<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://networkedmortality.com/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://networkedmortality.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bl00</id>
		<title>Networked Mortality - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://networkedmortality.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bl00"/>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Special:Contributions/Bl00"/>
		<updated>2026-05-03T01:24:14Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.22.6</generator>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2017-08-12T14:53:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Dealing with Data */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A more individualized way to notify folk==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://digitalpublic.io/drafts/reading Digital Public's reading list], covering fiduciary law, intellectual property, trust law, corporate governance, + data law.&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]&lt;br /&gt;
* [https://docs.google.com/document/d/1p-oBHuHbUcWneWZLlZcw_fphQ2NBleKVAmNjF7uGBEE/edit Digital Death syllabus]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://digitalpublic.io/ Digital Public]&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2017-08-12T14:52:39Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A more individualized way to notify folk==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://digitalpublic.io/drafts/reading Digital Public's reading list], covering fiduciary law, intellectual property, trust law, corporate governance, + data law.&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]&lt;br /&gt;
* [https://docs.google.com/document/d/1p-oBHuHbUcWneWZLlZcw_fphQ2NBleKVAmNjF7uGBEE/edit Digital Death syllabus]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2016-04-11T16:05:35Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* &amp;lt;strike&amp;gt;Lock down account creation&amp;lt;/strike&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;Clear out junk pages&amp;lt;/strike&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;Clear out all spam accounts&amp;lt;/strike&amp;gt;&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some [[Remnant questions]]&lt;br /&gt;
* Write summaries of resources listed&lt;br /&gt;
* Should this be on a media wiki? Regardless, make more pretty.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2016-03-20T19:19:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A more individualized way to notify folk==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]&lt;br /&gt;
* [https://docs.google.com/document/d/1p-oBHuHbUcWneWZLlZcw_fphQ2NBleKVAmNjF7uGBEE/edit Digital Death syllabus]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2016-03-11T16:26:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* A mailing list */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A more individualized way to notify folk==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2016-03-11T16:25:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
* [http://fusion.net/story/274991/i-spent-the-last-6-months-planning-my-online-death/ I spent the last 6 months planning my online death]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2016-03-11T16:22:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Rad External Goings On */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
* [https://github.com/fin/memorial-page Memorial Page]&lt;br /&gt;
&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2016-01-11T15:38:28Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Rad External Goings On */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Digital Commemoration===&lt;br /&gt;
* [http://timenesia.org Timenesia]&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-07-06T05:43:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facebook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
* [http://www.theguardian.com/lifeandstyle/2015/jul/04/what-happens-to-my-late-husbands-digital-life-now-hes-gone What happens to my late husband's digital life now he's gone?]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-04-08T13:19:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Rad Groups */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
&lt;br /&gt;
==Rad External Goings On==&lt;br /&gt;
===Dealing with Data===&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://get.digi.me DigiMe]&lt;br /&gt;
&lt;br /&gt;
===Bodies===&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
===Events and Groups===&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-03-25T18:13:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
* [https://medium.com/human-parts/death-in-the-digital-age-799cf5c74fb7 Human Parts and Death in the Digital Age]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-03-16T13:13:18Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Rad Groups */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
* [http://www.capsulamundi.it/progetto_eng.html Capsulamundi]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-03-05T14:23:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */ Megan Yip's blog&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
* [http://www.meganlyip.com/blog/ What Concerns You Most about Death?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/What_other_people_might_want_or_need</id>
		<title>What other people might want or need</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/What_other_people_might_want_or_need"/>
				<updated>2015-02-17T16:50:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==From a conversation at The Berkman Center.==&lt;br /&gt;
&lt;br /&gt;
Erhardt: Resolving what we want versus what other people want after we die. &lt;br /&gt;
&lt;br /&gt;
Sarah: Example of a German author who wanted the details of his suicide published in his blog. Newspapers then published the details, even though in some places you are not supposed to publish details because of immitation concerns. Can you have a will that challenges the norm or gentleman's agreement among journalists? His will, but was it okay for everyone else?&lt;br /&gt;
&lt;br /&gt;
Becca: Obligation of the thing that gives us closure. Differences of people's needs and how they want to interact with the spotify playlist for example. &lt;br /&gt;
&lt;br /&gt;
Separation of physical things and digital things. Flea markets - 'adopt an ancestor' pile of pictures. Obligation of people to handle and pass on as heirlooms?&lt;br /&gt;
&lt;br /&gt;
Ellery: Useful to talk about family and intimate relationships, versus people who are public figures, people that publish things that is of value to the public.&lt;br /&gt;
&lt;br /&gt;
Beatrice: Who care about the materials? So many people writing blogs. How do we decide that it is important? Publishing question about the importance of these things.&lt;br /&gt;
&lt;br /&gt;
Becca: What are the costs to doing things for the people who have different concerns? &lt;br /&gt;
&lt;br /&gt;
