Transfem
A community for transfeminine people and experiences.
This is a supportive community for all transfeminine or questioning people. Anyone is welcome to participate in this community but disrupting the safety of this space for trans feminine people is unacceptable and will result in moderator action.
Debate surrounding transgender rights or acceptance will result in an immediate ban.
- Please follow the rules of the lemmy.blahaj.zone instance.
- Bigotry of any kind will not be tolerated.
- Gatekeeping will not be tolerated.
- Please be kind and respectful to all.
- Please tag NSFW topics.
- No NSFW image posts.
- Please provide content warnings where appropriate.
- Please do not repost bigoted content here.
Posters may express that they are looking for responses and support from groups with certain experiences (eg. trans people, trans people with supportive parents, trans parents.). Please respect those requests and be mindful that your experience may differ from others here.
To make such a request, at the start of the body of your post, not in the title, the first line should look like the this: [Requesting Engagement from _________]
Some helpful links:
- The Gender Dysphoria Bible // In depth explanation of the different types of gender dysphoria.
- Trans Voice Help // A community here on blahaj.zone for voice training.
- LGBTQ+ Healthcare Directory // A directory of LGBTQ+ accepting Healthcare providers.
- Trans Resistance Network // A US-based mutual aid organization to help trans people facing state violence and legal discrimination.
- TLDEF's Trans Health Project // Advice about insurance claims for gender affirming healthcare and procedures.
- TransLifeLine's ID change Library // A comprehensive guide to changing your name on any US legal document.
- Gender Spectrum // Resources for youth, parents and family, educators, mental health professionals and faith leaders.
Support Hotlines:
- The Trevor Project // Web chat, phone call, and text message LGBTQ+ support hotline.
- TransLifeLine // A US/Canada LGBTQ+ phone support hotline service. The US line has Spanish support.
- LGBT Youthline.ca // A Canadian LGBT hotline support service with phone call and web chat support. (4pm - 9:30pm EST)
- 988lifeline // A US only Crisis hotline with phone call, text and web chat support. Dedicated staff for LGBTQIA+ youth 24/7 on phone service, 3pm to 2am EST for text and web chat.
view the rest of the comments
Upvotes but no comments? Let me improve that a little ๐
It's a deep rabbit hole but here are a few ideas for you ๐
You'll want to have up to date hardware and software, because vulnerabilities will become known and this means it is possible to access your system. Maybe think of it as having a healthy diet for your tech, so it has a strong immune system ๐ฅ
A VPN can help, but you should know that the company behind it can theoretically still see what connections you are opening and analyze Metadata. However, your ISP will have a lot less to work with. They won't see that you are connecting to a trans related server, but only a single connection to your VPN. Just ensure you trust the company and consider the jurisdiction it is in โ๏ธ
If you want to go the extra mile you might want it give Tails OS a spin. It's free and can run from a DVD or USB drive, and won't leave a trace when switched off. It runs the tor browser out of the box ๐
Don't try to disappear and hide everywhere, this is very noticeable. You'll want to create secondary accounts for your trans related activities. For example you could remember the logins and only use it on Tails, but you would still have your every day stuff like maybe Instagram, so all appears normal ๐
The next step would be to have privacy focused hardware. For example System 76 will disable the IME (Intel Management Engine), which is built in to every Intel CPU and provides a massive vulnerability ๐ป
As far as I am aware this also applies to phones with a SIM. The sim is like a little computer on its own, just like the chip on your bank card. It has memory and a processor and it runs a special version of Java. It has full access to the hardware and can be trivially patched from the cell network. Personally I have not investigated how to circumvent this, but just be aware that this is a major vulnerability of most phones ๐ณ
Keep in mind that using ANY closed source software is going to pose a beefy vulnerability. Be that Windows or an Nvidia driver. It simply can't be audited for vulnerabilities, which might be left in on purpose. Furthermore, if you are checked by authorities and they take your phone or laptop, you have to assume it is compromised. Many corps will simply get rid of hardware when this happens ๐คท๐ปโโ๏ธ
It's better not to store sensitive data locally, but rather in an encrypted form online. Encrypted data can attract attention if it is found, such as a harddrive, thumbdrive or dvd. Same considerations as with the VPN company. Think of it as e2ee (end to end encryption, such as matrix and signal), but for your data when it is stored and not actively being used. You can search online how to do this. All in all it is probably best to simply not store any data at all by yourself, and stick to trusted online services only ๐
A little on the internet. Let's say you are royally screwed and the internet is switched off or you are blocked from accessing it entirely. At this point you'll want to understand how to make your own network, perhaps with some gateways that are still connected to the internet. This is a large topic which ranges from HAM radio to satallite connections. There is also a risk in being detected. Just know that there is software that can leverage everyday tech in your hardware such as Bluetooth and Wi-Fi to create a grassroots mesh network. In Berlin there is one day a year where such a network is set up just for fun, and it's good training, so maybe give it a try in your local community ๐ป
Twice I've mentioned using companies, for a vpn or for storing data. But you should know that it is quite common for people to host all sorts of services on their own from home, just like many instances on Lemmy. You can assign someone in your local community to be responsible for this. It can be entirely local and part of your mesh network, so it does not rely on the internet. Or it could be in another country. Just know that it's possible and it's flexible ๐ก
As you can see, there is endless stuff to keep in mind, and you will always be taking risks. It's a full time job for many people. I am certain I forgot something. And I haven't even mentioned the social aspect, for example how to handle strangers. But as long as we remain connected and have a few people who invest effort into this, we can stay reasonably safe, even if your area turns into Uganda ๐ซฃ
And lastly, keep in mind that all good people are friends and you are not alone โค๏ธ