Dead-end pages

Jump to: navigation, search

The following pages do not link to other pages in IFF Wiki.

Showing below up to 481 results in range #1 to #481.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. "Guardía Indígena y Protección Territorial
  2. (Re)defining policy advocacy in the age of digital spaces
  3. 21st Century Activists Need 21st Century Skill Sets
  4. 5 años tras Wikileaks: presente y futuro de las filtraciones en España.
  5. 5 años tras https://internetfreedomfestival.org/wikileaks: presente y futuro de las filtraciones en España.
  6. APC member meeting
  7. A Dark Tale of Internet: Turkey's shutdowns, government backed online harassment, blockings
  8. A Fireside Chat about Internet Measurement, facilitated by M-Lab
  9. A People’s Index of Internet Health
  10. A Robotics Explanation of Cross-cultural Communication
  11. A new challenge to Freedom of Expression: online sexual & gender-based violence against women journalists
  12. Accesibilidad y Usabilidad en sitios Web
  13. Accessibility Consultant
  14. Accessible database of best practice law - digital rights & information freedom
  15. Advanced topics in GPG key security: smartcards and Yubikeys
  16. Adversary resistant computing: Subgraph OS
  17. Africa - Where net neutrality goes to die!
  18. African women and the Internet: Re-defining 'African Sexuality' and freedom of expression in the African Internet
  19. Ally Skills Workshop
  20. Analyzing the Causes & Impacts of Internet Shutdowns
  21. Anonymous communication & Decentralized trust
  22. Answers to 'I have nothing to hide'
  23. Applying Internet Freedom values to creative thinking
  24. April 16 2020 GM
  25. April 23 2020 GM
  26. April 2 2020 GM
  27. April 30 2020 GM
  28. April 9 2020 GM
  29. Architectures of Internet Freedom movements in Southeast Asia
  30. Area Atractions
  31. Autocrypt: Email Encryption for Everyone
  32. Autonomous Wireless and GSM Networks
  33. Aviary: Distributed, Tamper-Proof, Per-User Warrant Canaries
  34. Avoiding the Traps of Covering Freedom Online in Iran
  35. Bathrooms
  36. Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises
  37. Bitmask: encrypted email for mere mortals
  38. Bitmask encrypted email for mere mortals
  39. Bodies and algorithms: a global feminist approach to period trackers
  40. Bookkeeping for activist projects
  41. Bridging the Divide: talking to users, trainers, developers, and more!
  42. Bridging the localization gap: digital security tools for everyone
  43. Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning
  44. Browser Hyper-Extension
  45. Bug Reporting 101: How to make the tools we use better even if we can't code
  46. Build Usable Tools (2017)
  47. Building Community Resources for Censorship Measurement Research
  48. Building Security Culture Within Marginalized Communities
  49. Building a Digital Security Trainer Community in Latin America
  50. Building a shared framework for organizational security assessments
  51. Building an inclusive community: Code of Conduct principles and best practices
  52. Building better software
  53. Building collective power to counter violence and censorship against feminist and women groups on the Internet
  54. Building the Internet Policy Research Community: Bridging Divides and Fostering Collaboration for Impact
  55. Bursting the EU bubble: What you can do to save the link!
  56. COC Statements
  57. COC en Spanish
  58. Campaigning for privacy: sharing experiences, failures and victories
  59. Cancellation of the 2020 Internet Freedom Festival
  60. Care and Sustainability in Organizing
  61. Case study: Understanding internet censorship in Africa’s repressive environments through the deployment of OONI software probes and Citizen Lab mixed research methods.
