Pages with the most categories

Jump to: navigation, search

Showing below up to 125 results in range #251 to #375.

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)

  1. WhatsApp and Risks for LGBTI Communities‏‎ (2 categories)
  2. Women Advocates and Trainers in Latin America‏‎ (2 categories)
  3. Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It‏‎ (2 categories)
  4. Not Too Inaccessible for Broadband: Connecting Remote Communities‏‎ (2 categories)
  5. "Guardía Indígena y Protección Territorial‏‎ (2 categories)
  6. Online While Trans (OWT): Trans sexuality in the time of technology‏‎ (2 categories)
  7. Privacy Across Cultures‏‎ (2 categories)
  8. Challenging Corporate Secret, Using the Internet for Accountability‏‎ (2 categories)
  9. Self Organized Template‏‎ (2 categories)
  10. Strengthening advocacy for Internet Freedoms in Africa‏‎ (2 categories)
  11. Developing Understanding via a Needfinding Approach‏‎ (2 categories)
  12. Digital Security & Investigative Journalism‏‎ (2 categories)
  13. The 5 W's of journalistic self-protection‏‎ (2 categories)
  14. The identity we can't change: a new wave of biometric policies around the world‏‎ (2 categories)
  15. Tor on Mobile‏‎ (2 categories)
  16. Exploring models of governance and ownership in hackerspaces‏‎ (2 categories)
  17. UI and Usability Jam Sessions‏‎ (2 categories)
  18. Glocalization for Noobs: How to Design Tools for a Global Audience‏‎ (2 categories)
  19. Hacking User Centred Design for Social Change Efforts‏‎ (2 categories)
  20. What’s working (or not) in policing online hate speech?‏‎ (2 categories)
  21. How to run participatory trainings‏‎ (2 categories)
  22. Iranian Cyber Army‏‎ (2 categories)
  23. Localization Help Desk‏‎ (2 categories)
  24. Notifications as a collateral freedom channel (self-organized)‏‎ (2 categories)
  25. 21st Century Activists Need 21st Century Skill Sets‏‎ (2 categories)
  26. Accessible database of best practice law - digital rights & information freedom‏‎ (2 categories)
  27. Ranking ICT companies on digital rights: A "how to" guide‏‎ (2 categories)
  28. Reproducible Builds‏‎ (2 categories)
  29. Coming shortly to your screens: Secure Group Messaging‏‎ (2 categories)
  30. Strong Second-Factor Authentication For Your (Facebook, Google, Etc.) Accounts - Free U2F Keys and Setup Help‏‎ (2 categories)
  31. Developing a Digital Advocacy Curriculum for the Global South‏‎ (2 categories)
  32. Digital Security Education for Artists: A Convo on Threats and Contributions‏‎ (2 categories)
  33. The Aleph: Crunching Data for Investigative Reporting‏‎ (2 categories)
  34. The “South Open Mic Party (part 2)‏‎ (2 categories)
  35. UProxy‏‎ (2 categories)
  36. Feedback on secure tools: Giving it and getting it more easily, with graphics‏‎ (2 categories)
  37. Funders Help Desk‏‎ (2 categories)
  38. Vigilancia Gubernamental y Seguridad Nacional‏‎ (2 categories)
  39. Grafoscopio‏‎ (2 categories)
  40. What can circumvention data tell us about the dynamics of internet censorship and online behaviour?‏‎ (2 categories)
  41. When, why and how they leak? Thoughts on the psychology of whistleblowers.‏‎ (2 categories)
  42. You and your data‏‎ (2 categories)
  43. How to run participatory trainings and events‏‎ (2 categories)
  44. Internet Protocols Demystified‏‎ (2 categories)
  45. Is mass adoption of secure email possible?‏‎ (2 categories)
  46. La Protección de los datos personales en tiempos de open data‏‎ (2 categories)
  47. Nuevas tecnologías para los whistleblowers‏‎ (2 categories)
  48. APC member meeting‏‎ (2 categories)
  49. Advanced topics in GPG key security: smartcards and Yubikeys‏‎ (2 categories)
  50. Post-televisión y medios libres en la Ciudad Monstruo‏‎ (2 categories)
  51. Building Security Culture Within Marginalized Communities‏‎ (2 categories)
  52. Ranking tech companies part 2: software, devices and networking equipment‏‎ (2 categories)
  53. Construyendo comunidad para talleristas de seguridad digital en america latina - pasos concretos‏‎ (2 categories)
  54. Sharing JournoSec "Fails"‏‎ (2 categories)
  55. Social media monitoring in our favor - discussion‏‎ (2 categories)
  56. Talles de Seguridad Digital para Periodistas de habla hispana‏‎ (2 categories)
  57. Don't Make Killer Apps: Responsible Development Beyond Code‏‎ (2 categories)
  58. Threats to encryption and the challenges for civil society. A comparative analysis between Europe and Latin America‏‎ (2 categories)
  59. Understanding Harassment Experiences of Female Journalists on Facebook‏‎ (2 categories)
  60. User Research For All!‏‎ (2 categories)
  61. GNU Taler‏‎ (2 categories)
  62. Vote1for better Elections‏‎ (2 categories)
