Full List of Sessions by Title

From IFF Wiki
Jump to: navigation, search

21st Century Activists Need 21st Century Skill Sets

5 años tras Wikileaks: presente y futuro de las filtraciones en España.

A Fireside Chat about Internet Measurement, facilitated by M-Lab

A Robotics Explanation of Cross-cultural Communication

Accessible database of best practice law - digital rights & information freedom

Advanced topics in GPG key security: smartcards and Yubikeys

Adversary resistant computing: Subgraph OS

Africa - Where net neutrality goes to die!

Africa Meetup

Applied Threat Modeling & How I Learned to Start Loving Digital Security Trainings

Autonomus Wireless and GSM Networks

Avoiding the Traps of Covering Freedom Online in Iran

Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises

Big Brother and its Corporate Twin

Bridging the Divide: talking to users, trainers, developers, and more!

Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning

Bug Reporting 101: How to make the tools we use better even if we can't code

Build Usable Tools

Building a shared framework for organizational security assessments

Building an inclusive community: Code of Conduct principles and best practices

Building better software

Building Security Culture Within Marginalized Communities

Censorship and online media in the CIS: lessons and best practices

Challenging Corporate Secret, Using the Internet for Accountability

Challenging dominant stories in digital rights

Coming shortly to your screens: Secure Group Messaging

Comparing Security of Gay Dating Apps

Content design - How to write words that people will read, understand and won't scare them

Cuba: Update & Getting involved

Cybercrime and Cybersecurity Legislation in South Africa

Dealing with Trauma and the Psycho Social Effects of Human Rights work

Deploy an emergency Libre-Mesh network with local services

Designing Participatory Algorithmic Decision-Making Processes

Developing a Digital Advocacy Curriculum for the Global South

Developing Understanding via a Needfinding Approach

Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)

Digital Tools for Journalist Security

DigSec Curricula Design: when your powers combine...

Don't Make Killer Apps: Responsible Development Beyond Code

Ebola: A Big Humanitarian Data Disaster

El poder del enjambre digital para superar episodios de censura

Evolving Terminology with Evolved Technology

Explorations in Organizational Security

F-Droid Discussion: your very own private, free, secure, and flexible Android app store

F-Droid Hands-On: your very own private, free, secure, and flexible Android app store

Feedback on secure tools: Giving it and getting it more easily, with graphics

Freedom of expression in Venezuela: Challenges of the new National Assembly

Gender gap in on-line projects, the problem in Wikimedia

Glocalization for Noobs: How to Design Tools for a Global Audience

Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project

Guardía Indígena y Protección Territorial

Hacking User Centred Design for Social Change Efforts

Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?

Herramientas para seguridad y protección

Holding Companies to Account: Advocating for Corporate Respect for Human Rights

Holistic Security: subversive well-being for trainers

How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators

How to Fight an Internet Shutdown

How to organize a privacy advocacy event: Real cases histories, do's and don't

How to run participatory trainings and events

How we can end online harassment together

How women get advantage from ICT : A sharing from Indonesia

Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It

Improving New User Experience

Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil

Internet Protocols Demystified

Investigating human rights violations arising from electronic surveillance

Iranian Cyber Army

Is mass adoption of secure email possible?

Journalism security: meeting the users where they live

Las culturas originarias y el Internet: alternativas contra la exclusión

Latin America Meetup

Machine Learning to Understand and Evade Mass Surveillance Methods on the Internet

Malware Against Political Dissidence in Latam

Men and technology

Middle East Meetup

Multilingual Design: Bringing Language Access to the Full Stack

Network disconnections: Affects on Civil and Trade Rights

Non-formal Education and the Integrated Approach to the Safety

Not Too Inaccessible for Broadband: Connecting Remote Communities

Online Information Controls and Circumvention for Civil Society Groups

Open Integrity Initiative: How software practices impacts real


OSScientific Method: How to use open source tech to build open research practice

Pedagogy for Digital Security Education

Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.

Preventing 'Vandalism' and Preserving Identity in Internet Activism

Privacy Across Cultures

Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?

prototyping Qubes trainings for different use-cases and communities

Ranking ICT companies on digital rights: A "how to" guide

Ranking tech companies part 2: software, devices and networking equipment

Recoding the the Rules - Designing with, not just for, the next billion Internet users.

Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support

Reproducible Builds

Resources for Internet Freedom

Risk Analysis from a Holistic Perspective

#SaveTheInternet: Lessons learned from the fight for net neutrality

Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism

Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)

Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?

Significance of Big Data to Socio Economic Development in Municipalities in Africa

Smart cities: networks of people, networks of vigilance?

Social engineering for the good of your users a.k.a. an introduction to user research.

Southeast Asia Meetup

State of secure hosting

State of the VPN

Strengthening advocacy for Internet Freedoms in Africa

Tackling Barriers to Access, Participation and Impact of the Internet in the developing world

Talles de Seguridad Digital para Periodistas de habla hispana

Teaching security to junior web developers

Technology Battlefronts - How to Fight for the User

The “South Open Mic Party (part 2)

The “South" Open Mic Party (part 1)

The 5 W's of journalistic self-protection

The concept of CONSENT

The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation

Time to fight back! If there is no Justice there is Escrache!

Toeing the line – ineffective and unjust national security strategies in MENA

Tools vs threats model: making the conscious use of tools for trainees

Tor on Mobile

Towards freedom of consensual representation online

Trainer Skill Share 1

Trainer Skill Share 2

Training Considerations for Inclusion of LGBTI Community

Training to privacy advocacy and digital security from a gender perspective

TRanslating Tails to spanish

#TrollGate: Taking On Cyber Harassment

UI and Usability Jam Sessions

Unstructured Play

urban open tech: learnings from the inner-city

User experience of configuring Tor in Tails (and Tor Browser and Whonix)

User Research For All!

Using data to enhance digital rights advocacy in the Middle East

Vigilancia Gubernamental y Seguridad Nacional

Violencia de género en línea. Discusiones en torno al hate speech, el danger speech y los distintos contextos de violencia contra la mujer

Vote (1) for better Elections

We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights

What can circumvention data tell us about the dynamics of internet censorship and online behaviour?

What Do We Know About Behavior Change?

What does re-usable & updatable content look like?

What freedom lovers need to know about Internet governance

What is Holistic Security and why is it important?

What is left of the Hacking Team debate?

What your apps say about you (and how to find out)

What’s working (or not) in policing online hate speech?

WhatsApp and Risks for LGBTI Communities

When, why and how they leak? Thoughts on the psychology of whistleblowers.

Women Advocates and Trainers in Latin America

Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)

You and your data

Your "Enemy" Should Have a Place in Your Internet Space