Tech

Error message

  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /var/www/drupal-7.x/includes/menu.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /var/www/drupal-7.x/includes/common.inc).

The Women of the Far Right: Social Media Influencers and Online Radicalization – review 

Published by Anonymous (not verified) on Tue, 12/12/2023 - 9:57pm in

In The Women of the Far Right: Social Media Influencers and Online Radicalization, Eviane Leidig examines the phenomenon of far-right women influencers who seek new recruits for white nationalism through carefully constructed online presences. Drawing on three years of digital ethnographic research, Leidig paints a captivating and concerning picture of how these influencers create networked intimacy through social media platforms, writes Nadia Karizat.

The Women of the Far Right: Social Media Influencers and Online Radicalization. Eviane Leidig. Columbia University Press. 2023.

Find this book: amazon-logo

book cover of the women of the far right showing a smiling woman on a phone screen with some emojis around her.“…Far-right women are marketing themselves in their most authentic and accessible form while promoting a hateful ideology…A central component of this success lies in the visibility afforded to these far-right women influencers on social media platforms…” (15).

The networked nature of social media platforms has been used by many social movements over the years, such as those that aim to spread content and raise awareness for social justice through hashtags, retweets and links to direct action (eg, Pro-Palestinian, Anti-Zionist Jewish and Black Lives Matter activists). Through the sharing of videos, text and images on social media, efforts are made to bring ideological shifts in the ways society thinks about issues such as police brutality, settler-colonialism, etc. On the flip side, social media platforms are also used by nefarious actors who aim to recruit members and disseminate information for the goals of white supremacy and preservation of so-called Western exceptionalism. In The Woman of the Far Right: Social Media Influencers and Online Radicalization, Eviane Leidig describes the behaviours and practices of far-right women influencers on social media platforms (eg, Instagram, YouTube), observed over three years of digital ethnographic research where Leidig fully immersed herself into the online worlds of these women and their followers.

Eviane Leidig describes the behaviours and practices of far-right women influencers on social media platforms (eg, Instagram, YouTube), observed over three years of digital ethnographic research

Early on, Leidig distinguishes the terms alt-right and far right (although the application is inconsistent throughout the book); she states she uses the term alt-right to refer to a specific political scene in terms of time and place within the broader far-right movement (ie, North America between 2016 and 2019), or in reference to an individual infamous for their leadership within the alt-right (eg, Richard Spencer). Alternatively, the term far right is used to signal “ideological beliefs and practices that remain constant” within this broader movement and context.

The Far-Right movement is characterised by a preoccupation with nativism, extreme nationalism, and authoritarianism with a growing trend of organising around antifeminism and anti-Islam in the hopes of protecting the “good” (white) family

The Far-Right movement is characterised by a preoccupation with nativism, extreme nationalism, and authoritarianism with a growing trend of organising around antifeminism and anti-Islam in the hopes of protecting the “good” (white) family in a “good” heterosexual marriage with children that practice “good” traditional (white) western values. What makes the alt-right unique to other movements within the far right, according to Leidig, is how integral technology has been to its development. This motivated her investigation into alt-right American and Canadian social media influencers to understand how they use social media and its affordances for the promotion of and recruitment into a hateful ideology.

Leidig positions far-right women influencers as the “exception” within a more male-dominated movement.

But, why the focus on women? Leidig positions far-right women influencers as the “exception” within a more male-dominated movement. Yet, she is careful to situate their existence as part of a sustained history where women have been both subjugated within the far-right world view – where whiteness and maleness hold power – while also contributing to the dissemination of its ideology and propaganda. For example, she discusses Lauren Chen, a biracial woman, as a far-right influencer of colour who “supports structures such as white supremacy if it promotes their self-interest.” And so, we see through examples such as these how those with identities that would hold positions with little power in a far-right utopia take advantage of the visibility and microcelebrity-based power accessible within the movement through strategic use of social media.

Instagram stories – posts that do not appear on one’s main Instagram feed and disappear after 24 hours – allow for an influencer’s audience to send direct messages, participate in polls, respond to Q&As or send reactions (eg, a heart icon) and creates a sense of closeness between audience and influencer.

In Chapters Two through Five, Leidig discusses these practices by far-right women influencers through the lens of “networked intimacy”, referring to techniques (eg, social media behaviours, self-presentation strategies) that help to establish a sense of connection between an influencer and their audience with an aura of authenticity and relatability. An example of this Leidig describes is how ephemeral Instagram stories – posts that do not appear on one’s main Instagram feed and disappear after 24 hours – allow for an influencer’s audience to send direct messages, participate in polls, respond to Q&As or send reactions (eg, a heart icon) and creates a sense of closeness between audience and influencer. Leidig argues that this is a strategy of networked intimacy where the possibilities for “direct interaction…offers unfiltered radicalization and recruitment possibilities between far-right women influencers and their followers.” Similarly, far-right women influencers may share curated ‘vulnerable’ content related to seemingly non-political experiences, such as dating experiences or financial advice, that are embedded with subtle far-right messaging but ultimately work to draw-in an unsuspecting audience who then witness the influencers’ political content posted alongside the “not (blatantly) political.” In this way, through strategies of networked intimacy and taking advantage of the visibility and potential for reaching new audiences on mainstream social media, far-right women influencers rely on mainstream social media platforms to retain notoriety and normalise far-right ideologies.

