Pages with the most categories

Jump to: navigation, search

Showing below up to 375 results in range #1 to #375.

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

  1. Mapping political innovation in Latin America‏‎ (6 categories)
  2. Build Usable Tools (2017)‏‎ (6 categories)
  3. Applying Internet Freedom values to creative thinking‏‎ (6 categories)
  4. Imagine, Create, Be. Gender and Technologies Workshop.‏‎ (6 categories)
  5. Panic button apps & the thin line between online & offline security for journalists and HR defenders‏‎ (6 categories)
  6. User Experience Clinic‏‎ (6 categories)
  7. How to work with a graphic designer: a guide for activists and civil society organizations‏‎ (6 categories)
  8. Digital Security for Journalists: Needs in the Field‏‎ (6 categories)
  9. State of Surveillance: Mexico‏‎ (6 categories)
  10. Economic Cultural and Social rights & the internet: the battle in the struggle for human rights‏‎ (6 categories)
  11. Optimization of resources for political elections‏‎ (6 categories)
  12. Ally Skills Workshop‏‎ (6 categories)
  13. FOSS or FOSSIL: How can we ensure the sustainability of open source products?‏‎ (6 categories)
  14. Organizational Security: Long-term engagements Do’s and Don’ts‏‎ (6 categories)
  15. Regional solutions to local issues‏‎ (6 categories)
  16. Digital security guides for the Latin American society‏‎ (6 categories)
  17. Getting gender inclusive from the ground to the cloud‏‎ (6 categories)
  18. How YNEXT strives to preventing an Internet blackout in times of war‏‎ (5 categories)
  19. Internet Freedom in Africa: Navigating the challenges‏‎ (5 categories)
  20. Investigating internet controls with OONI‏‎ (5 categories)
  21. Kill the Messenger: Block, Erase, and Delete in the name of Freedom?‏‎ (5 categories)
  22. Localization Community Superteam: Lessons Learned and Innovative Approaches‏‎ (5 categories)
  23. Accesibilidad y Usabilidad en sitios Web‏‎ (5 categories)
  24. Our Data Bodies: From Paranoia to Power‏‎ (5 categories)
  25. Analyzing the Causes & Impacts of Internet Shutdowns‏‎ (5 categories)
  26. Bitmask: encrypted email for mere mortals‏‎ (5 categories)
  27. Queering The Internet: Sexual Expression and Censorship in Digital Domains‏‎ (5 categories)
  28. Building the Internet Policy Research Community: Bridging Divides and Fostering Collaboration for Impact‏‎ (5 categories)
  29. Registering and analyzing threats to digital security‏‎ (5 categories)
  30. Rights and access at risk in Azerbaijan‏‎ (5 categories)
  31. Coming Back to Tech‏‎ (5 categories)
  32. Secure Storage and File-Sharing for Freedom Fighters‏‎ (5 categories)
  33. Conflicting signals. What direction Ukraine, Russia and Belarus will choose dealing with Internet Freedom?‏‎ (5 categories)
  34. Creating Approaches to Rapid Response - Where are we now?‏‎ (5 categories)
  35. Social Media & At-Risk Groups‏‎ (5 categories)
  36. DDoS self-defense - community resilience to a growing censorship threat‏‎ (5 categories)
  37. Taking MENA Holistic Privacy Practice and Digital Security Research to Next Level‏‎ (5 categories)
  38. Encrypting A/V: How you can secure your equipment and encrypt your footage‏‎ (5 categories)
  39. Turkey and Azerbaijan: One Nation, One Crackdown‏‎ (5 categories)
  40. Usability in secure multi-party chat systems‏‎ (5 categories)
  41. Verification&critical thinking. 10 best tools to verify information online.‏‎ (5 categories)
  42. How activists, western media, and USBs and SD cards are revolutionizing North Korean society.‏‎ (5 categories)
  43. Workshopping the KeepitOn Advocacy Toolkit: enhancing ways for stakeholders to fight shutdowns around the world‏‎ (5 categories)
  44. IWMF & CPJ Roundtable on the Digital Harassment of Female Journalists‏‎ (5 categories)
  45. LGBTQI Centered Workshops: Lessons from Participants and Trainers‏‎ (5 categories)
  46. Mass Surveillance in India‏‎ (5 categories)