  62. Cc volunteer
  63. Celebrating Gender Campaigns in the Global South
  64. Censorship Resistant Social Networking
  65. Censorship Resistant Social Networking with Quiver
  66. Censorship and online media in the CIS: lessons and best practices
  67. Challenging Corporate Secret, Using the Internet for Accountability
  68. Chatbots for journalists and news media
  69. Ciberfeminismo y autodefensa digital en tiempos de vigilancia, aprendizajes desde América Latina
  70. Clinics and Hospitals
  71. Coffee talks faces
  72. Collaborative Design of F.A.S.T. Internet Campaign
  73. Collaborative Sketching for Secure & Usable Apps
  74. Collaborative security: From Training to Empowerment
  75. Coming Back to Tech
  76. Coming shortly to your screens: Secure Group Messaging
  77. Communications campaigns and storytelling for freedom of speech and digital rights advocacy
  78. Community-led Organizational Security Assessment Process
  79. Community Culture
  80. Community ISPs: building alternative networks
  81. Community Networks, why and how?
  82. Community Updates 2018
  83. Community Updates 2019 Part 1
  84. Community Updates 2019 Part 2
  85. Comparing Security of Gay Dating Apps
  86. Conflicting signals. What direction Ukraine, Russia and Belarus will choose dealing with Internet Freedom?
  87. Construyendo comunidad para talleristas de seguridad digital en america latina - pasos concretos
  88. Consumer rights for Internet freedom! Mapping and checking the world's telcos and internet providers
  89. Content design - How to write words that people will read, understand and won't scare them
  90. Contextualizing censorship measurements in Venezuela
  91. Contrataciones abiertas en las instituciones: casos prácticos
  92. Conversations on Research Needs for Digital Rights Advocacy and Impact
  93. Creating Approaches to Rapid Response - Where are we now?
  94. Creating Apps for Political Expression
  95. Creating DigiSec Curricula for Trans* Communities
  96. Creating a Shared Knowledge Base of Arabic and Farsi Resources on Tech & Human Rights
  97. Creating a pedagogy of empowerment
  98. Creating an Oral History of Indymedia
  99. Creation of a Social Media Action Charter
  100. Creative multimedia producer consultant FRIDA
  101. Criptica Testing Session: Riot with e2e encryption
  102. Cuba: Update & Getting involved
  103. Cybercrime and Cybersecurity Legislation in South Africa
  104. DDoS self-defense - community resilience to a growing censorship threat
  105. DNS Meetup
  106. Data Exploration Hackathon: Visualizing the Relationship between Rule of Law and Digital Rights in MENA and Beyond
  107. Data Protection law and is different manifestations
  108. Datos como materia prima: herramienta para la publicación y reutilización de datos abiertos
  109. Dealing with Trauma and the Psycho Social Effects of Human Rights work
  110. Debate Abierto: sobre las dificultades para difundir contenidos educativos sobre salud sexual y derechos sexuales en Internet
  111. Defending the Onion
  112. Defensores del Voto: Estrategias digitales para la democracia y la participación electoral en Venezuela
  113. Deploy an emergency Libre-Mesh network with local services
  114. Designing Participatory Algorithmic Decision-Making Processes
  115. Developing Understanding via a Needfinding Approach
  116. Developing a Digital Advocacy Curriculum for the Global South
  117. Developing a censorship-resistant app store
  118. Developing and Sustaining Community/Network Sustained Resources
  119. Developing for Good UX
  120. DigSec Curricula Design: when your powers combine...
  121. Digestable Risk Assessment: creating a security booklet to encourage secure thoughts, not just security tools
  122. Digital Attacks Against Human Rights Defenders and Journalists in the Middle East and North Africa Region
  123. Digital Media Expert Required for an R&D Arts Project
  124. Digital Security & Investigative Journalism
  125. Digital Security Workshop for Journalists (Spanish)
  126. Digital Security for Journalists: Needs in the Field
  127. Digital Security for women human rights defenders (WHRD) as part of holistic and feminist practice in Latin America and the Caribbean (LAC)
  128. Digital Tools for Journalist Security
  129. Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)
  130. Digital security guides for the Latin American society
  131. Disruptive Media Activism for the IF Community
  132. Documentation Workflows for Digital Security Education and Rapid Response
  133. Don't Make Killer Apps: Responsible Development Beyond Code
  134. Ebola: A Big Humanitarian Data Disaster
  135. Economic Cultural and Social rights & the internet: the battle in the struggle for human rights
  136. Effective Messaging: Basic Concepts of Data Visualization
  137. El poder del enjambre digital para superar episodios de censura
  138. Emergency Numbers
  139. Enabling free speech online by legal defence: the need for skilled lawyers to secure the free flow of information online
  140. Encrypting A/V: How you can secure your equipment and encrypt your footage
  141. Entre la espada y la balanza: el incumplimiento de estándares internacionales sobre el derecho a la privacidad en América Latina
