Here all the workshops being held on the last day of AMRO20


14:00 - 15:30

Decentralized organizational models, held by an XR Austria participant

The good thing is that many organization models work well on a normal base during a regular day. But what will happen if there is an urgent situation? an emergency? Who is responsible to act, to communicate to talk for the group? In this workshop held by a XR Austria participant you will get to know how the XR organizational model works and then you will compare it with the one of your own organization.


14:00 - 16:00

Hacking & Developing Modular Synth Hardware, Trial#1

Noiselab Linz is offering a Workshop on Hacking and Developing simple Modular Synthesizer Hardware.


14:00 - 17:00

Post-Growth, DISNOVATION.ORG, Baruch Gottlieb

The workshop Post-Growth uses the frameworks of grassroots facilitation and gaming to structure a conversation about radical post-growth transformations in our lives. Is based on's toolkit designed to increase awareness of the multiple root causes of these crises — rather than their mere consequences — as a basis to stimulate and provide a foundation for post-growth imaginaries, models and practices


14:00 - 17:00


This is an online, intimate listening and co-writing workshop with discussion on DIY community networks and content repositories. It is based on the work of Not Found On, which over the past years has been co-creating a mediawiki platform to record/connect feminist queer intersectional knowledge.


16:00 - 17:00

Computational Cultural Publishing: Climate Emergency Sprint / Pt. 2, Simon Worthington

In this workshop you're invited to ask questions about what the open scientific literature knows about climate change using Open Climate Knowledge (OCKProject) data mining software.


17:00 - 17:45

Encrypt, Print, Decrypt!, Mara Karagianni

In this workshop we will look into creating visually encrypted messages with the help of python scripts. Visual Cryptography was developed in the 90s, and could be a low-energy-footprint alternative to algorithmic encryptions since it requires far less computational input.