  47. Online platforms as key players in political debate: power without responsibility?‏‎ (5 categories)
  48. Outcome Mapping Organisational Security‏‎ (5 categories)
  49. Post-Truth Censorship: New Techniques for Realtime Shutdown Detection‏‎ (5 categories)
  50. Building Community Resources for Censorship Measurement Research‏‎ (5 categories)
  51. Bursting the EU bubble: What you can do to save the link!‏‎ (5 categories)
  52. Chatbots for journalists and news media‏‎ (5 categories)
  53. Secure communication and information management in rural areas‏‎ (5 categories)
  54. Consent experience design workshop‏‎ (5 categories)
  55. Setting up Whistleblowing Activism Initiatives with GlobaLeaks‏‎ (5 categories)
  56. Creating Apps for Political Expression‏‎ (5 categories)
  57. Data Exploration Hackathon: Visualizing the Relationship between Rule of Law and Digital Rights in MENA and Beyond‏‎ (5 categories)
  58. Taking Matters into Our Hands: Addressing Online Harassment‏‎ (5 categories)
  59. Documentation Workflows for Digital Security Education and Rapid Response‏‎ (5 categories)
  60. Entre la espada y la balanza: el incumplimiento de estándares internacionales sobre el derecho a la privacidad en América Latina‏‎ (5 categories)
  61. Facebook Tunnel: a tale of restricted Internet access‏‎ (5 categories)
  62. Usable and Accessible Security -- lessons learned by engaging with users‏‎ (5 categories)
  63. From Ad Hoc to Prepared - Developing an Anti Online Harassment Infrastructure‏‎ (5 categories)
  64. Vietnam's Challenges and Opportunities: An AMA with Vietnamese activists‏‎ (5 categories)
  65. What Should I Be Worried About?: Explaining information privacy and security concerns to students, researchers, and university faculty‏‎ (5 categories)
  66. Hakuna Metadata‏‎ (5 categories)
  67. How design choices reflect Internet policy strategies?‏‎ (5 categories)
  68. Online risk & security for LGBTI activists in Russia‏‎ (5 categories)
  69. Architectures of Internet Freedom movements in Southeast Asia‏‎ (5 categories)
  70. Bodies and algorithms: a global feminist approach to period trackers‏‎ (5 categories)
  71. Promoting the African Declaration on Internet Rights and Freedoms‏‎ (5 categories)
  72. Research on security digital perspective of journalist in Indonesia and Philippines‏‎ (5 categories)
  73. Ciberfeminismo y autodefensa digital en tiempos de vigilancia, aprendizajes desde América Latina‏‎ (5 categories)
  74. Communications campaigns and storytelling for freedom of speech and digital rights advocacy‏‎ (5 categories)
  75. Creating a pedagogy of empowerment‏‎ (5 categories)
  76. Data Protection law and is different manifestations‏‎ (5 categories)
  77. Super! Quick! User Research Skillz! for! Digital! Security! Trainers!‏‎ (5 categories)
  78. Developing a censorship-resistant app store‏‎ (5 categories)
  79. Digital Security Workshop for Journalists (Spanish)‏‎ (5 categories)
  80. The Case for Digital Rights: Strategies for increasing Private Sector accountability and transparency‏‎ (5 categories)
  81. Essentials of building internet tools for inclusion‏‎ (5 categories)
  82. Exploring secure and anonymous video capture and distribution‏‎ (5 categories)
  83. When Practice Informs Technology‏‎ (5 categories)
  84. How do we measure the health of the Internet?‏‎ (5 categories)
  85. Improving Circumvention Tool Usability Through Outreach‏‎ (5 categories)
  86. Internet as a gateaway for censorship: a glimpse of Venezuela´s situation‏‎ (5 categories)
  87. It’s not just Activism: Art and Humour in Creative Strategies for Hard Times: (a Hands-On Workshop)‏‎ (5 categories)
  88. MENAleaks, bringing anonymous whistleblowing to the MENA region‏‎ (5 categories)
  89. Online safety training for local journalists‏‎ (5 categories)
  90. Autocrypt: Email Encryption for Everyone‏‎ (5 categories)
  91. Practical and Actionable Threat Intelligence Collection‏‎ (5 categories)
