Long pages

Jump to: navigation, search

Showing below up to 50 results in range #1 to #50.

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

  1. (hist) ‎Community Updates 2019 Part 1 ‎[63,559 bytes]
  2. (hist) ‎Community Updates 2018 ‎[62,372 bytes]
  3. (hist) ‎Community Updates ‎[58,215 bytes]
  4. (hist) ‎UI and Usability Jam Sessions ‎[19,509 bytes]
  5. (hist) ‎Test page ‎[19,146 bytes]
  6. (hist) ‎Full List of Sessions by Title ‎[18,827 bytes]
  7. (hist) ‎Cafe y Circumvention Manual de Organizadores ‎[17,328 bytes]
  8. (hist) ‎IFF Schedule:Sessions ‎[16,545 bytes]
  9. (hist) ‎Coffee and Circumvention Organizers Manual ‎[15,254 bytes]
  10. (hist) ‎Explorations in Organizational Security ‎[14,003 bytes]
  11. (hist) ‎Mass Surveillance in India ‎[12,071 bytes]
  12. (hist) ‎Practical and Actionable Threat Intelligence Collection ‎[11,726 bytes]
  13. (hist) ‎Self-Organized Schedule ‎[11,231 bytes]
  14. (hist) ‎Encrypting A/V: How you can secure your equipment and encrypt your footage ‎[10,722 bytes]
  15. (hist) ‎Taking MENA Holistic Privacy Practice and Digital Security Research to Next Level ‎[10,334 bytes]
  16. (hist) ‎Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism ‎[10,159 bytes]
  17. (hist) ‎Documentation Workflows for Digital Security Education and Rapid Response ‎[9,015 bytes]
  18. (hist) ‎Investigating internet controls with OONI ‎[8,543 bytes]
  19. (hist) ‎Workshopping the KeepitOn Advocacy Toolkit: enhancing ways for stakeholders to fight shutdowns around the world ‎[7,954 bytes]
  20. (hist) ‎How do we measure the health of the Internet? ‎[7,914 bytes]
  21. (hist) ‎LGBTQI+ ‎[7,862 bytes]
  22. (hist) ‎Digital Security for women human rights defenders (WHRD) as part of holistic and feminist practice in Latin America and the Caribbean (LAC) ‎[7,411 bytes]
  23. (hist) ‎Codigo de Conducta ‎[7,374 bytes]
  24. (hist) ‎Threats to encryption and the challenges for civil society. A comparative analysis between Europe and Latin America ‎[7,363 bytes]
  25. (hist) ‎La Protección de los datos personales en tiempos de open data ‎[6,892 bytes]
  26. (hist) ‎Practical implementations of human rights respecting cybersecurity policy ‎[6,817 bytes]
  27. (hist) ‎Fostering a New Digital Security Pedagogy for More Inclusive Trainings ‎[6,809 bytes]
  28. (hist) ‎Malware Against Political Dissidence in Latam ‎[6,472 bytes]
  29. (hist) ‎Smart cities: networks of people, networks of vigilance? ‎[6,360 bytes]
  30. (hist) ‎My data my choice my way ‎[6,319 bytes]
  31. (hist) ‎Censorship and online media in the CIS: lessons and best practices ‎[6,089 bytes]
  32. (hist) ‎The identity we can't change: a new wave of biometric policies around the world ‎[6,024 bytes]
  33. (hist) ‎Creating Apps for Political Expression ‎[6,024 bytes]
  34. (hist) ‎F-Droid Discussion: your very own private, free, secure, and flexible Android app store ‎[5,392 bytes]
  35. (hist) ‎F-Droid Hands-On: your very own private, free, secure, and flexible Android app store ‎[5,388 bytes]
  36. (hist) ‎Vietnam: Challenges and Opportunities for Freedom of Expression ‎[5,382 bytes]
  37. (hist) ‎Code of Conduct ‎[5,335 bytes]
  38. (hist) ‎Self Organized Sessions ‎[5,256 bytes]
  39. (hist) ‎What does re-usable & updatable content look like? ‎[5,205 bytes]
  40. (hist) ‎Recoding the the Rules - Designing with, not just for, the next billion Internet users. ‎[5,175 bytes]
  41. (hist) ‎Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations) ‎[5,107 bytes]
  42. (hist) ‎Walking the Talk: Holistic Security ‎[5,051 bytes]
  43. (hist) ‎Internet as a gateaway for censorship: a glimpse of Venezuela´s situation ‎[5,034 bytes]
  44. (hist) ‎Journalism and the Right to be Forgotten ‎[4,982 bytes]
  45. (hist) ‎Refugees in Transit ‎[4,949 bytes]
  46. (hist) ‎Community Culture ‎[4,905 bytes]
  47. (hist) ‎Getting gender inclusive from the ground to the cloud ‎[4,845 bytes]
  48. (hist) ‎The concept of CONSENT ‎[4,800 bytes]
  49. (hist) ‎Building a shared framework for organizational security assessments ‎[4,677 bytes]
  50. (hist) ‎Playing cat and mouse with Deep Packet Inspection ‎[4,483 bytes]

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)