Erhardt: What if we reach a point that we can't keep paying out for storage for all our digital assets? What if the internet becomes like Detroit and it's storing all these defunct assets from all these dead people?&lt;br /&gt;
&lt;br /&gt;
SJ: Historical archives problems about what's valuable and what's worth keeping.&lt;br /&gt;
&lt;br /&gt;
Kate: Differences among family members about what they want. Told us what they wanted, who was going to be the executor in the family. What other people want: clarity about who is making the decision. Who is responisble is clear. &lt;br /&gt;
&lt;br /&gt;
Erhardt: We don't know what the memento is going to be for others. Anticipating what is going to be meaningful is difficult. &lt;br /&gt;
&lt;br /&gt;
People want different things from you. Your things mean different things to others (public vs non public figures)&lt;br /&gt;
&lt;br /&gt;
==Design ideas:==&lt;br /&gt;
A system that publishes the possessions of the person and brokers agreement among friends about who would receive which of the person's possessions&lt;br /&gt;
&lt;br /&gt;
Take a photo and move on, to satisfy the nostalgia preference. Could we 3D scan things?&lt;br /&gt;
&lt;br /&gt;
Could we create a DKP system-- maybe your family and friends accumulate DKP over the course of your time together across a life, and then you use those DKP to bid on a person's things when they pass away&lt;br /&gt;
&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
[http://aeon.co/magazine/philosophy/a-writers-duty-overrides-the-ethics-of-patient-privacy/ Ethics of Patient Privacy]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-02-12T20:31:56Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: make the language clearer, plus formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.'''&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-02-12T20:31:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dealing with death in a digital age. This is a community-based, distributed way of contributing your corpus and corpse to larger society at the time of your death.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-02-12T20:30:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Other Awesome Groups, Writeups, Etc */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
* [http://newsroom.fb.com/news/2015/02/adding-a-legacy-contact/ Facebook gets a Legacy Contact]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [http://www.newscientist.com/article/mg22530073.300-time-to-put-your-digital-affairs-in-order.html#.VN0NF1oYDyB New Scientist]&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-02-06T20:11:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups and Comics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
* [https://medium.com/message/deathhacks-b767903b7c15 Death Hacks]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-01-22T04:09:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Mentions of note */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* Mindful Cyborgs Podcast [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death part one] [https://soundcloud.com/mindfulcyborgs/mindful-cyborgs-episode-45 part two]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2015-01-20T17:46:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* &amp;lt;strike&amp;gt;Lock down account creation&amp;lt;/strike&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;Clear out junk pages&amp;lt;/strike&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;Clear out all spam accounts&amp;lt;/strike&amp;gt;&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some [[Remnant questions]]&lt;br /&gt;
* Should this be on a media wiki? Regardless, make more pretty.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2015-01-19T19:55:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* &amp;lt;strike&amp;gt;Lock down account creation&amp;lt;/strike&amp;gt;&lt;br /&gt;
* &amp;lt;strike&amp;gt;Clear out junk pages&amp;lt;/strike&amp;gt;&lt;br /&gt;
* Clear out all spam accounts&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some [[Remnant questions]]&lt;br /&gt;
* Should this be on a media wiki? Regardless, make more pretty.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Death_Drill</id>
		<title>Death Drill</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Death_Drill"/>
				<updated>2015-01-15T18:47:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Show and Tell Infrastructure==&lt;br /&gt;
Give feedback to each other on where we think it might fail&lt;br /&gt;
&lt;br /&gt;
==Set up your safety==&lt;br /&gt;
Let people know a drill is going to happen&lt;br /&gt;
&lt;br /&gt;
==What happens if it goes well?==&lt;br /&gt;
&lt;br /&gt;
==What happens if it fails?==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Do we want to try to do one of these at [http://deathonlineresearch.net this event]?&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2015-01-15T18:41:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Lock down account creation&lt;br /&gt;
* Clear out junk pages&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some [[Remnant questions]]&lt;br /&gt;
* Should this be on a media wiki? Regardless, make more pretty.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2015-01-15T18:40:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Lock down account creation&lt;br /&gt;
* Clear out junk pages&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some [[Remnant questions]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/To_Dos</id>
		<title>To Dos</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/To_Dos"/>
				<updated>2015-01-15T18:31:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Created page with &amp;quot;* Lock down account creation * Clear out junk pages * Fill in details on legal aspects, biological aspects * Answer some FAQs&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;* Lock down account creation&lt;br /&gt;
* Clear out junk pages&lt;br /&gt;
* Fill in details on legal aspects, biological aspects&lt;br /&gt;
* Answer some FAQs&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-01-15T18:28:29Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death Mindful Cyborgs Podcast]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
* Jump on the FAQ and start to answer some questions&lt;br /&gt;
* Edit this wiki&lt;br /&gt;
* Other general [[To Dos]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-01-15T18:26:42Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Mentions of note */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;br /&gt;
* [http://mindfulcyborgs.com/shows/2015/1/12/episode-44-color-coding-for-sex-and-death Mindful Cyborgs Podcast]&lt;br /&gt;
* [https://www.youtube.com/watch?v=igMf0Wmfn9A Breakout session at CyborgCamp MIT]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-01-02T17:23:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Changed protection level for &amp;quot;Main Page&amp;quot; ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2015-01-02T17:22:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: spammers mcspamson&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-25T15:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups and Comics==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