  92. Bookkeeping for activist projects‏‎ (5 categories)
  93. Protecting Dissent: A conversation on tactics, best practices and challenges for online and offline safety during protests‏‎ (5 categories)
  94. Campaigning for privacy: sharing experiences, failures and victories‏‎ (5 categories)
  95. Researching and resisting information controls from a distance: challenges and opportunities‏‎ (5 categories)
  96. SAFE Network by Maidsafe: the new crowd-sourced internet putting you in control of your data.‏‎ (5 categories)
  97. Community-led Organizational Security Assessment Process‏‎ (5 categories)
  98. Consumer rights for Internet freedom! Mapping and checking the world's telcos and internet providers‏‎ (5 categories)
  99. SpeakUp: Digital activism against corruption in the Arab World‏‎ (5 categories)
  100. Surveillance from the Margins: Different Experiences of Surveillance‏‎ (5 categories)
  101. Teaching Machines to Learn Better: Mitigating Discrimination, Fostering Principled Governance and Communicating Expectations of Emerging AI‏‎ (5 categories)
  102. Expressing yourself online: legal threats, and ways to defend against them‏‎ (5 categories)
  103. Fighting the Chilling Effects of Surveillance in Protests: Strategies and Tactics for uncovering IMSI catchers, and how to stop them.‏‎ (5 categories)
  104. Grassroots gender activism in underprivileged areas: building education and awareness and fostering actions‏‎ (5 categories)
  105. Whistler: Co-designing a toolkit for front line activists‏‎ (5 categories)
  106. How governments in Southeast Asia (unsuccessfully) restrict free speech on social media‏‎ (5 categories)
  107. How we are tracking politicians trying to hide information from online‏‎ (5 categories)
  108. Making Global Voices Safer: Security, Risk and Reputation in a Decentralized Newsroom‏‎ (5 categories)
  109. My data my choice my way‏‎ (5 categories)
  110. Practical implementations of human rights respecting cybersecurity policy‏‎ (5 categories)
  111. Safeguarding media in Afghanistan – The history of the Afghan Journalist Safety Committee‏‎ (5 categories)
  112. Developing for Good UX‏‎ (5 categories)
  113. Digital Security for women human rights defenders (WHRD) as part of holistic and feminist practice in Latin America and the Caribbean (LAC)‏‎ (5 categories)
  114. Everything you ever wanted to know about tooling!‏‎ (5 categories)
  115. Uniting The Front: Mapping The Collective Future Of Internet Freedom‏‎ (5 categories)
  116. Filterwatch: Internet Freedom in Iran‏‎ (5 categories)
  117. Who are your users and how do you know what they need?‏‎ (5 categories)
  118. Improving metholodogy: verifying leaks from anonymous online whistleblowing platforms‏‎ (5 categories)
  119. Introducing the Emergency Response Team at the Committee to Protect Journalists‏‎ (5 categories)
  120. Journalism and the Right to be Forgotten‏‎ (5 categories)
  121. African women and the Internet: Re-defining 'African Sexuality' and freedom of expression in the African Internet‏‎ (5 categories)
  122. Aviary: Distributed, Tamper-Proof, Per-User Warrant Canaries‏‎ (5 categories)
  123. Pretty Good Graphics‏‎ (5 categories)
  124. Bridging the localization gap: digital security tools for everyone‏‎ (5 categories)
  125. Prototyping Qubes trainings: Explore an OS that will map to your digital life(s)‏‎ (5 categories)
  126. Refugees in Transit‏‎ (5 categories)
  127. Case study: Understanding internet censorship in Africa’s repressive environments through the deployment of OONI software probes and Citizen Lab mixed research methods.‏‎ (5 categories)
  128. Respuesta Rápida en América Latina - Y ahora ¿quien podrá ayudarme?‏‎ (5 categories)
  129. Contextualizing censorship measurements in Venezuela‏‎ (5 categories)
  130. Side Dish Regulation: Catching up with Regulation of Internet outside the mainstream‏‎ (5 categories)