  63. What does re-usable & updatable content look like?‏‎ (2 categories)
  64. Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?‏‎ (2 categories)
  65. Las culturas originarias y el Internet: alternativas contra la exclusión‏‎ (2 categories)
  66. Multilingual Design: Bringing Language Access to the Full Stack‏‎ (2 categories)
  67. OPEN SOURCE BANKERS' JAILING‏‎ (2 categories)
  68. Adversary resistant computing: Subgraph OS‏‎ (2 categories)
  69. Pedagogy for Digital Security Education‏‎ (2 categories)
  70. Building a Digital Security Trainer Community in Latin America‏‎ (2 categories)
  71. Rapid Response To Targeted Threats: CiviCDR Case Study‏‎ (2 categories)
  72. Securedrop‏‎ (2 categories)
  73. Creating an Oral History of Indymedia‏‎ (2 categories)
  74. Datos como materia prima: herramienta para la publicación y reutilización de datos abiertos‏‎ (2 categories)
  75. Developing and Sustaining Community/Network Sustained Resources‏‎ (2 categories)
  76. The Future of Internet Freedom In Sub-Saharan Africa‏‎ (2 categories)
  77. F-Droid Discussion: your very own private, free, secure, and flexible Android app store‏‎ (2 categories)
  78. User experience of configuring Tor in Tails (and Tor Browser and Whonix)‏‎ (2 categories)
  79. WOC debate: fighting online harassment‏‎ (2 categories)
  80. Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project‏‎ (2 categories)
  81. What freedom lovers need to know about Internet governance‏‎ (2 categories)
  82. Herramientas para seguridad y protección‏‎ (2 categories)
  83. Zcash: Freedom of Expression & Financial Privacy‏‎ (2 categories)
  84. Improving New User Experience‏‎ (2 categories)
  85. Jnmazon‏‎ (2 categories)
  86. Legal Support Tech and Organizing for Uprisings, Mass Arrest, and Resistance‏‎ (2 categories)
  87. Open Integrity Initiative: How software practices impacts real‏‎ (2 categories)
  88. Africa - Where net neutrality goes to die!‏‎ (2 categories)
  89. Peerio User Testing‏‎ (2 categories)
  90. Autonomous Wireless and GSM Networks‏‎ (2 categories)
  91. Prototype Fund‏‎ (2 categories)
  92. Building a shared framework for organizational security assessments‏‎ (2 categories)
  93. Recoding the the Rules - Designing with, not just for, the next billion Internet users.‏‎ (2 categories)
  94. Care and Sustainability in Organizing‏‎ (2 categories)
  95. Resources for Internet Freedom‏‎ (2 categories)
  96. Community ISPs: building alternative networks‏‎ (2 categories)
  97. Security Without Borders Meetup‏‎ (2 categories)
  98. Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?‏‎ (2 categories)
  99. Creation of a Social Media Action Charter‏‎ (2 categories)
  100. TOTEM‏‎ (2 categories)
  101. Teaching security to junior web developers‏‎ (2 categories)
  102. The Global South Mixer Party‏‎ (2 categories)
  103. Ebola: A Big Humanitarian Data Disaster‏‎ (2 categories)
  104. Training Considerations for Inclusion of LGBTI Community‏‎ (2 categories)
  105. F-Droid Hands-On: your very own private, free, secure, and flexible Android app store‏‎ (2 categories)
  106. Forget (almost) everything you know: reassessing privilege and politics in digital advocacy‏‎ (2 categories)
  107. Greenhost helpdesk‏‎ (2 categories)
  108. What is Holistic Security and why is it important?‏‎ (2 categories)
  109. Holding Companies to Account: Advocating for Corporate Respect for Human Rights‏‎ (2 categories)
  110. How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators‏‎ (2 categories)
  111. How we can end online harassment together‏‎ (2 categories)
  112. Lets hack innovation!‏‎ (2 categories)
  113. Network disconnections: Affects on Civil and Trade Rights‏‎ (2 categories)
  114. Ongoing Attacks: How Are NilePhish Manipulating NGOs and Activists in Egypt to Hack Them‏‎ (2 categories)
  115. A Robotics Explanation of Cross-cultural Communication‏‎ (2 categories)
  116. Oportunidades de negocio y servicios de valor añadido reutilizando datos abiertos‏‎ (2 categories)
  117. Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.‏‎ (2 categories)
  118. Community Networks, why and how?‏‎ (2 categories)
  119. Self-hosting for groups with Sandstorm.io‏‎ (2 categories)
  120. Criptica Testing Session: Riot with e2e encryption‏‎ (2 categories)
  121. State of secure hosting‏‎ (2 categories)
  122. DigSec Curricula Design: when your powers combine...‏‎ (2 categories)
  123. Technology Battlefronts - How to Fight for the User‏‎ (2 categories)
  124. Digital Tools for Journalist Security‏‎ (2 categories)
  125. The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation‏‎ (2 categories)

View (previous 250 | next 250) (20 | 50 | 100 | 250 | 500)