* [http://www.jerkcity.com/_jerkcity5805.html Clear my cache]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Death_Drill</id>
		<title>Death Drill</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Death_Drill"/>
				<updated>2014-12-12T20:26:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Created page with &amp;quot;==Show and Tell Infrastructure== Give feedback to each other on where we think it might fail  ==Set up your safety== Let people know a drill is going to happen  ==What happens...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Show and Tell Infrastructure==&lt;br /&gt;
Give feedback to each other on where we think it might fail&lt;br /&gt;
&lt;br /&gt;
==Set up your safety==&lt;br /&gt;
Let people know a drill is going to happen&lt;br /&gt;
&lt;br /&gt;
==What happens if it goes well?==&lt;br /&gt;
&lt;br /&gt;
==What happens if it fails?==&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Open_Source_Cadavers</id>
		<title>Open Source Cadavers</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Open_Source_Cadavers"/>
				<updated>2014-12-12T16:41:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Other approaches */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;So this kind of freaks some people out, huh?&lt;br /&gt;
&lt;br /&gt;
Need language for the lawyers, for the cadaver receivers, for the head of the research lab.&lt;br /&gt;
&lt;br /&gt;
Need language for IRBs. Might require local IRB. If it’s a multi-site study, might require multiple IRBs.&lt;br /&gt;
&lt;br /&gt;
There would need to be a way to know they were dealing with an OSC. Orga working on this, with their IRB would include language around “if dealing with an OSC, X Y Z need to be considered.”&lt;br /&gt;
&lt;br /&gt;
==Finding more accepting institutions==&lt;br /&gt;
Using [[Inquiry_to_Programs|this template]] contact places to see how amicable they are to Open Access of medical research, and to edx-style recording of medical practice in regards to the cadaver bequeathed to them. The full list of cadaver-using medical organizations in the US can be found [http://old.med.ufl.edu/anatbd/usprograms.html here], with the overview of willingness to work with the open access obligation [[List_of_Cadaver_Programs|here]]. Please contribute additional country listings. Because it is vital that the accepting organization get the cadaver within a very short timeline, geographic proximity is a priority.&lt;br /&gt;
&lt;br /&gt;
==People who can especially help with this==&lt;br /&gt;
Open access enthusiasts in the following roles, or with connections to those in these roles, are especially well positioned to push this agenda.&lt;br /&gt;
&lt;br /&gt;
===Heads of cadaver labs===&lt;br /&gt;
&lt;br /&gt;
===Institutional Review Board members===&lt;br /&gt;
&lt;br /&gt;
===Institute lawyers===&lt;br /&gt;
&lt;br /&gt;
==Other approaches/notes from talks with folk==&lt;br /&gt;
=== with lovely folk at Personal Genome Project===&lt;br /&gt;
:Actually, in theory, it should almost be trivial since it is not human subjects research. I think it might be simpler to create a new study that gets and IRB waiver to sequence tissue from deceased individuals, return the results to the family members who have consented, and allow them a mechanism for donation of the data to the PGP or Open Humans databases. For our own protection, we might want a trail of legal consent by next of kin, etc. Also, although not a legal requirement, from an ethical perspective, I think it would be important for the family who is donating the sample to be educated about the risks of the PGP and the implications for genetically-related individuals.&lt;br /&gt;
:Yeah. The sticky point might be the logistics of finding resources for utility-extraction of a person's body.&lt;br /&gt;
:I'm sure we can improve on the current design for handling death, and use that for Open Humans too. Maybe we could make the &amp;quot;designated proxies&amp;quot; a ranked list with more well-defined behavior (e.g. first available person is the decider), and get better about encouraging people to fill it in.&lt;br /&gt;
&lt;br /&gt;
Publish a report, give that back to the person. “I release this to public domain”&lt;br /&gt;
Proxies for data, materials, etc. - family member.&lt;br /&gt;
&lt;br /&gt;
“Don’t want to wait to share your biological data? Check out the Personal Genome Project!”&lt;br /&gt;
&lt;br /&gt;
PGP participants, if there are enough of them, going to an orga about it.&lt;br /&gt;
&lt;br /&gt;
edx for harvard, link to medical/disection team. HMS might be more comfortable knowing they’re already in PGP. Make sure generally licensed. Not necessarily useful to them, more likely a burden.&lt;br /&gt;
&lt;br /&gt;
neurology studies&lt;br /&gt;
&lt;br /&gt;
===with an anesthesiologist===&lt;br /&gt;
Weeks of dissection&lt;br /&gt;
&lt;br /&gt;
Getting used to taking a knife to a living person.&lt;br /&gt;
&lt;br /&gt;
Understanding the layout of body, tacitly&lt;br /&gt;
&lt;br /&gt;
Feel for different tissues&lt;br /&gt;
&lt;br /&gt;
At the end of the dissection, the body is a mess. Might start to decompose by the end of class.&lt;br /&gt;
&lt;br /&gt;
Also research.&lt;br /&gt;
&lt;br /&gt;
Someone in anesthesia going in, practicing nerve blocks, new approaches to nerve blocks. might not be fully documented until it’s also applied to live people, say it does work.&lt;br /&gt;
&lt;br /&gt;
When we do nerve block at this point in your leg, where does it spread? Does tissue obstruct? Discrete research things. This would be the most amenable to an open access thing, but harder. Restricted to a portion of the body.&lt;br /&gt;
&lt;br /&gt;
Most of the places in Pennsylvania have a central source that arranges the distribution. Looking into who in the medical center would be receiving the body, what their disposition is.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-12T16:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Yearly Test */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====[[Death Drill|Yearly Test]]====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-05T20:58:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Relevant Writeups */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
* [http://www.bostonglobe.com/business/2014/12/04/for-those-left-behind-digital-lifeline/W8r03Mb8dISXc7BywC6f5J/story.html The Globe on digital lifelines]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-05T20:56:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://getyourshittogether.org/ Get Your Shit Together]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Historical_examples_of_how_corpses_are_handled</id>
		<title>Historical examples of how corpses are handled</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Historical_examples_of_how_corpses_are_handled"/>
				<updated>2014-12-01T19:58:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Created page with &amp;quot;==People who intentionally donated their bodies:== ===Jeremy Bentham=== the head thing is super creepy. * http://www.ucl.ac.uk/museums/jeremy-bentham * http://www.ucl.ac.uk/Be...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==People who intentionally donated their bodies:==&lt;br /&gt;