  131. Defensores del Voto: Estrategias digitales para la democracia y la participación electoral en Venezuela‏‎ (5 categories)
  132. To Serve and Protect: Panel discussion on the role of technology in the fight against abuse by law enforcement‏‎ (5 categories)
  133. Everything you ever wanted to know about what international human rights law is and how it can help fight surveillance, but were afraid to ask‏‎ (5 categories)
  134. Using CameraV for systematic violation documentation in post-conflict contexts‏‎ (5 categories)
  135. Gender deanonymization through machine learning - risks and implications.‏‎ (5 categories)
  136. Walking the Talk: Holistic Security‏‎ (5 categories)
  137. Whose History? Democratizing Narrative Agency and Securing Self Expression‏‎ (5 categories)
  138. Human Rights Technology for Challenging Environments‏‎ (5 categories)
  139. Investigating and defending against Malware Operations‏‎ (5 categories)
  140. Liberating Free Knowledge - Countering Government Censorship on Wikipedia‏‎ (5 categories)
  141. A new challenge to Freedom of Expression: online sexual & gender-based violence against women journalists‏‎ (5 categories)
  142. Planificando talleres de Seguridad Digital en entornos de riesgos para América Latina: retos, contextos y metodologías para compartir.‏‎ (5 categories)
  143. Celebrating Gender Campaigns in the Global South‏‎ (5 categories)
  144. Collaborative Sketching for Secure & Usable Apps‏‎ (5 categories)
  145. Digestable Risk Assessment: creating a security booklet to encourage secure thoughts, not just security tools‏‎ (5 categories)
  146. Tell it to the World! Podcasting and Storytelling for Activists‏‎ (5 categories)
  147. The State of Network Filtering Around the World‏‎ (5 categories)
  148. Fostering a New Digital Security Pedagogy for More Inclusive Trainings‏‎ (5 categories)
  149. Growing Up and Aware: What We Can Learn about Digital Safety from Youth in Jordan/Lebanon/Palestine‏‎ (5 categories)
  150. Human behavior: the irrational component in internet security‏‎ (5 categories)
  151. Journalists' Perceptions of Digital Security Technologies‏‎ (5 categories)
  152. Listen to LGBT Experience in Indonesia and Help Us!‏‎ (5 categories)
  153. Playing cat and mouse with Deep Packet Inspection‏‎ (5 categories)
  154. Public Interest Data Science‏‎ (5 categories)
  155. Building collective power to counter violence and censorship against feminist and women groups on the Internet‏‎ (5 categories)
  156. Right to digital privacy in Central America‏‎ (5 categories)
  157. Collaborative security: From Training to Empowerment‏‎ (5 categories)
  158. Strategic Litigation to protect Digital Human Rights‏‎ (5 categories)
  159. Digital Attacks Against Human Rights Defenders and Journalists in the Middle East and North Africa Region‏‎ (5 categories)
  160. The (Private) Public Sphere: Social Media Content Moderation and the Public Interest‏‎ (5 categories)
  161. Enabling free speech online by legal defence: the need for skilled lawyers to secure the free flow of information online‏‎ (5 categories)
  162. Explaining technical concepts in non-technical ways‏‎ (5 categories)
  163. FTX (Feminist Tech Exchange): Safety Reboot‏‎ (5 categories)
  164. Usability, Accessibility & Universal Design‏‎ (5 categories)
  165. Free Media in Unfree Societies‏‎ (5 categories)
  166. Using the Ranking Digital Rights Corporate Accountability Index for Advocacy & Research‏‎ (5 categories)
  167. Malware Against Political Dissidence in Latam‏‎ (4 categories)
  168. TRanslating Tails to spanish‏‎ (4 categories)
  169. Malware Analysis, Censorship Measurment in Iran, Big Data Visualization‏‎ (4 categories)
  170. Gender gap in on-line projects, the problem in Wikimedia‏‎ (4 categories)
  171. Smart cities: networks of people, networks of vigilance?‏‎ (4 categories)
  172. How to organize a privacy advocacy event: Real cases histories, do's and don't‏‎ (3 categories)