  142. Essentials of building internet tools for inclusion
  143. Ever wanted to chat with the NSA?
  144. Everything you ever wanted to know about tooling!
  145. Everything you ever wanted to know about what international human rights law is and how it can help fight surveillance, but were afraid to ask
  146. Evolving Terminology with Evolved Technology
  147. Exhibits & Night Events
  148. Explaining technical concepts in non-technical ways
  149. Explorations in Organizational Security
  150. Exploring models of governance and ownership in hackerspaces
  151. Exploring secure and anonymous video capture and distribution
  152. Expo Area
  153. Expressing yourself online: legal threats, and ways to defend against them
  154. F-Droid Discussion: your very own private, free, secure, and flexible Android app store
  155. F-Droid Hands-On: your very own private, free, secure, and flexible Android app store
  156. FOSS or FOSSIL: How can we ensure the sustainability of open source products?
  157. FTX (Feminist Tech Exchange): Safety Reboot
  158. Facebook Privacy and Security How-Tos
  159. Facebook Tunnel: a tale of restricted Internet access
  160. Facilitator Fall 2020
  161. Feedback on secure tools: Giving it and getting it more easily, with graphics
  162. Fighting the Chilling Effects of Surveillance in Protests: Strategies and Tactics for uncovering IMSI catchers, and how to stop them.
  163. Filterwatch: Internet Freedom in Iran
  164. Floor Plan
  165. Food Near Venue
  166. Forget (almost) everything you know: reassessing privilege and politics in digital advocacy
  167. Fostering a New Digital Security Pedagogy for More Inclusive Trainings
  168. Free Media in Unfree Societies
  169. Freedom of expression in Venezuela: Challenges of the new National Assembly
  170. Freenet Meeting
  171. From Ad Hoc to Prepared - Developing an Anti Online Harassment Infrastructure
  172. Funders Help Desk
  173. Fundraising Opportunities
  174. GM April 2 2020
  175. GNU Taler
  176. Gender Pronoun
  177. Gender deanonymization through machine learning - risks and implications.
  178. Gender gap in on-line projects, the problem in Wikimedia
  179. Getting gender inclusive from the ground to the cloud
  180. Glitter Meetup Notes Before March 26, 2020
  181. Glitter Meetup Schedule
  182. Globaleaks User forum
  183. Glocalization for Noobs: How to Design Tools for a Global Audience
  184. Grant writers' "happy" hour/coping group
  185. Grants Manager
  186. Grassroots gender activism in underprivileged areas: building education and awareness and fostering actions
  187. Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project
  188. Greenhost helpdesk
  189. Growing Up and Aware: What We Can Learn about Digital Safety from Youth in Jordan/Lebanon/Palestine
  190. Guardía Indígena y Protección Territorial
  191. Hacking User Centred Design for Social Change
  192. Hacking User Centred Design for Social Change Efforts
  193. Hakuna Metadata
  194. Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?