===Jeremy Bentham===&lt;br /&gt;
the head thing is super creepy.&lt;br /&gt;
* http://www.ucl.ac.uk/museums/jeremy-bentham&lt;br /&gt;
* http://www.ucl.ac.uk/Bentham-Project/who/autoicon (with citations)&lt;br /&gt;
** A. Lipsett, '[http://www.ucl.ac.uk/news/news-articles/0509/05091603/ How to give a dead man a makeover: first freeze-dry the carpet beetles in his hair...]', article in The Times Higher Education Supplement, 16 September 2005.&lt;br /&gt;
** C.F.A. Marmoy, '[http://www.pubmedcentral.nih.gov/picrender.fcgi?artid=1034365&amp;amp;blobtype=pdf The &amp;quot;Auto-Icon&amp;quot; of Jeremy Bentham at University College London]', Medical History, 2 (1958), 77-86.&lt;br /&gt;
** R. Richardson, '[https://www.ucl.ac.uk/Bentham-Project/journals/newsletter_10 Bentham and Bodies for Dissection]', The Bentham Newsletter, x (1986), 22-33.&lt;br /&gt;
** R. Richardson and B. Hurwitz, '[http://www.pubmedcentral.gov/picrender.fcgi?tool=pmcentrez&amp;amp;blobtype=pdf&amp;amp;artid=1247042 Jeremy Bentham's self-image: an exemplary bequest for dissection]', British Medical Journal, 295 (July- Dec. 1987).&lt;br /&gt;
** P. Schofield, [http://www.bloomsbury.com/uk/bentham-a-guide-for-the-perplexed-9780826495907/ Bentham: A Guide for the Perplexed] (London: Continuum, 2009)&lt;br /&gt;
** E. Smallman, '[http://metro.co.uk/2013/07/12/181-year-old-corpse-of-jeremy-bentham-attends-ucl-board-meeting-3879586/ 181-year-old corpse of Jeremy Bentham attends UCL board meeting]', article in The Metro, 12 July 2013.&lt;br /&gt;
* http://www.ucl.ac.uk/Bentham-Project&lt;br /&gt;
&lt;br /&gt;
==Bodies as religious artifacts==&lt;br /&gt;
(bodies and parts of bodies used by institutions to conduct the power (for positive or negative means) they have in society); your arrangements are in essence a vote for increasing the power of the receiving institution.&lt;br /&gt;
===Memento Mori===&lt;br /&gt;
* John Donne's statue at St Paul's http://www.poetsgraves.co.uk/donne.htm&lt;br /&gt;
* Hugh Ashton's two artistic representations of his body at St John's College, Cambridge &lt;br /&gt;
:http://deathlyponderings.wordpress.com/2014/06/10/death-in-cambridge-hugh-ashtons-tomb/&lt;br /&gt;
:https://deathlyponderings.files.wordpress.com/2014/06/020.jpg &lt;br /&gt;
Relics&lt;br /&gt;
&lt;br /&gt;
(science too)&lt;br /&gt;
&lt;br /&gt;
==People who unintentionally have had their bodies used by others==&lt;br /&gt;
===Funerary remains, and controversies with museums, academics, governments===&lt;br /&gt;
* Samuel J.M.M. Alberti*, Piotr Bienkowski** and Malcolm J. Chapman. Should We Display the Dead? Museum and Society, Nov 2009 https://www2.le.ac.uk/departments/museumstudies/museumsociety/documents/volumes/alberti2.pdf&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Suicide_tourism Suicide Tourism controversies around the globe]&lt;br /&gt;
===Tupac===&lt;br /&gt;
* Legal affordances for reanimation / holographic representation / etc.&lt;br /&gt;
* http://www.ipbrief.net/2012/04/19/tupac-hologram-rocks-coachella-and-ip-laws/&lt;br /&gt;
* Implications of Tupac Hologram on Copyright: http://scholarship.shu.edu/cgi/viewcontent.cgi?article=1427&amp;amp;context=student_scholarship&lt;br /&gt;
&lt;br /&gt;
===Victorian Post-mortem Photography===&lt;br /&gt;
* http://en.wikipedia.org/wiki/Post-mortem_photography&lt;br /&gt;
* [http://www.valentinalari.co.uk/ Valentina Lari], who did a photography show, [http://www.valentinalari.co.uk/#/mysterious-morbus/4558642122 The Deformity of Beauty] at the Mutter Museum &lt;br /&gt;
&lt;br /&gt;
===Books made of Human Skin===&lt;br /&gt;
* Autobiography reputedly bound in the skin of the author http://www.atlasobscura.com/places/boston-athenaeum&lt;br /&gt;
&lt;br /&gt;
===Notable Embalmed People===&lt;br /&gt;
* Xin Zhui (d. 163 BCE) http://en.wikipedia.org/wiki/Xin_Zhui &lt;br /&gt;
* La Doncella http://en.wikipedia.org/wiki/Children_of_Llullaillaco&lt;br /&gt;
* Vladimir Lenin: embalmed and on display at the Lenin Mausoleum&lt;br /&gt;
http://en.wikipedia.org/wiki/Lenin%27s_Mausoleum&lt;br /&gt;
* &amp;quot;[http://www.washingtonpost.com/blogs/worldviews/wp/2013/03/08/a-photographic-guide-of-the-worlds-embalmed-leaders/ A Photographic Guide to the world's embalmed leaders]&amp;quot; (Washington Post)&lt;br /&gt;
&lt;br /&gt;
===Elmer McCurdy===&lt;br /&gt;
people thought that his body was a mannequin&lt;br /&gt;
* http://www.slate.com/blogs/atlas_obscura/2014/04/11/the_corpse_of_elmer_mccurdy_and_how_it_ended_up_in_a_long_beach_fun_park.html&lt;br /&gt;
&lt;br /&gt;
People who have arranged for their works to live on in possibly modified states&lt;br /&gt;
&lt;br /&gt;
==We don't yet know how to classify==&lt;br /&gt;
===Phineas Gage===&lt;br /&gt;
can be seen at the [http://en.wikipedia.org/wiki/Warren_Anatomical_Museum Warren Anatomical Museum] on the Green Line&lt;br /&gt;
* [https://www.uakron.edu/gage/story.dot Gage's Story]&lt;br /&gt;
&lt;br /&gt;
==Examples in Pop Culture==&lt;br /&gt;
* DKP systems &lt;br /&gt;
* Foundation series (example of someone's will over time reaching into the future, in tension with the will of people in a given time)&lt;br /&gt;
* The Ender Saga - Speaker for the Dead&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-01T19:49:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===[[Historical examples of how corpses are handled]]===&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://deathsalon.org/meetings/death-salon-uk-2014/ Death Salon UK]&lt;br /&gt;
* [http://www.bath.ac.uk/cdas/ University of Bath: The Center for Death &amp;amp; Society]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/What_other_people_might_want_or_need</id>
		<title>What other people might want or need</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/What_other_people_might_want_or_need"/>
				<updated>2014-12-01T19:47:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Created page with &amp;quot;==From a conversation at The Berkman Center.==  Erhardt: Resolving what we want versus what other people want after we die.   Sarah: Example of a German author who wanted the ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==From a conversation at The Berkman Center.==&lt;br /&gt;
&lt;br /&gt;
Erhardt: Resolving what we want versus what other people want after we die. &lt;br /&gt;
&lt;br /&gt;
Sarah: Example of a German author who wanted the details of his suicide published in his blog. Newspapers then published the details, even though in some places you are not supposed to publish details because of immitation concerns. Can you have a will that challenges the norm or gentleman's agreement among journalists? His will, but was it okay for everyone else?&lt;br /&gt;
&lt;br /&gt;
Becca: Obligation of the thing that gives us closure. Differences of people's needs and how they want to interact with the spotify playlist for example. &lt;br /&gt;
&lt;br /&gt;
Separation of physical things and digital things. Flea markets - 'adopt an ancestor' pile of pictures. Obligation of people to handle and pass on as heirlooms?&lt;br /&gt;
&lt;br /&gt;