  173. Disruptive Media Activism for the IF Community‏‎ (3 categories)
  174. Freedom of expression in Venezuela: Challenges of the new National Assembly‏‎ (3 categories)
  175. Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil‏‎ (3 categories)
  176. Blockchain ISOC SIG meetup‏‎ (3 categories)
  177. Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?‏‎ (3 categories)
  178. Risk Analysis from a Holistic Perspective‏‎ (3 categories)
  179. Social engineering for the good of your users a.k.a. an introduction to user research.‏‎ (3 categories)
  180. Risk Analysis from a Holistic Perspective (1hr Session)‏‎ (3 categories)
  181. Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism‏‎ (3 categories)
  182. Your "Enemy" Should Have a Place in Your Internet Space‏‎ (3 categories)
  183. A Dark Tale of Internet: Turkey's shutdowns, government backed online harassment, blockings‏‎ (3 categories)
  184. Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)‏‎ (3 categories)
  185. Ever wanted to chat with the NSA?‏‎ (3 categories)
  186. Internet policymaking for civil society in ICANN‏‎ (3 categories)
  187. OSScientific Method: How to use open source tech to build open research practice‏‎ (3 categories)
  188. A Fireside Chat about Internet Measurement, facilitated by M-Lab‏‎ (3 categories)
  189. Bridging the Divide: talking to users, trainers, developers, and more!‏‎ (3 categories)
  190. Content design - How to write words that people will read, understand and won't scare them‏‎ (3 categories)
  191. Dealing with Trauma and the Psycho Social Effects of Human Rights work‏‎ (3 categories)
  192. Gender Issues and Connecting the next billion‏‎ (3 categories)
  193. Building an inclusive community: Code of Conduct principles and best practices‏‎ (3 categories)
  194. Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support‏‎ (3 categories)
  195. Revolutionary transparency in Ukrainian public procurement - how civil activist managed to create best e-procurement system in the world‏‎ (3 categories)
  196. Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)‏‎ (3 categories)
  197. Training to privacy advocacy and digital security from a gender perspective‏‎ (3 categories)
  198. Holistic Security: subversive well-being for trainers‏‎ (3 categories)
  199. Conversations on Research Needs for Digital Rights Advocacy and Impact‏‎ (3 categories)
  200. Hacking User Centred Design for Social Change‏‎ (2 categories)
  201. WhatsApp and Risks for LGBTI Communities‏‎ (2 categories)
  202. Women Advocates and Trainers in Latin America‏‎ (2 categories)
  203. Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It‏‎ (2 categories)
  204. Not Too Inaccessible for Broadband: Connecting Remote Communities‏‎ (2 categories)
  205. "Guardía Indígena y Protección Territorial‏‎ (2 categories)
  206. Online While Trans (OWT): Trans sexuality in the time of technology‏‎ (2 categories)
  207. Privacy Across Cultures‏‎ (2 categories)
  208. Challenging Corporate Secret, Using the Internet for Accountability‏‎ (2 categories)
  209. Self Organized Template‏‎ (2 categories)
  210. Strengthening advocacy for Internet Freedoms in Africa‏‎ (2 categories)
  211. Developing Understanding via a Needfinding Approach‏‎ (2 categories)
  212. Digital Security & Investigative Journalism‏‎ (2 categories)
  213. The 5 W's of journalistic self-protection‏‎ (2 categories)
  214. The identity we can't change: a new wave of biometric policies around the world‏‎ (2 categories)
  215. Tor help‏‎ (2 categories)
  216. Explorations in Organizational Security‏‎ (2 categories)
  217. Facebook Privacy and Security How-Tos‏‎ (2 categories)
  218. What Does Internet Freedom Mean for LGBTQI Movements: A Conversation Between Activists and Funders‏‎ (2 categories)
  219. Hacking User Centred Design for Social Change Efforts‏‎ (2 categories)
  220. What’s working (or not) in policing online hate speech?‏‎ (2 categories)
