Add new comment

How has current technology changed what vulnerability looks like?

How can we live vulnerably and authentically in a world of tweets and status updates?