Ellery: Useful to talk about family and intimate relationships, versus people who are public figures, people that publish things that is of value to the public.&lt;br /&gt;
&lt;br /&gt;
Beatrice: Who care about the materials? So many people writing blogs. How do we decide that it is important? Publishing question about the importance of these things.&lt;br /&gt;
&lt;br /&gt;
Becca: What are the costs to doing things for the people who have different concerns? &lt;br /&gt;
&lt;br /&gt;
Erhardt: What if we reach a point that we can't keep paying out for storage for all our digital assets? What if the internet becomes like Detroit and it's storing all these defunct assets from all these dead people?&lt;br /&gt;
&lt;br /&gt;
SJ: Historical archives problems about what's valuable and what's worth keeping.&lt;br /&gt;
&lt;br /&gt;
Kate: Differences among family members about what they want. Told us what they wanted, who was going to be the executor in the family. What other people want: clarity about who is making the decision. Who is responisble is clear. &lt;br /&gt;
&lt;br /&gt;
Erhardt: We don't know what the memento is going to be for others. Anticipating what is going to be meaningful is difficult. &lt;br /&gt;
&lt;br /&gt;
People want different things from you. Your things mean different things to others (public vs non public figures)&lt;br /&gt;
&lt;br /&gt;
==Design ideas:==&lt;br /&gt;
A system that publishes the possessions of the person and brokers agreement among friends about who would receive which of the person's possessions&lt;br /&gt;
Take a photo and move on, to satisfy the nostalgia preference. Could we 3D scan things?&lt;br /&gt;
Could we create a DKP system-- maybe your family and friends accumulate DKP over the course of your time together across a life, and then you use those DKP to bid on a person's things when they pass away&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-12-01T19:46:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up. It is important to consider not only your own desires, but also [[what other people might want or need]].&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-11-26T12:28:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Undo revision 243 by Bl00 (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
===Heir Rights and Digital Property===&lt;br /&gt;
* [http://gamepolitics.com/2014/08/19/delaware-passes-law-give-heirs-rights-digital-property#.VADsdPldV9k Delaware law gives heirs rights to digital properties], August 19, 2014 - GamePolitics&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-11-26T12:26:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Undo revision 235 by Honest knave (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.jedbrubaker.com/ Jed Brubaker's] PhD on [http://www.jedbrubaker.com/death-and-the-social-network-the-persistence-of-digital-identity/ &amp;quot;Death and the Social Network: the Persistence of Digital Identity&amp;quot;], in collaboration with Facbeook&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-11-25T17:14:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Mentions of note */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;br /&gt;
* [http://blog.bl00cyb.org/2014/11/networked-mortality/ willowbl00 blog]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-11-22T21:00:59Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Rad Groups */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.thedigitalbeyond.com/ The Digital Beyond]&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-11-07T15:25:31Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: /* Other Awesome Groups, Writeups, Etc */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [https://medium.com/message/networks-without-networks-7644933a3100 The Sixth Stage of Grief Is Retro-computing]&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Open_Source_Cadavers</id>
		<title>Open Source Cadavers</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Open_Source_Cadavers"/>
				<updated>2014-10-22T14:53:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: added in from convo with PGP&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;So this kind of freaks some people out, huh?&lt;br /&gt;
&lt;br /&gt;
Need language for the lawyers, for the cadaver receivers, for the head of the research lab.&lt;br /&gt;
&lt;br /&gt;
Need language for IRBs. Might require local IRB. If it’s a multi-site study, might require multiple IRBs.&lt;br /&gt;
&lt;br /&gt;
There would need to be a way to know they were dealing with an OSC. Orga working on this, with their IRB would include language around “if dealing with an OSC, X Y Z need to be considered.”&lt;br /&gt;
&lt;br /&gt;
==Finding more accepting institutions==&lt;br /&gt;
Using [[Inquiry_to_Programs|this template]] contact places to see how amicable they are to Open Access of medical research, and to edx-style recording of medical practice in regards to the cadaver bequeathed to them. The full list of cadaver-using medical organizations in the US can be found [http://old.med.ufl.edu/anatbd/usprograms.html here], with the overview of willingness to work with the open access obligation [[List_of_Cadaver_Programs|here]]. Please contribute additional country listings. Because it is vital that the accepting organization get the cadaver within a very short timeline, geographic proximity is a priority.&lt;br /&gt;
&lt;br /&gt;
==People who can especially help with this==&lt;br /&gt;
Open access enthusiasts in the following roles, or with connections to those in these roles, are especially well positioned to push this agenda.&lt;br /&gt;
&lt;br /&gt;
===Heads of cadaver labs===&lt;br /&gt;
&lt;br /&gt;
===Institutional Review Board members===&lt;br /&gt;
&lt;br /&gt;
===Institute lawyers===&lt;br /&gt;
&lt;br /&gt;
==Other approaches==&lt;br /&gt;
''from conversations with the lovely folk at Personal Genome Project''&lt;br /&gt;
:Actually, in theory, it should almost be trivial since it is not human subjects research. I think it might be simpler to create a new study that gets and IRB waiver to sequence tissue from deceased individuals, return the results to the family members who have consented, and allow them a mechanism for donation of the data to the PGP or Open Humans databases. For our own protection, we might want a trail of legal consent by next of kin, etc. Also, although not a legal requirement, from an ethical perspective, I think it would be important for the family who is donating the sample to be educated about the risks of the PGP and the implications for genetically-related individuals.&lt;br /&gt;
:Yeah. The sticky point might be the logistics of finding resources for utility-extraction of a person's body.&lt;br /&gt;
:I'm sure we can improve on the current design for handling death, and use that for Open Humans too. Maybe we could make the &amp;quot;designated proxies&amp;quot; a ranked list with more well-defined behavior (e.g. first available person is the decider), and get better about encouraging people to fill it in.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-10-22T14:50:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: added links and other groups&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;br /&gt;
