#OMN building progressive alt tech we cannot repeat the behaver of the #dotcons as it’s a different environment, we need different agenders.

“The security context is the relationships between a security referent and its environment. From this perspective, security and insecurity depend first on whether the environment is beneficial or hostile to the referent, and also how capable is the referent of responding to its/their environment in order to survive and thrive.”

Approaches to security are subject of debate.

For example, in debate about security strategies, some argue that security depends on developing protective and coercive capabilities in order to protect the security referent in a hostile environment (and potentially to project that power into its environment, and dominate it to the point of supremacy). The #geekproblem strives for this outcome without putting it into words.

The #OMN argue that security depends principally on building the conditions in which equitable relationships can develop, partly by reducing antagonism between actors, ensuring that fundamental needs can be met, and also that differences of interest can be negotiated effectively.

Some traditional view of security

* Access control – the selective restriction of access to a place or other resource.

* Authorization – the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

* Countermeasure – a means of preventing an act or system from having its intended effect.

* Defense in depth – a school of thought holding that a wider range of security measures will enhance security.

* Identity management – enables the right individuals to access the right resources at the right times and for the right reasons.

* Resilience – the degree to which a person, community, nation or system is able to resist adverse external forces.

* Risk – a possible event which could lead to damage, harm, or loss.

* Security management – identification of an organization’s assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting these assets.

* Threat – a potential source of harm.

* Vulnerability – the degree to which something may be changed (usually in an unwanted manner) by external forces.

https://en.wikipedia.org/wiki/Security

If we are building projects for progressive ends we need to balance the conservatism in these ideas with approaches.