In this section we will unpack how computational infrastructures operate and what impact that has on the digital systems that are being built on top of them.
* What are elements that shape (or are shaped by) computational infrastructures?
* How can we understand the harm caused by computational infrastructures and the systems which deploy them?
* What interventions are possible to mitigate or eliminate this harm?
* What kind of limitations do you see in the realisation of these interventions?
<!-- Her work focuses on privacy enhancing and protective optimization technologies (PETs and POTs), privacy engineering, as well as questions around software infrastructures, social justice and political economy as they intersect with computer science. -->