&lt;br /&gt;
=Other Awesome Groups, Writeups, Etc=&lt;br /&gt;
==Relevant Writeups==&lt;br /&gt;
* [http://www.spectator.co.uk/features/9201661/i-am-ready-to-talk-about-my-death-is-anyone-else/ I am ready to talk about my death, is anyone else?]&lt;br /&gt;
&lt;br /&gt;
==Rad Groups==&lt;br /&gt;
* [http://www.personalgenomes.org/ Personal Genome Project]&lt;br /&gt;
* [http://www.orderofthegooddeath.com/members/your-mortician Order of the Good Death]&lt;br /&gt;
* [http://morbidanatomymuseum.org/ Morbid Anatomy Museum]&lt;br /&gt;
&lt;br /&gt;
==Mentions of note==&lt;br /&gt;
* [https://civic.mit.edu/blog/willowbl00/what-is-death-in-a-networked-age Center for Civic Media Blog]&lt;br /&gt;
* [http://www.pbs.org/idealab/2014/10/what-are-digital-rights-after-death-in-the-networked-age/ PBS Idea Lab]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Inquiry_to_Programs</id>
		<title>Inquiry to Programs</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Inquiry_to_Programs"/>
				<updated>2014-10-21T03:22:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Protected &amp;quot;Inquiry to Programs&amp;quot; ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Greetings,&lt;br /&gt;
&lt;br /&gt;
My name is &amp;lt;name&amp;gt;, and I'm considering what to do with my cadaver upon death. My commitment to furthering scientific knowledge in research and experience is matched by my dedication to that knowledge and experience being freely accessible by all. To that end, I'd be honored to register with your program -- with one requirement -- a guarantee that any lessons, research, etc be released under open access. I'd be asking you to sign the following agreement:&lt;br /&gt;
:“It is the desire of the donor that research, insights, and biological products emerging from the donation become goods that benefit the public. As such, the Recipient Institution agrees that data and scholarly articles arising from the donation will be available under terms no more restrictive than those mandated by the U.S. Government’s policy on [http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp_public_access_memo_2013.pdf Expanding Public Access to the Results of Federally Funded Research] (PDF). The Recipient Institution further agrees that biological products including reagents will be made available on a non-exclusive basis to qualified researchers and that any patents obtained as a result of the donation will be licensed on a non-exclusive basis.”&lt;br /&gt;
Ideally, if my cadaver is used for medical practice, the process of that practice will be recorded for edX or the like. I'm happy to sort out release of privacy etc for this to be possible.&lt;br /&gt;
&lt;br /&gt;
The open access community is a committed and enthusiastic lot, and by agreeing to these terms, your group sets itself up to receive additional cadavers otherwise not available. You can find out more at [http://opensourcecadavers.com Open Source Cadavers].&lt;br /&gt;
&lt;br /&gt;
[[Category:Templates]] [[Category: Cadavers]] [[Category: Premortem]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Wills</id>
		<title>Wills</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Wills"/>
				<updated>2014-10-21T03:22:05Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Protected &amp;quot;Wills&amp;quot; ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=LAST WILL AND TESTAMENT OF ''your name''=&lt;br /&gt;
&lt;br /&gt;
I, ''your name'', an adult residing at ''your address'' being of sound mind, declare this to be my Last Will and Testament. I revoke all wills and codicils previously made by me. &lt;br /&gt;
&lt;br /&gt;
==ARTICLE I==&lt;br /&gt;
I appoint ''someone'' as my Personal Representative to administer this Will, and ask that ''preferred pronoun'' be permitted to serve without Court supervision and without posting bond. If ‘’someone’’ is unwilling or unable to serve, then I appoint ‘’someone else’’ to serve as my Personal Representative, and ask that ''preferred pronoun'' be permitted to serve without Court supervision and without posting bond.&lt;br /&gt;
&lt;br /&gt;
==ARTICLE II==&lt;br /&gt;
&lt;br /&gt;
I direct my Personal Representative to pay out of my residuary estate all of the expenses of my last illness, administration expenses, all legally enforceable creditor claims, all Federal estate taxes, state inheritance taxes, and all other governmental charges imposed by reason of my death without seeking reimbursement from or charging any person for any part of the taxes and charges paid, and if necessary, reasonable funeral expenses, including the cost of any suitable marker for my grave, without the necessity of an order of court approving said expenses.&lt;br /&gt;
&lt;br /&gt;
==ARTICLE III==&lt;br /&gt;
&lt;br /&gt;
I devise, bequeath, and give my ‘’thing’’ to my ‘’relationship’’, ‘’name’’. If ‘’name’’ is unable or unwilling to accept, I bequeath the ‘’thing’’ to my ‘’relationship’’, ‘’name’’.&lt;br /&gt;
&lt;br /&gt;
I devise, bequeath, and give my technology to my ‘’relationship’’, ‘’name’’. If ‘’name’’ is unable or unwilling to accept, I bequeath the technology to my ‘’relationship’’, ‘’other name’’.&lt;br /&gt;
&lt;br /&gt;
I devise, bequeath, and give my online profiles and digital assets, as found in 1Password, to my ‘’relationship’’, ‘’name’’. If ‘’name’’ is unable or unwilling to accept, I bequeath these to my ‘’relationship’’, ‘’other name’’.&lt;br /&gt;
&lt;br /&gt;
==ARTICLE IV==&lt;br /&gt;
&lt;br /&gt;
I devise, bequeath, and give all the rest and remainder of my residuary estate as follows:&lt;br /&gt;
XX% to ‘’name’’. ‘’Other person’’ if ''preferred pronoun'' is unable to accept.&lt;br /&gt;
XX% to ‘’name’’. ‘’Other person’’ if ''preferred pronoun'' is unable to accept.&lt;br /&gt;
XX% to ‘’name’’. ‘’Other person’’ if ''preferred pronoun'' is unable to accept.&lt;br /&gt;
&lt;br /&gt;
==ARTICLE V==&lt;br /&gt;
&lt;br /&gt;
Should any beneficiary not survive me by 30 days, their share shall be distributed to their then surviving children in equal shares.&lt;br /&gt;
&lt;br /&gt;
_____________________&lt;br /&gt;
''your name''&lt;br /&gt;
&lt;br /&gt;
SELF-PROVING AFFIDAVIT&lt;br /&gt;
&lt;br /&gt;
The instrument, consisting of this and X (x) typewritten pages was signed and acknowledged by Testator as her Last Will and Testament in our presence, and we, at ‘’preferred pronoun’’ request, and in ‘’preferred pronoun’’ presence, and in the presence of each other, have subscribed our names as witnesses.&lt;br /&gt;
&lt;br /&gt;
Under penalties for perjury, we, the undersigned Testator and witnesses declare:&lt;br /&gt;
&lt;br /&gt;
# That the Testator executed this instrument as ''preferred pronoun'' Will;&lt;br /&gt;
# That in the presence of witnesses, the Testator signed or acknowledge ''preferred pronoun'' signature already made, or directed another to sign for ''preferred pronoun'' in ''preferred pronoun'' presence;&lt;br /&gt;
# That the Testator executed the Will as ''preferred pronoun'' free and voluntary act for the purposes expressed in it;&lt;br /&gt;
# That each of the witnesses, in the presence of the Testator and of each other, signed the Will as witness;&lt;br /&gt;
# That the Testator was of sound mind; and&lt;br /&gt;
# That, to the best of ''preferred pronoun'' knowledge, the Testator was at the time eighteen (18) or more years of age.&lt;br /&gt;
&lt;br /&gt;