  195. Health Measures for COVID-19
  196. Herramientas para seguridad y protección
  197. Holding Companies to Account: Advocating for Corporate Respect for Human Rights
  198. Holistic Security: Practical Experiences and Reflections
  199. Holistic Security: subversive well-being for trainers
  200. Hotels
  201. How YNEXT strives to preventing an Internet blackout in times of war
  202. How activists, western media, and USBs and SD cards are revolutionizing North Korean society.
  203. How design choices reflect Internet policy strategies?
  204. How do we measure the health of the Internet?
  205. How governments in Southeast Asia (unsuccessfully) restrict free speech on social media
  206. How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators
  207. How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators
  208. How to Fight an Internet Shutdown
  209. How to Juggle
  210. How to organize a privacy advocacy event: Real cases histories, do's and don't
  211. How to run participatory trainings
  212. How to run participatory trainings and events
  213. How to work with a graphic designer: a guide for activists and civil society organizations
  214. How we are tracking politicians trying to hide information from online
  215. How we can end online harassment together
  216. Human Rights Technology for Challenging Environments
  217. Human behavior: the irrational component in internet security
  218. Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It
  219. IFF Schedule
  220. IFF Schedule:Sessions:IBeyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises
  221. IFF Schedule:Tracks:Community:session7
  222. IWMF & CPJ Roundtable on the Digital Harassment of Female Journalists
  223. Imagine, Create, Be. Gender and Technologies Workshop.
  224. Improving Circumvention Tool Usability Through Outreach
  225. Improving New User Experience
  226. Improving metholodogy: verifying leaks from anonymous online whistleblowing platforms
  227. Industry Standards Collaborative Conversation
  228. Insecurity demos, or how I learned to stop worrying and start loving digital security trainings
  229. Internet Censorship Roundtable
  230. Internet Censorship in Venezuelan Elections: Key Findings and what's next
  231. Internet Freedom in Africa: Navigating the challenges
  232. Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil
  233. Internet Protocols Demystified
  234. Internet rights versus policy making in Pakistan
  235. Intersectional DNS Working Group
  236. Introducing the Emergency Response Team at the Committee to Protect Journalists
  237. Investigating and defending against Malware Operations
  238. Investigating human rights violations arising from electronic surveillance
  239. Investigating internet controls with OONI
  240. Iranian Cyber Army
  241. Is mass adoption of secure email possible?
  242. It’s not just Activism: Art and Humour in Creative Strategies for Hard Times: (a Hands-On Workshop)
  243. Jnmazon
  244. Job Board
  245. Journalism and the Right to be Forgotten
  246. Journalism security: meeting the users where they live
  247. Journalists' Perceptions of Digital Security Technologies
  248. Karma Wall
  249. Kill the Messenger: Block, Erase, and Delete in the name of Freedom?
  250. LGBTQI+
  251. LGBTQI Centered Workshops: Lessons from Participants and Trainers
  252. LGBTQ in Spain
  253. La Protección de los datos personales en tiempos de open data
  254. Las culturas originarias y el Internet: alternativas contra la exclusión
  255. Legal Support Tech and Organizing for Uprisings, Mass Arrest, and Resistance
  256. Lets hack innovation!
  257. Liberating Free Knowledge - Countering Government Censorship on Wikipedia
  258. Listen to LGBT Experience in Indonesia and Help Us!
  259. Lived Surveillance in New York City: Design Implications for Mobile Messaging
  260. Localization Community Superteam: Lessons Learned and Innovative Approaches
  261. MENAleaks, bringing anonymous whistleblowing to the MENA region
  262. Making Global Voices Safer: Security, Risk and Reputation in a Decentralized Newsroom
  263. Making Technology Writing More Human-Centered
  264. Malware Against Political Dissidence in Latam
  265. Malware Analysis, Censorship Measurment in Iran, Big Data Visualization
  266. Mapping challenges in developing human rights documentation workflows
  267. Mass Surveillance in India
  268. May 12 2021 GM
  269. May 14 2020 GM
  270. May 212 2021 GM
  271. May 28 2020 GM
  272. May 7 2020 GM
  273. Media Relations Meet-Up: Share Your Questions and Share Your Answers
  274. Media Relations Meet-Up: Share Your Questions and Share Your Answers!
  275. Meetups
  276. Mesa Redonda: Privacidad, Gobierno Transparente y Libertad de Información
  277. Multilingual Design: Bringing Language Access to the Full Stack
  278. My data my choice my way
  279. Need / Offer
  280. Need Offer
  281. Net of Rights
  282. Network disconnections: Affects on Civil and Trade Rights
  283. Non-formal Education and the Integrated Approach to the Safety
  284. Not Too Inaccessible for Broadband: Connecting Remote Communities
  285. Nothing to Hide Documentary
  286. Notifications as a collateral freedom channel (self-organized)
  287. Nuevas tecnologías para los whistleblowers
  288. OPEN SOURCE BANKERS' JAILING
  289. OSScientific Method: How to use open source tech to build open research practice
  290. Ongoing Attacks: How Are NilePhish Manipulating NGOs and Activists in Egypt to Hack Them
  291. Online Information Controls and Circumvention for Civil Society Groups
  292. Online While Trans (OWT): Trans sexuality in the time of technology
  293. Online platforms as key players in political debate: power without responsibility?
  294. Online risk & security for LGBTI activists in Russia
  295. Online safety training for local journalists
  296. Open Integrity Initiative: How software practices impacts real
  297. Open Knowledge in Francophone Africa: When Researchers Thrive for Freedom
  298. Oportunidades de negocio y servicios de valor añadido reutilizando datos abiertos
  299. Optimization of resources for political elections
  300. OrgSec Village Notes
  301. Our Data Bodies: From Paranoia to Power
  302. Outcome Mapping Organisational Security
  303. PEN America seeks trainers/facilitators
  304. Panic button apps & the thin line between online & offline security for journalists and HR defenders
  305. Pedagogy for Digital Security Education
  306. Peerio User Testing
  307. Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.
  308. Planificando talleres de Seguridad Digital en entornos de riesgos para América Latina: retos, contextos y metodologías para compartir.
  309. Playing cat and mouse with Deep Packet Inspection
  310. Pluggable Transports
  311. Post-Truth Censorship: New Techniques for Realtime Shutdown Detection
  312. Post-televisión y medios libres en la Ciudad Monstruo
  313. Postdoctoral Researcher
  314. Practical and Actionable Threat Intelligence Collection
  315. Practical implementations of human rights respecting cybersecurity policy
  316. Pretty Good Graphics
  317. Preventing 'Vandalism' and Preserving Identity in Internet Activism
  318. Privacy-friendly Digital Identities
  319. Privacy Across Cultures
  320. Privacy and Security Policy
  321. Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?
