Oldest pages

Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. Tracks‏‎ (16:52, 4 February 2016)
  2. IFF Schedule:Sessions:IBeyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises‏‎ (00:12, 5 February 2016)
  3. IFF Schedule:Sessions‏‎ (00:17, 5 February 2016)
  4. IFF Schedule:Tracks:Community:session7‏‎ (00:21, 5 February 2016)
  5. IFF Schedule:Tracks:Research‏‎ (01:58, 5 February 2016)
  6. How to Juggle‏‎ (19:54, 6 February 2016)
  7. Proposed Self-Organized Sessions‏‎ (20:00, 6 February 2016)
  8. Your Stories‏‎ (23:35, 9 February 2016)
  9. DigSec Curricula Design: when your powers combine...‏‎ (00:10, 18 February 2016)
  10. The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation‏‎ (00:12, 18 February 2016)
  11. Developing a Digital Advocacy Curriculum for the Global South‏‎ (00:14, 18 February 2016)
  12. What is Holistic Security and why is it important?‏‎ (00:15, 18 February 2016)
  13. Preventing 'Vandalism' and Preserving Identity in Internet Activism‏‎ (00:16, 18 February 2016)
  14. How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators‏‎ (00:21, 18 February 2016)
  15. Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises‏‎ (00:23, 18 February 2016)
  16. SaveTheInternet: Lessons learned from the fight for net neutrality‏‎ (00:24, 18 February 2016)
  17. OPEN SOURCE BANKERS' JAILING‏‎ (00:25, 18 February 2016)
  18. Evolving Terminology with Evolved Technology‏‎ (00:27, 18 February 2016)
  19. Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project‏‎ (00:29, 18 February 2016)
  20. How to Fight an Internet Shutdown‏‎ (00:31, 18 February 2016)
  21. Investigating human rights violations arising from electronic surveillance‏‎ (00:48, 18 February 2016)
  22. Resources for Internet Freedom‏‎ (00:49, 18 February 2016)
  23. How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators‏‎ (09:42, 18 February 2016)
  24. El poder del enjambre digital para superar episodios de censura‏‎ (10:01, 18 February 2016)
  25. Ranking ICT companies on digital rights: A "how to" guide‏‎ (10:24, 18 February 2016)
  26. Network disconnections: Affects on Civil and Trade Rights‏‎ (10:27, 18 February 2016)
  27. Accessible database of best practice law - digital rights & information freedom‏‎ (10:29, 18 February 2016)
  28. 21st Century Activists Need 21st Century Skill Sets‏‎ (10:31, 18 February 2016)
  29. Improving New User Experience‏‎ (10:32, 18 February 2016)
  30. User Research For All!‏‎ (10:33, 18 February 2016)
  31. Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It‏‎ (10:37, 18 February 2016)
  32. You and your data‏‎ (10:52, 18 February 2016)
  33. User experience of configuring Tor in Tails (and Tor Browser and Whonix)‏‎ (10:53, 18 February 2016)
  34. TrollGate: Taking On Cyber Harassment‏‎ (10:53, 18 February 2016)
  35. What’s working (or not) in policing online hate speech?‏‎ (10:53, 18 February 2016)
  36. Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?‏‎ (10:57, 18 February 2016)
  37. The concept of CONSENT‏‎ (10:58, 18 February 2016)
  38. We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights‏‎ (10:59, 18 February 2016)
  39. Not Too Inaccessible for Broadband: Connecting Remote Communities‏‎ (11:00, 18 February 2016)
  40. Recoding the the Rules - Designing with, not just for, the next billion Internet users.‏‎ (11:00, 18 February 2016)
  41. Cuba: Update & Getting involved‏‎ (11:00, 18 February 2016)
  42. Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?‏‎ (11:01, 18 February 2016)
  43. Vote1for better Elections‏‎ (11:01, 18 February 2016)
  44. What is left of the Hacking Team debate?‏‎ (11:03, 18 February 2016)
  45. When, why and how they leak? Thoughts on the psychology of whistleblowers.‏‎ (11:03, 18 February 2016)
  46. Digital Tools for Journalist Security‏‎ (11:04, 18 February 2016)
  47. Journalism security: meeting the users where they live‏‎ (11:04, 18 February 2016)
  48. Ranking tech companies part 2: software, devices and networking equipment‏‎ (11:11, 18 February 2016)
  49. Internet Protocols Demystified‏‎ (11:23, 18 February 2016)
  50. Adversary resistant computing: Subgraph OS‏‎ (11:24, 18 February 2016)

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)