Trip Report: World Bank and Second Muse Domestic Violence Hackathon

Over the weekend, I attended the Hacking against Domestic Violence event in Washington DC, sponsored by the World Bank and Second Muse. I was there to help define problem statements, think about security and privacy risks of the solutions, and to help judge the solutions crafted by the attendees. A total of 10 teams congealed over the weekend. Everyone had creative solutions to the problem statements. Generally the sheer quality of output and enthusiasm was the first thing I noticed about all of the teams and their apps. Everyone in DC focused on mobile phone compatibility, even if their solution worked on the general web itself. There are plenty of photos available from the 7 involved countries.

I ended up spending most of my time with the team working to develop protocols to protect survivors from surveillance. We called ourselves Team Fuerza. The full presentation is available. A volunteer recorded a video of the presentation as well. Related images and videos are uploaded to my Tor people site.

Because I was involved with a team, I volunteered to give up my voting rights on the judges panel to avoid any issues. I then ended up presenting for the team for the status update and final presentation.

Overall, it was a great two days and the team made a lot of progress in a short amount of time. A big thanks to the team (Sarah, Az, Cid, Adriana, Andrew, and Justin), SecondMuse, the World Bank, and all of the attendees for their efforts in holding a hackathon in 7 countries simultaneously.

The World Bank and Second Muse should have their final press release and announcement of the results soon.

UPDATE 2013-02-08: World Bank accounces their press release about the hackathon. Team Fuerza, won the USA hackathon!

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Unnamed in Russia appears to give out forged certificates.

Would like to see at TOR project include it all!
Just read about problems with uTorrent - that your applications actually unmask you within TOR simply beacuse your true IP is revealed inside the IP-packet.

That makes me wonder: What if the computer itself doesnt know about the true IP.
1) The computer could be virtuel with a born TOR-identity
2) TOR could make at project to develop the ironcurtain - a network driver with to faces - one to the true network - and a mask to the computer!

That should prevent bad design in torrent-apps to reveal anything but a masked identity, right?


Phobos, are you English?

thanks for the news

Syndicate content Syndicate content