Enquiries related to advocacy initiatives will reveal another “afterlife” of
vulnerabilities analyzing how computer (in)security is mobilized, translated and embedded into ethical and political claims and controversies related to digital rights and governance.