All of which is attested to this ____ day of __________ 20___.&lt;br /&gt;
&lt;br /&gt;
_____________________&lt;br /&gt;
''your name''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_____________________&lt;br /&gt;
Witness&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
_____________________&lt;br /&gt;
Witness&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Templates]]&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Online_Accounts</id>
		<title>Online Accounts</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Online_Accounts"/>
				<updated>2014-10-21T03:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Protected &amp;quot;Online Accounts&amp;quot; ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;How can online accounts be shut down in a respectful way to the deceased, to those who would mourn them?&lt;br /&gt;
&lt;br /&gt;
http://belopotosky.files.wordpress.com/2012/03/robertmontgomery2.jpg&lt;br /&gt;
&lt;br /&gt;
==Metadata for History and Academia==&lt;br /&gt;
Is there a way to donate data from social networks to academic institutions or a shared repository for future historians and anthropologists?&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/Main_Page</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/Main_Page"/>
				<updated>2014-10-21T03:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Protected &amp;quot;Main Page&amp;quot; ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Today the spontaneity of planning, which makes it possible to search for a place to eat while already out the door, forms habits making the avoidance of planning for death even easier. The compartmentalization of online selves makes discrete and care-full notifications difficult, and sadly the current viable option is mass broadcast. Direct and peripheral experience of the fallout of death in this new environment inspired the creation of this shared place for methods of using networks to exhibit care rather than exacerbate confusion. The wiki contains things like [[Wills|wills]] (what to do with corpus, corpse, etc), [[Mailing List Invite|notifications]] for far-flung communities, dealing with passwords, and [[Open Source Cadavers|donating one’s body to science in ways that support open research]]. All things here assume a commitment to open access, creative commons, and inclusion. Just as the internet is about creating, storing, and transmitting knowledge, this guide is about contributing to something larger than the individual. It’s about continuing to build the commons, establishing protocols for death in the digital. You are encouraged to edit, contribute, and refine this living document. Remnant questions are kept [[Remnant questions|here]] until more eloquently embedded elsewhere.&lt;br /&gt;
&lt;br /&gt;
Components are divided up into ''documents'', ''accounts'', ''notifications'', and ''people''. Documents are centralized with accounts, which are propagated via notifications to people, as triggered by a notification from a person. This means only having to worry about keeping something up to date in '''one''' place -- a change to a will or to a website password simply happens in the place of storage, without needing to notify everyone involved. As people enter or leave the circle of trust, they can be added or removed from the notification pool. The notification mechanism is the one thing that has to remain consistent in this set up.&lt;br /&gt;
&lt;br /&gt;
It should be possible to speak about death without fear. If '''you''' ''are'' in danger of harming yourself, please say as such directly, and [http://suicideprevention.wikia.com/wiki/International_Suicide_Prevention_Directory get help]. &lt;br /&gt;
&lt;br /&gt;
==Digital artifacts==&lt;br /&gt;
Executing wills can be a complicated thing, and there are additional snafus and hoops to jump through in granting digital rights postmortem, especially as most courts lack basic understanding of our home The Internet. These structures set up both mechanisms to get access to passwords outside a court of law, as well as making that access legitimate through bequeathing to individuals in via will. For example:&lt;br /&gt;
:I devise, bequeath, and give my technology to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath the technology to my ''relationship'', ''second name''.&lt;br /&gt;
:I devise, bequeath, and give my online profiles and digital assets, as primarily found in my password vault, to my ''relationship'', ''name''. If ''name'' is unable or unwilling to accept, I bequeath my online profiles and digital assets, as found in my password vault to my ''relationship'', ''second name''.&lt;br /&gt;
You '''need to tell people where your physical will is.'''&lt;br /&gt;
&lt;br /&gt;
===Passwords and online accounts===&lt;br /&gt;
Security tends to prevent others from accessing accounts without your presence. In death, that absence is guaranteed. Thus, a quandary well covered in [https://en.wikipedia.org/wiki/Secret_sharing secret sharing] and [http://www.theguardian.com/technology/2009/jun/30/data-protection-internet this writeup from Cory Doctrow]. Split the password for decrypting a password vault in two, and give each half to two people. These four folk don't know who the others are, and should have no reason to talk to each other, except in case of death. You'll also need to store backup codes for two-step authentication.&lt;br /&gt;
&lt;br /&gt;
The encrypted aggregated passwords file is stored in a place accessible remotely. It should auto-update with changes, rather than requiring upkeep. 1Password can also store encrypted notes, in which should be included instructions (also found in templates) and reminders of each of the tasks requested of people. A major thing to consider might be what to do with [[Online Accounts|accounts]].&lt;br /&gt;
&lt;br /&gt;
But how will people know the time to act in that capacity has come, and how will they find each other? A mailing list, of course!&lt;br /&gt;
&lt;br /&gt;
==A mailing list==&lt;br /&gt;
The mailing list might include both people who simply need to know as well as those who have agreed to take on certain [[Tasks to Consider|responsibilities]] at the time of death or incapacitation. These responsibilities include things like letting social or work contacts know, or getting into stuff and taking care of sensitive material before deploying open access mode. There's a set of people tasked with tending to the online accounts. The ideal is a closed notice of death to people, before it hits the rest of the internet. This eases the burden on any one person, while also providing a support network.&lt;br /&gt;
&lt;br /&gt;
Send each of these people a [[Mailing List Invite|request for involvement]], and then (if they agree to be on the list) [[Instructions to People|instructions]] on how to use mailing lists in general and this one specifically. Then set up an [[Mailing List Auto Response|auto-responder]] to a mail posted to the list with instructions on what first steps are, and reminders of how to access information. In a continuing trend, templates for each of these things can be found in [http://networkedmortality.com/index.php?title=Category:Templates the template section of the wiki].&lt;br /&gt;
