges you face during trainings?

The level of tech-savviness is usually low among my [training] participants and also there is gap between tech and users. All of the tools that I teach were not built taking into account the kinds of the participants I have: The language, the logic, and the context are mostly global north/English-centric. The notion that “tech is difficult and not for everyone” or “I am just a user” is more exacerbated by the difficulty of the tools.

You have been such a big supporter of Localization Lab — How did you find out about the community? Why did you decide to join?

I found out about Localization Lab at a digital rights camp in 2017. I wasn’t aware of what it was about. But after I participated the 2-day sprint, I realized that this could be the answer to some of challenges that I faced during trainings. I think it is really important to make technology, especially digital security tools, speak my own language to make it easier for people to understand. But localization is not just about language translation, it is about translating the tools into a local logic and context so that the tech actually works for us.

Why is it important for your networks to have these tools in Indonesian?

Because most of my participants are not English speakers and they use Indonesian on their devices. Sometimes the tools are confusing for them. But in my experience doing localization, I found a big challenge because some technological terms that are already translated into Indonesian are more confusing because the new translated terms are not popular/ familiar to the general audience.

Why do you think funders, developers and contributors should prioritize Indonesian language and Indonesian users in general?

For me, the reason why Indonesian and Indonesian users in general should be one of the priorities is because Internet penetration here is one of the highest among the SEA countries. Also, the political situation, both historically and currently, are putting activists in danger. In the last few years, the rise of religious conservatism (which translates into state policies/laws) poses a threat to marginalized communities such as LGBTIQ+, religious minorities, and activists.

Burmese Font Issues Have Real World Consequences for At-Risk Users

“Myanmar3, the de jure standard Burmese keyboard layout” by Lionslayer, CC BY-SA 3.0

“Myanmar3, the de jure standard Burmese keyboard layout” by Lionslayer, CC BY-SA 3.0

Have you ever received a message containing an empty box (“◻︎”) instead of the readable characters or emojis you were expecting? If you are an English speaker, this is a largely uncommon occurrence. English fonts and tools developed for English-speaking audiences follow the international Unicode Standard, which means not encountering encoding issues that result in those dreaded “◻︎”. In Myanmar, however, where the Unicode standard is not universally adopted and the favored font of users is not Unicode compliant, encoding issues are far from an issue of the past and the effect on the usability of tools is severe. In a country in which groups like journalists, human rights workers and minority ethnic groups face security risks, physical and digital security are in some cases inextricably linked. Without access to secure means of communication and access to information that are also usable in Burmese and correctly display and allow input of Burmese fonts, the physical well being of individuals may be put at risk.

Due in large part to nearly half a century of isolation from the international community and thus exclusion from international development of technical standards, the most popular and widely used font in Myanmar today, ZawgyiOne, is not Unicode compliant. Why is this an issue? As an international standard, Unicode encoding is used across websites, applications and platforms to correctly display the vast majority of written languages in the digital sphere. If a font is not Unicode compliant, it will not be displayed correctly in any tool or resource using Unicode encoding. Similarly, any tool using an encoding system other than Unicode, like the one developed in Myanmar for use with fonts like ZawgyiOne, will not display Unicode compliant fonts correctly.

Below is an example of how these encoding issues manifest:

Screen Shot 2019-03-25 at 14.41.58.png

How does this affect users?

Particularly now that Myanmar has joined the international digital sphere, encoding incompatibilities are a regular hurdle for Burmese users and the developers and content creators trying to reach a Burmese-speaking audience. Depending on the encoding used on a website for example, you may or may not be able to properly read Burmese text without first installing and changing your browser’s preferred font to one that is compliant with that encoding. Workarounds are even less accessible or impossible for users when it comes to other technologies. While it is possible to have individuals familiar with Unicode-compliant fonts localize technologies that use the Unicode standard, that does not address the fact that the majority of Burmese users not only prefer to input text using Zawgyi-encoded fonts, but may not even know how to use a Unicode-encoded font.

What is the solution?

Many individuals have been working on this issue over the years -- whether creating browser extensions to auto-detect website font encoding, creating font conversion tools or integrating both Zawgyi and Unicode encoding into their tools. Through conversations with Burmese end users, developers and researchers working on this issue, at Localization Lab we would like to put together a guide that is geared toward developers (primarily working in the open source, Internet freedom and humanitarian sectors who are interested in serving Burmese users) and introduce them to the challenges of working with Burmese languages as well as provide some solutions and workarounds. The guide would provide historical and current context for the issue and delve into what can be done in the earlier and potentially later stages of development to ensure that technologies, documentation and educational materials are usable for Burmese speakers. Depending on the available resources, an additional outcome could be further development of existing workarounds and solutions with local technologists.

Tools like Martus and platforms like Facebook and Google have attempted to tackle the issue of Zawgyi-encoding. How have they approached the challenge and what have they learned? How are local developers and technologists approaching encoding issues? What experiences do they have to share with developers who don't have a foundation in Burmese?