  221. How to run participatory trainings‏‎ (2 categories)
  222. Iranian Cyber Army‏‎ (2 categories)
  223. Localization Help Desk‏‎ (2 categories)
  224. Notifications as a collateral freedom channel (self-organized)‏‎ (2 categories)
  225. 21st Century Activists Need 21st Century Skill Sets‏‎ (2 categories)
  226. Accessible database of best practice law - digital rights & information freedom‏‎ (2 categories)
  227. Ranking ICT companies on digital rights: A "how to" guide‏‎ (2 categories)
  228. Reproducible Builds‏‎ (2 categories)
  229. Coming shortly to your screens: Secure Group Messaging‏‎ (2 categories)
  230. Strong Second-Factor Authentication For Your (Facebook, Google, Etc.) Accounts - Free U2F Keys and Setup Help‏‎ (2 categories)
  231. Developing a Digital Advocacy Curriculum for the Global South‏‎ (2 categories)
  232. Digital Security Education for Artists: A Convo on Threats and Contributions‏‎ (2 categories)
  233. The Aleph: Crunching Data for Investigative Reporting‏‎ (2 categories)
  234. Tor on Mobile‏‎ (2 categories)
  235. Exploring models of governance and ownership in hackerspaces‏‎ (2 categories)
  236. UI and Usability Jam Sessions‏‎ (2 categories)
  237. Glocalization for Noobs: How to Design Tools for a Global Audience‏‎ (2 categories)
  238. When, why and how they leak? Thoughts on the psychology of whistleblowers.‏‎ (2 categories)
  239. You and your data‏‎ (2 categories)
  240. How to run participatory trainings and events‏‎ (2 categories)
  241. Internet Protocols Demystified‏‎ (2 categories)
  242. Is mass adoption of secure email possible?‏‎ (2 categories)
  243. La Protección de los datos personales en tiempos de open data‏‎ (2 categories)
  244. Nuevas tecnologías para los whistleblowers‏‎ (2 categories)
  245. APC member meeting‏‎ (2 categories)
  246. Advanced topics in GPG key security: smartcards and Yubikeys‏‎ (2 categories)
  247. Post-televisión y medios libres en la Ciudad Monstruo‏‎ (2 categories)
  248. Building Security Culture Within Marginalized Communities‏‎ (2 categories)
  249. Ranking tech companies part 2: software, devices and networking equipment‏‎ (2 categories)
  250. Construyendo comunidad para talleristas de seguridad digital en america latina - pasos concretos‏‎ (2 categories)
  251. Sharing JournoSec "Fails"‏‎ (2 categories)
  252. Social media monitoring in our favor - discussion‏‎ (2 categories)
  253. Talles de Seguridad Digital para Periodistas de habla hispana‏‎ (2 categories)
  254. Don't Make Killer Apps: Responsible Development Beyond Code‏‎ (2 categories)
  255. The “South Open Mic Party (part 2)‏‎ (2 categories)
  256. UProxy‏‎ (2 categories)
  257. Feedback on secure tools: Giving it and getting it more easily, with graphics‏‎ (2 categories)
  258. Funders Help Desk‏‎ (2 categories)
  259. Vigilancia Gubernamental y Seguridad Nacional‏‎ (2 categories)
  260. Grafoscopio‏‎ (2 categories)
  261. What can circumvention data tell us about the dynamics of internet censorship and online behaviour?‏‎ (2 categories)
  262. Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?‏‎ (2 categories)
  263. Las culturas originarias y el Internet: alternativas contra la exclusión‏‎ (2 categories)
  264. Multilingual Design: Bringing Language Access to the Full Stack‏‎ (2 categories)
  265. OPEN SOURCE BANKERS' JAILING‏‎ (2 categories)
  266. Adversary resistant computing: Subgraph OS‏‎ (2 categories)
  267. Pedagogy for Digital Security Education‏‎ (2 categories)
  268. Building a Digital Security Trainer Community in Latin America‏‎ (2 categories)
  269. Rapid Response To Targeted Threats: CiviCDR Case Study‏‎ (2 categories)
  270. Securedrop‏‎ (2 categories)
  271. Creating an Oral History of Indymedia‏‎ (2 categories)
  272. Datos como materia prima: herramienta para la publicación y reutilización de datos abiertos‏‎ (2 categories)
  273. Developing and Sustaining Community/Network Sustained Resources‏‎ (2 categories)