  322. Promoting the African Declaration on Internet Rights and Freedoms
  323. Pronouns
  324. Propose a Self-Organized Session
  325. Propose a Session
  326. Protecting Dissent: A conversation on tactics, best practices and challenges for online and offline safety during protests
  327. Prototype Fund
  328. Prototyping Qubes trainings: Explore an OS that will map to your digital life(s)
  329. Prototyping Qubes trainings for different use-cases and communities
  330. Public Interest Data Science
  331. Queering The Internet: Sexual Expression and Censorship in Digital Domains
  332. Ranking ICT companies on digital rights: A "how to" guide
  333. Ranking tech companies part 2: software, devices and networking equipment
  334. Rapid Response To Targeted Threats: CiviCDR Case Study
  335. Recoding the the Rules - Designing with, not just for, the next billion Internet users.
  336. Refugees in Transit
  337. Regional Showcase
  338. Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support
  339. Regional solutions to local issues
  340. Registering and analyzing threats to digital security
  341. Reproducible Builds
  342. Research on security digital perspective of journalist in Indonesia and Philippines
  343. Resources for Internet Freedom
  344. Responsible Data at IFF
  345. Respuesta Rápida en América Latina - Y ahora ¿quien podrá ayudarme?
  346. Restrictions-to-FoE-Online-Russia
  347. Restrictions to Freedom of Expression Online In Russia
  348. Results and Key Findings measuring Internet censorship in Venezuelan Elections
  349. Revolutionary transparency in Ukrainian public procurement - how civil activist managed to create best e-procurement system in the world
  350. Right to digital privacy in Central America
  351. Rights and access at risk in Azerbaijan
  352. Risk Analysis from a Holistic Perspective
  353. Risk Analysis from a Holistic Perspective (1hr Session)
  354. SAFE Network by Maidsafe: the new crowd-sourced internet putting you in control of your data.
  355. Safeguarding media in Afghanistan – The history of the Afghan Journalist Safety Committee
  356. Safer Spaces
  357. Safer Spaces Research
  358. SaveTheInternet: Lessons learned from the fight for net neutrality
  359. SecureApp Generator: Easy, encrypted custom mobile apps for human rights documentation & data collection
  360. Secure Storage and File-Sharing for Freedom Fighters
  361. Secure communication and information management in rural areas
  362. Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism
  363. Securedrop
  364. Security Policy
  365. Security Without Borders Meetup
  366. Self-hosting for groups with Sandstorm.io
  367. Self Organized
  368. Self Organized: Hivos / OTF Digital Integrity Fellows Meetup
  369. Self Organized Sessions
  370. Self Organized Template
  371. Sept10 Asia Meetup
  372. Sesión Especial: Presentación Web de Transparencia
  373. Setting up Whistleblowing Activism Initiatives with GlobaLeaks
  374. Sharing JournoSec "Fails"
  375. Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)
  376. Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?