&lt;br /&gt;
==Failure Modes==&lt;br /&gt;
===Control Systems are Delicate===&lt;br /&gt;
This is essentially setting up a control system for information dispensation and action upon demise. Control systems are delicate - single points of failure (like the mailing list not working) or weakest links (unclear directions for action) have to be considered and accounted for. As the point of this exercise is to 1) ease burdens on loved ones and 2) ensure open access intentions carry through past death, an example issue to consider in this set up is people getting falsely spooked and subsequently either a) leaking passwords / freaking out the internet or b) becoming jaded and inactive. One version of this might be a family member who had not been fully informed as to how the system set-up works posting to the list with a &amp;quot;hey how does this work?&amp;quot;, triggering the auto-responder, causing some tasks to be executed. The cost of this would be the cognitive load of damage control and head-petting. To mitigate this and things like it, a part of the [[Mailing List Auto Response]] template is a &amp;quot;can you trust the message that triggered this?&amp;quot; prompt.&lt;br /&gt;
&lt;br /&gt;
===Threat Model===&lt;br /&gt;
In infosec, considering what could go wrong in life and the structures built to respond to those incidents would be called a &amp;quot;threat model.&amp;quot; What are anticipated complications, where do those come from, and what can be done to mitigate? This system is set up thus far as &amp;quot;more [https://en.wikipedia.org/wiki/Murphy%27s_law Murphy], less [https://en.wikipedia.org/wiki/Alice_and_Bob#Mallory Mallory].&amp;quot; Meaning it's anticipating death and issues with the deployment (accidental or otherwise) of the postmortem setup as occurring by accident, not malice. IE, not worrying about someone intentionally cracking the password vault (or setting up a spoof one for loading passwords into). Some people '''do''' need to worry about these things, and it should be a part of their consideration when setting up a system which takes care of their digital assets postmortem. Please make space on this wiki to document those cases and resulting structures as well.&lt;br /&gt;
&lt;br /&gt;
Using your threat model, compare unintended consequences (mid to low probability false alarm and associated cognitive load in damage control; a vanishingly small likelihood of a scenario in which people loved and trusted are secretly horrible people who seek out the other password holders who 'also' end up being horrible and sneaky, and together they unlock all the passwords, and the falsehoods they post on social media are actually believed by people (thanks, anxiety-brain, for that worst-case-scenario!)) with non-action (the amazing set of people in life have emotional and chaotic things to deal with which could have been avoided; worthwhile but unpolished work is not released into the world for others to make use of) and decide the how to act (or not). Then build in [[Threat Model Responses|mitigation and fall-backs]] into the structure of this control system. Here's one example:&lt;br /&gt;
====Yearly Test====&lt;br /&gt;
Send a yearly test email to The List once a year. Do all the mechanisms still work? Do people know where to find files, and can they gain access? If the password on the vault has changed, this is a good time to be sure the halves-holders have the newest version. It's also a good time to get assurance that people 'want' to be on the list, and are willing to perform their tasks - do they respond to a yearly message? If not, you might not want to include them on the actuality dire eventually.&lt;br /&gt;
&lt;br /&gt;
==[[Open Source Cadavers|A body]]==&lt;br /&gt;
Is it possible to donate a cadaver with Open Access stipulations? In this section of the wiki, the logistics, law, and advocacy are explored.&lt;br /&gt;
&lt;br /&gt;
Why is this so important? While any one contributor is unlikely to be a special snowflake for medical research, it's possible that, if enough people sign up for this, someone involved will be a [https://en.wikipedia.org/wiki/Henrietta_Lacks Henrietta Lacks]. As it's almost statistically impossible that any single person would be that profitable to an organization, it's likely to be a risk worth taking on the receiving organization's end. But it's a downstream obligation that, especially if it becomes common practice, opens up the benefits of medical research to a much wider part of the population than currently benefits.&lt;br /&gt;
&lt;br /&gt;
This downstream obligation could get tricky because the individual defining it won't have authority to uphold the obligations. They'll be dead. Granting authority in the living will and will via power of attorney is therefore essential. Ideally, the organization receiving the cadaver will voluntarily comply -- especially likely if the org is federally funded, because they'll be under the federal open access mandate. Combining these two things manifests as WILLING a body, as the body becomes an object after death, and attaching obligations accordingly.&lt;br /&gt;
&lt;br /&gt;
===Pledge to donate===&lt;br /&gt;
Be a part of open source cadavers by [http://bit.ly/oscdonate pledging to donate your body]. As the list grows, more attention will be paid to this as a viable model.&lt;br /&gt;
&lt;br /&gt;
==Completion==&lt;br /&gt;
Please remember, dear geeks - understanding the theory of this is NOT the same as ACTUALLY doing it. OSC sets up mechanisms for granting digital rights, for passing on passwords, for slow-release information, and for Open Access to information possible from death. Seeing the importance and care of fulfilling these steps means '''doing it'''. Every possible barrier to showing care for loved ones, and commitments to causes even postmortem has been removed. All it takes is a little premortem planning.&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	<entry>
		<id>http://networkedmortality.com/List_of_Cadaver_Programs</id>
		<title>List of Cadaver Programs</title>
		<link rel="alternate" type="text/html" href="http://networkedmortality.com/List_of_Cadaver_Programs"/>
				<updated>2014-10-21T03:21:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bl00: Protected &amp;quot;List of Cadaver Programs&amp;quot; ([Edit=Allow only autoconfirmed users] (indefinite) [Move=Allow only autoconfirmed users] (indefinite))&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! State&lt;br /&gt;
! Orga Name&lt;br /&gt;
! Address&lt;br /&gt;
! Phone Number&lt;br /&gt;
! Email&lt;br /&gt;
! Website&lt;br /&gt;
! Status&lt;br /&gt;
|-&lt;br /&gt;
| row 1, cell 1&lt;br /&gt;
| row 1, cell 2&lt;br /&gt;
| row 1, cell 3&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| row 2, cell 1&lt;br /&gt;
| row 2, cell 2&lt;br /&gt;
| row 2, cell 3&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Bl00</name></author>	</entry>

	</feed>