Trip Report: World Bank and Second Muse Domestic Violence Hackathon

by phobos | January 29, 2013

Over the weekend, I attended the Hacking against Domestic Violence event in Washington DC, sponsored by the World Bank and Second Muse. I was there to help define problem statements, think about security and privacy risks of the solutions, and to help judge the solutions crafted by the attendees. A total of 10 teams congealed over the weekend. Everyone had creative solutions to the problem statements. Generally the sheer quality of output and enthusiasm was the first thing I noticed about all of the teams and their apps. Everyone in DC focused on mobile phone compatibility, even if their solution worked on the general web itself. There are plenty of photos available from the 7 involved countries.
I ended up spending most of my time with the team working to develop protocols to protect survivors from surveillance. We called ourselves Team Fuerza. The full presentation is available. A volunteer recorded a video of the presentation as well. Related images and videos are uploaded to my Tor people site.
Because I was involved with a team, I volunteered to give up my voting rights on the judges panel to avoid any issues. I then ended up presenting for the team for the status update and final presentation.
Overall, it was a great two days and the team made a lot of progress in a short amount of time. A big thanks to the team (Sarah, Az, Cid, Adriana, Andrew, and Justin), SecondMuse, the World Bank, and all of the attendees for their efforts in holding a hackathon in 7 countries simultaneously.
The World Bank and Second Muse should have their final press release and announcement of the results soon.

UPDATE 2013-02-08: World Bank accounces their press release about the hackathon. Team Fuerza, won the USA hackathon!


Please note that the comment area below has been archived.

January 30, 2013


Unnamed in Russia appears to give out forged certificates.

February 02, 2013


Would like to see at TOR project include it all!
Just read about problems with uTorrent - that your applications actually unmask you within TOR simply beacuse your true IP is revealed inside the IP-packet.

That makes me wonder: What if the computer itself doesnt know about the true IP.
1) The computer could be virtuel with a born TOR-identity
2) TOR could make at project to develop the ironcurtain - a network driver with to faces - one to the true network - and a mask to the computer!

That should prevent bad design in torrent-apps to reveal anything but a masked identity, right?