Oldest pages

Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Tracks‏‎ (17:52, 4 February 2016)
  2. IFF Schedule:Sessions:IBeyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises‏‎ (01:12, 5 February 2016)
  3. IFF Schedule:Sessions‏‎ (01:17, 5 February 2016)
  4. IFF Schedule:Tracks:Community:session7‏‎ (01:21, 5 February 2016)
  5. IFF Schedule:Tracks:Research‏‎ (02:58, 5 February 2016)
  6. How to Juggle‏‎ (20:54, 6 February 2016)
  7. Proposed Self-Organized Sessions‏‎ (21:00, 6 February 2016)
  8. Your Stories‏‎ (00:35, 10 February 2016)
  9. DigSec Curricula Design: when your powers combine...‏‎ (01:10, 18 February 2016)
  10. The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation‏‎ (01:12, 18 February 2016)
  11. Developing a Digital Advocacy Curriculum for the Global South‏‎ (01:14, 18 February 2016)
  12. What is Holistic Security and why is it important?‏‎ (01:15, 18 February 2016)
  13. Preventing 'Vandalism' and Preserving Identity in Internet Activism‏‎ (01:16, 18 February 2016)
  14. How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators‏‎ (01:21, 18 February 2016)
  15. Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises‏‎ (01:23, 18 February 2016)
  16. SaveTheInternet: Lessons learned from the fight for net neutrality‏‎ (01:24, 18 February 2016)
  17. OPEN SOURCE BANKERS' JAILING‏‎ (01:25, 18 February 2016)
  18. Evolving Terminology with Evolved Technology‏‎ (01:27, 18 February 2016)
  19. Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project‏‎ (01:29, 18 February 2016)
  20. How to Fight an Internet Shutdown‏‎ (01:31, 18 February 2016)
  21. Investigating human rights violations arising from electronic surveillance‏‎ (01:48, 18 February 2016)
  22. Resources for Internet Freedom‏‎ (01:49, 18 February 2016)
  23. How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators‏‎ (10:42, 18 February 2016)
  24. El poder del enjambre digital para superar episodios de censura‏‎ (11:01, 18 February 2016)
  25. Ranking ICT companies on digital rights: A "how to" guide‏‎ (11:24, 18 February 2016)
  26. Network disconnections: Affects on Civil and Trade Rights‏‎ (11:27, 18 February 2016)
  27. Accessible database of best practice law - digital rights & information freedom‏‎ (11:29, 18 February 2016)
  28. 21st Century Activists Need 21st Century Skill Sets‏‎ (11:31, 18 February 2016)
  29. Improving New User Experience‏‎ (11:32, 18 February 2016)
  30. User Research For All!‏‎ (11:33, 18 February 2016)
  31. Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It‏‎ (11:37, 18 February 2016)
  32. You and your data‏‎ (11:52, 18 February 2016)
  33. User experience of configuring Tor in Tails (and Tor Browser and Whonix)‏‎ (11:53, 18 February 2016)
  34. TrollGate: Taking On Cyber Harassment‏‎ (11:53, 18 February 2016)
  35. What’s working (or not) in policing online hate speech?‏‎ (11:53, 18 February 2016)
  36. Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?‏‎ (11:57, 18 February 2016)
  37. The concept of CONSENT‏‎ (11:58, 18 February 2016)
  38. We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights‏‎ (11:59, 18 February 2016)
  39. Not Too Inaccessible for Broadband: Connecting Remote Communities‏‎ (12:00, 18 February 2016)
  40. Recoding the the Rules - Designing with, not just for, the next billion Internet users.‏‎ (12:00, 18 February 2016)
  41. Cuba: Update & Getting involved‏‎ (12:00, 18 February 2016)
  42. Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?‏‎ (12:01, 18 February 2016)
  43. Vote1for better Elections‏‎ (12:01, 18 February 2016)
  44. What is left of the Hacking Team debate?‏‎ (12:03, 18 February 2016)
  45. When, why and how they leak? Thoughts on the psychology of whistleblowers.‏‎ (12:03, 18 February 2016)
  46. Digital Tools for Journalist Security‏‎ (12:04, 18 February 2016)
  47. Journalism security: meeting the users where they live‏‎ (12:04, 18 February 2016)
  48. Ranking tech companies part 2: software, devices and networking equipment‏‎ (12:11, 18 February 2016)
  49. Internet Protocols Demystified‏‎ (12:23, 18 February 2016)
  50. Adversary resistant computing: Subgraph OS‏‎ (12:24, 18 February 2016)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)