Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
code_of_conduct [2018/01/19 15:19]
127.0.0.1 coc or gtfo
code_of_conduct [2019/05/24 18:32]
127.0.0.1 old revision restored (2019/01/08 10:42)
Line 1: Line 1:
 ====== Code of Conduct ====== ====== Code of Conduct ======
 +
 +-- **[[:​code_of_conduct_de|in German/auf Deutsch]]** --
  
 We, the organizers and participants of CryptoParties,​ pledge our dedication to making our events open and welcoming to everyone who shares our [[:​guiding_principles|guiding principles]]:​ Being excellent to each other, and doing things. We, the organizers and participants of CryptoParties,​ pledge our dedication to making our events open and welcoming to everyone who shares our [[:​guiding_principles|guiding principles]]:​ Being excellent to each other, and doing things.
Line 144: Line 146:
 ==== Other People'​s Keyboards Are Lava ==== ==== Other People'​s Keyboards Are Lava ====
  
-Don't touch anyone'​s keyboard, but your own. While it would be ok after asking for and gaining permission from a "​don'​t violate people'​s private space" point of view, it still is bad from a didactic point of view. Even when there are weird problems with a computer, take your time to dictate and explain even complicated procedures and commands. The student will learn more, and if consequent ​problems arise from these actions maybe even weeks after the CryptoParty,​ the person who owns the computer might remember what was done, and what might be a source of a problem.+Don't touch anyone'​s keyboard, but your own. While it would be ok after asking for and gaining permission from a "​don'​t violate people'​s private space" point of view, it still is bad from a didactic point of view. Even when there are weird problems with a computer, take your time to dictate and explain even complicated procedures and commands. The student will learn more, and if afterwards ​problems arise from these actions maybe even weeks after the CryptoParty,​ the person who owns the computer might remember what was done, and what might be a source of a problem.
  
 ===== Resolving Conflict ===== ===== Resolving Conflict =====
Line 194: Line 196:
 ===== References / Further Reading ===== ===== References / Further Reading =====
  
-This code of conduct is one of many. Two very common ones that were partially used for this one are the [[http://​berlincodeofconduct.org/​|Berlin Code of Conduct]] and the [[https://​geekfeminism.org/​about/​code-of-conduct/​|Geek Feminism Code of Conduct]]. Another code of conduct in writing that was partly inspired by this code of conduct and could in return inspire it is the [[https://​pad.riseup.net/​p/​Mqyo7Pisx5I6|xHain Code of Conduct]] which itself was inspired by [[http://​www.sistersuncut.org/​saferspaces/​|the Sisters Uncut Code of Conduct]].+This code of conduct is one of many. Two very common ones that were partially used for this one are the [[http://​berlincodeofconduct.org/​|Berlin Code of Conduct]] and the [[https://​geekfeminism.org/​about/​code-of-conduct/​|Geek Feminism Code of Conduct]]. Another code of conduct in writing that was partly inspired by this code of conduct and could in return inspire it is the [[https://​pad.riseup.net/​p/​Mqyo7Pisx5I6|xHain Code of Conduct]] which itself was inspired by [[http://​www.sistersuncut.org/​saferspaces/​|the Sisters Uncut Code of Conduct]]. The processes suggested for resolving conflict are heavily inspired by Generation Five's [[http://​www.generationfive.org/​wp-content/​uploads/​2013/​07/​G5_Toward_Transformative_Justice-Document.pdf|Towards Transformative Justice]].