  377. Side Dish Regulation: Catching up with Regulation of Internet outside the mainstream
  378. Simulacros del terror y estrategias solidarias
  379. Sites
  380. Smart cities: networks of people, networks of vigilance?
  381. Social Events
  382. Social Media & At-Risk Groups
  383. Social engineering for the good of your users a.k.a. an introduction to user research.
  384. Social media monitoring in our favor - discussion
  385. Speaker Checklist
  386. State of Surveillance: Mexico
  387. State of secure hosting
  388. State of the VPN
  389. Stories from the Field: Designing with Users in Mind
  390. Strategic Litigation to protect Digital Human Rights
  391. Strengthening advocacy for Internet Freedoms in Africa
  392. Super! Quick! User Research Skillz! for! Digital! Security! Trainers!
  393. Surveillance from the Margins: Different Experiences of Surveillance
  394. TOTEM
  395. TRanslating Tails to spanish
  396. Tackling Barriers to Access, Participation and Impact of the Internet in the developing world
  397. Taking Matters into Our Hands: Addressing Online Harassment
  398. Taler : Buyer-Anonymous Electronic Transactions
  399. Talles de Seguridad Digital para Periodistas de habla hispana
  400. Teaching Machines to Learn Better: Mitigating Discrimination, Fostering Principled Governance and Communicating Expectations of Emerging AI
  401. Teaching security to junior web developers
  402. Technical Product Manager (anti-censorship team)
  403. Technology Battlefronts - How to Fight for the User
  404. The (Private) Public Sphere: Social Media Content Moderation and the Public Interest
  405. The 5 W's of journalistic self-protection
  406. The Case for Digital Rights: Strategies for increasing Private Sector accountability and transparency
  407. The Future of Internet Freedom In Sub-Saharan Africa
  408. The Global South Mixer Party
  409. The Internet Freedom Festival
  410. The SAFE Network: Evolving the Internet for Security, Privacy & Freedom
  411. The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation
  412. The State of Network Filtering Around the World
  413. The concept of CONSENT
  414. The identity we can't change: a new wave of biometric policies around the world
  415. The “South" Open Mic Party (part 1)
  416. The “South Open Mic Party (part 2)
  417. Therapist Document
  418. Therapist Primer
  419. Threats to encryption and the challenges for civil society. A comparative analysis between Europe and Latin America
  420. Time to fight back! If there is no Justice there is Escrache!
  421. To Serve and Protect: Panel discussion on the role of technology in the fight against abuse by law enforcement
  422. Toeing the line – ineffective and unjust national security strategies in MENA
  423. Tools vs threats model: making the conscious use of tools for trainees
  424. Tor help
  425. Towards freedom of consensual representation online
  426. Trainer Skill Share 1
  427. Trainer Skill Share 2
  428. Training Considerations for Inclusion of LGBTI Community
  429. Training to privacy advocacy and digital security from a gender perspective
  430. Transportation
  431. TrollGate: Taking On Cyber Harassment
  432. Turkey and Azerbaijan: One Nation, One Crackdown
  433. UI and Usability Jam Sessions
  434. UProxy
  435. UProxy and new ideas in the distributed VPN space
  436. Understanding Harassment Experiences of Female Journalists on Facebook
  437. Uniting The Front: Mapping The Collective Future Of Internet Freedom
  438. Unstructured Play
  439. Urban open tech: learnings from the inner-city
  440. Usability, Accessibility & Universal Design
  441. Usability in secure multi-party chat systems
  442. Usable and Accessible Security -- lessons learned by engaging with users
  443. User Experience Clinic
  444. User Research For All!
  445. User experience of configuring Tor in Tails (and Tor Browser and Whonix)
  446. Using data to enhance digital rights advocacy in the Middle East
  447. Using the Ranking Digital Rights Corporate Accountability Index for Advocacy & Research
  448. Verification&critical thinking. 10 best tools to verify information online.
  449. Vietnam's Challenges and Opportunities: An AMA with Vietnamese activists
  450. Vietnam: Challenges and Opportunities for Freedom of Expression
  451. Vigilancia Gubernamental y Seguridad Nacional
  452. Violencia de género en línea. Discusiones en torno al hate speech, el danger speech y los distintos contextos de violencia contra la mujer
  453. Virtual Currencies and Privacy - Bitcoin and Dash
  454. Volunteer Corner
  455. Vote1for better Elections
  456. WOC debate: fighting online harassment
  457. Walking the Talk: Holistic Security
  458. We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights
  459. What Do We Know About Behavior Change?
  460. What Does Internet Freedom Mean for LGBTQI Movements: A Conversation Between Activists and Funders
  461. What Should I Be Worried About?: Explaining information privacy and security concerns to students, researchers, and university faculty
  462. What can circumvention data tell us about the dynamics of internet censorship and online behaviour?
  463. What does re-usable & updatable content look like?
  464. What freedom lovers need to know about Internet governance
  465. What is Holistic Security and why is it important?
  466. What is left of the Hacking Team debate?
  467. What your apps say about you (and how to find out)
  468. WhatsApp and Risks for LGBTI Communities
  469. What’s working (or not) in policing online hate speech?
  470. When, why and how they leak? Thoughts on the psychology of whistleblowers.
  471. When Practice Informs Technology
  472. Whistler: Co-designing a toolkit for front line activists
  473. Who are your users and how do you know what they need?
  474. Whose History? Democratizing Narrative Agency and Securing Self Expression
  475. Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)
  476. Women Advocates and Trainers in Latin America
  477. Workshopping the KeepitOn Advocacy Toolkit: enhancing ways for stakeholders to fight shutdowns around the world
  478. You and your data
  479. Your "Enemy" Should Have a Place in Your Internet Space
  480. Your Stories
  481. Zcash: Freedom of Expression & Financial Privacy

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)