  274. The Future of Internet Freedom In Sub-Saharan Africa‏‎ (2 categories)
  275. Threats to encryption and the challenges for civil society. A comparative analysis between Europe and Latin America‏‎ (2 categories)
  276. Understanding Harassment Experiences of Female Journalists on Facebook‏‎ (2 categories)
  277. User Research For All!‏‎ (2 categories)
  278. GNU Taler‏‎ (2 categories)
  279. Vote1for better Elections‏‎ (2 categories)
  280. What does re-usable & updatable content look like?‏‎ (2 categories)
  281. What freedom lovers need to know about Internet governance‏‎ (2 categories)
  282. Herramientas para seguridad y protección‏‎ (2 categories)
  283. Zcash: Freedom of Expression & Financial Privacy‏‎ (2 categories)
  284. Improving New User Experience‏‎ (2 categories)
  285. Jnmazon‏‎ (2 categories)
  286. Legal Support Tech and Organizing for Uprisings, Mass Arrest, and Resistance‏‎ (2 categories)
  287. Open Integrity Initiative: How software practices impacts real‏‎ (2 categories)
  288. Africa - Where net neutrality goes to die!‏‎ (2 categories)
  289. Peerio User Testing‏‎ (2 categories)
  290. Autonomous Wireless and GSM Networks‏‎ (2 categories)
  291. Prototype Fund‏‎ (2 categories)
  292. Building a shared framework for organizational security assessments‏‎ (2 categories)
  293. Recoding the the Rules - Designing with, not just for, the next billion Internet users.‏‎ (2 categories)
  294. Care and Sustainability in Organizing‏‎ (2 categories)
  295. Resources for Internet Freedom‏‎ (2 categories)
  296. Community ISPs: building alternative networks‏‎ (2 categories)
  297. Security Without Borders Meetup‏‎ (2 categories)
  298. Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?‏‎ (2 categories)
  299. Creation of a Social Media Action Charter‏‎ (2 categories)
  300. TOTEM‏‎ (2 categories)
  301. Teaching security to junior web developers‏‎ (2 categories)
  302. The Global South Mixer Party‏‎ (2 categories)
  303. Ebola: A Big Humanitarian Data Disaster‏‎ (2 categories)
  304. F-Droid Discussion: your very own private, free, secure, and flexible Android app store‏‎ (2 categories)
  305. User experience of configuring Tor in Tails (and Tor Browser and Whonix)‏‎ (2 categories)
  306. WOC debate: fighting online harassment‏‎ (2 categories)
  307. Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project‏‎ (2 categories)
  308. What is Holistic Security and why is it important?‏‎ (2 categories)
  309. Holding Companies to Account: Advocating for Corporate Respect for Human Rights‏‎ (2 categories)
  310. How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators‏‎ (2 categories)
  311. How we can end online harassment together‏‎ (2 categories)
  312. Lets hack innovation!‏‎ (2 categories)
  313. Network disconnections: Affects on Civil and Trade Rights‏‎ (2 categories)
  314. Ongoing Attacks: How Are NilePhish Manipulating NGOs and Activists in Egypt to Hack Them‏‎ (2 categories)
  315. A Robotics Explanation of Cross-cultural Communication‏‎ (2 categories)
  316. Oportunidades de negocio y servicios de valor añadido reutilizando datos abiertos‏‎ (2 categories)
  317. Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.‏‎ (2 categories)
  318. Community Networks, why and how?‏‎ (2 categories)
  319. Self-hosting for groups with Sandstorm.io‏‎ (2 categories)
  320. Criptica Testing Session: Riot with e2e encryption‏‎ (2 categories)
  321. State of secure hosting‏‎ (2 categories)
  322. DigSec Curricula Design: when your powers combine...‏‎ (2 categories)
  323. Technology Battlefronts - How to Fight for the User‏‎ (2 categories)
  324. Digital Tools for Journalist Security‏‎ (2 categories)
  325. The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation‏‎ (2 categories)
  326. Training Considerations for Inclusion of LGBTI Community‏‎ (2 categories)