Leidig envisions coordinated responses from governments, civil society and tech business – both online and offline – that may help to counter the far-right movement and prevent the dissemination and uptake of its ideology.

Towards the end of the book, in Chapter Seven, Leidig envisions coordinated responses from governments, civil society and tech business – both online and offline – that may help to counter the far-right movement and prevent the dissemination and uptake of its ideology. For example, in her discussion on efforts from tech companies to counter the far-right, Leidig discusses content moderation approaches with what she refers to as the “Four D’s of content moderation”: deplatforming, demonetization, deranking, and detection.” Leidig argues that deplatforming, which is when a social media platform shuts down an account associated with a certain user, is “an effective strategy that places priorities of victims over that of perpetrators while significantly limiting the influencers’ reach.” Through deplatforming, far-right influencers lose their ability to network intimacy with a receptive audience on a given platform.

Leidig briefly discusses offline efforts, such as civil society and governments working to provide social support that addresses issues such as income inequality, that can help make people less susceptible to buying into the propaganda of these influencers. However, she does not delve into many specifics beyond calls for countering far-right narratives (eg, via counter-influencers online) and valuing the grievances of those who do feel left behind by society. Rather than be prescriptive with solutions, in this last chapter, Leidig imagines many different stakeholders and organisations coordinating responses to reduce the influence, and thus power, of the far-right. It is for us readers and those with positions in power to decide what we do next.

Leidig paints a captivating picture of how far-right women influencers spread and recruit individuals to their movement, with complex messaging around antifeminism, islamophobia, a white racial identity and “western” values.

All in all, in The Women of the Far Right, Leidig paints a captivating picture of how far-right women influencers spread and recruit individuals to their movement, with complex messaging around antifeminism, islamophobia, a white racial identity and “western” values. By keeping her analysis grounded within social media platforms, we understand how the goals of these influencers are made achievable thanks to the features and visibility afforded to them by technology. And as a result, we – the everyday tech user, scholars, designers – are forced to grapple with the many potentials of technology for spreading hate, as well as calls for justice.

This post gives the views of the author, and not the position of the LSE Review of Books blog, or of the London School of Economics and Political Science. The LSE RB blog may receive a small commission if you choose to make a purchase through the above Amazon affiliate link. This is entirely independent of the coverage of the book on LSE Review of Books.

Image Credit: Roman Samborskyi on Shutterstock.

It’s All Bullshit

Published by Anonymous (not verified) on Wed, 29/11/2023 - 12:59am in

Is Google’s era of abundance—and abundant bullshit—coming to an end?

Writetyper

Published by Anonymous (not verified) on Mon, 07/02/2022 - 8:52am in

Tags 

Tech, writing

Data URI Scheme
Live edit text in your web-browser

Just a quick post to remind myself of the data URI scheme. This is something I should be incredibly familiar with given my history of work but I am mostly clueless.

This morning I have been helping my partner compose a bunch of words. The process has involved lots of to and fro with temporary swathes of text which I have quickly edited before sending back. I found using the data URI scheme to be a quick and efficient method to hammer out text without flipping between apps and windows.

Everything is in the browser. I pasted the code below into a new tab in my browser and just started typing

data:text/html,

So bloody easy.

Footnote:
the title of this post is taken from the code word used to get infinite lives in Jet Set Willy.

The bathroom in Jet Set Willy
Only when you complete the game do you find all the amenities

You had to type it in whilst in the room with the toilet under the stairs and the door to the master bedroom guarded by Maria the housekeeper who was angrily tapping her toes. Maria would not allow you entry until you had cleaned up after the previous nights wild party.

Root Agora

Published by Anonymous (not verified) on Tue, 25/11/2014 - 6:21pm in

Tags 

Tech

After several weeks of intermittent failed attempts I finally managed to get root on my crapass phone.

“Getting root” has a different meanings here in Australia but in this case it refers to gaining full control of my telephone operating system. A bizarre idea when I stop and think about it. Just in case there is another sad geek in need of emotional support or instructions, here is how I did it:

I pulled up the phone specifications (Settings>About phone) and searched the net.

Settings>About phone - Kogan Agora HD
About phone - Kogan Agora HD+

The Phone:
Kogan Agora HD+

Build:
KoganAgora_build. V2.0

Kernel version:
3.4.5 KoganAgora_Kernel.V2.0 3/12/2013

Custom build version:
KAQC05

Some of the things I tried were:

  • Configuring my Debian Wheezy laptop to use backported ADB tools and ensuring it connects properly via udev rules. Thanks Nicolas Bernaerts.
  • Marc Lane’s has a great little guide on his blog, but it did not work for me.
  • The ‘quick and easy steps’ over at Gleescape led me nowhere.
  • I even booted the Mini-Mac into Windows just to try SRSRoot and a few other shonky executables.

That last one, SRSRoot, is an executable which runs through a database of popular exploits to crack the phone security. This led me to search for a specific exploit that may work on my phone. I found a few posts in which eventually led me to Dan Rosenbergs motochopper exploit, (via Sourceforge Japan).

Motochopper appears to have given me root access. Without seeing what the exploit code did it is possible Dan Rosenberg has supplanted Google as my phones keeper. I can live with that, security is just an illusion anyway. Thanks Dan.

Pages