  327. F-Droid Hands-On: your very own private, free, secure, and flexible Android app store‏‎ (2 categories)
  328. Forget (almost) everything you know: reassessing privilege and politics in digital advocacy‏‎ (2 categories)
  329. Greenhost helpdesk‏‎ (2 categories)
  330. What is left of the Hacking Team debate?‏‎ (2 categories)
  331. Holistic Security: Practical Experiences and Reflections‏‎ (2 categories)
  332. How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators‏‎ (2 categories)
  333. Independent Consultant Gabfest/Conversation‏‎ (2 categories)
  334. Journalism security: meeting the users where they live‏‎ (2 categories)
  335. Ongoing Attacks: How Are NilePhish Manipulating NGOs and Activists in Egypt to Hack Them?‏‎ (2 categories)
  336. Avoiding the Traps of Covering Freedom Online in Iran‏‎ (2 categories)
  337. Preventing 'Vandalism' and Preserving Identity in Internet Activism‏‎ (2 categories)
  338. Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning‏‎ (2 categories)
  339. Prototyping Qubes trainings for different use-cases and communities‏‎ (2 categories)
  340. Building better software‏‎ (2 categories)
  341. Self Organized‏‎ (2 categories)
  342. Contrataciones abiertas en las instituciones: casos prácticos‏‎ (2 categories)
  343. Simulacros del terror y estrategias solidarias‏‎ (2 categories)
  344. Cuba: Update & Getting involved‏‎ (2 categories)
  345. State of the VPN‏‎ (2 categories)
  346. Deploy an emergency Libre-Mesh network with local services‏‎ (2 categories)
  347. Tackling Barriers to Access, Participation and Impact of the Internet in the developing world‏‎ (2 categories)
  348. El poder del enjambre digital para superar episodios de censura‏‎ (2 categories)
  349. Toeing the line – ineffective and unjust national security strategies in MENA‏‎ (2 categories)
  350. Evolving Terminology with Evolved Technology‏‎ (2 categories)
  351. Urban open tech: learnings from the inner-city‏‎ (2 categories)
  352. Using data to enhance digital rights advocacy in the Middle East‏‎ (2 categories)
  353. We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights‏‎ (2 categories)
  354. What your apps say about you (and how to find out)‏‎ (2 categories)
  355. Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)‏‎ (2 categories)
  356. How to Fight an Internet Shutdown‏‎ (2 categories)
  357. Insecurity demos, or how I learned to stop worrying and start loving digital security trainings‏‎ (2 categories)
  358. Investigating human rights violations arising from electronic surveillance‏‎ (2 categories)
  359. Mapping challenges in developing human rights documentation workflows‏‎ (2 categories)
  360. Non-formal Education and the Integrated Approach to the Safety‏‎ (2 categories)
  361. Online Information Controls and Circumvention for Civil Society Groups‏‎ (2 categories)
  362. Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises‏‎ (2 categories)
  363. Privacy-friendly Digital Identities‏‎ (2 categories)
  364. Bug Reporting 101: How to make the tools we use better even if we can't code‏‎ (2 categories)
  365. Censorship and online media in the CIS: lessons and best practices‏‎ (2 categories)
  366. SaveTheInternet: Lessons learned from the fight for net neutrality‏‎ (2 categories)
  367. Comparing Security of Gay Dating Apps‏‎ (2 categories)
  368. Self Organized: Hivos / OTF Digital Integrity Fellows Meetup‏‎ (2 categories)
  369. Cybercrime and Cybersecurity Legislation in South Africa‏‎ (2 categories)
  370. Designing Participatory Algorithmic Decision-Making Processes‏‎ (2 categories)
  371. The concept of CONSENT‏‎ (2 categories)
  372. Tools vs threats model: making the conscious use of tools for trainees‏‎ (2 categories)
  373. TrollGate: Taking On Cyber Harassment‏‎ (2 categories)
  374. What Do We Know About Behavior Change?‏‎ (2 categories)
  375. Guardía Indígena y Protección Territorial‏‎ (2 categories)

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)