21st Century Activists Need 21st Century Skill Sets
5 años tras Wikileaks: presente y futuro de las filtraciones en España.
A Fireside Chat about Internet Measurement, facilitated by M-Lab
A Robotics Explanation of Cross-cultural Communication
Accessible database of best practice law - digital rights & information freedom
Advanced topics in GPG key security: smartcards and Yubikeys
Adversary resistant computing: Subgraph OS
Africa - Where net neutrality goes to die!
Applied Threat Modeling & How I Learned to Start Loving Digital Security Trainings
Autonomus Wireless and GSM Networks
Avoiding the Traps of Covering Freedom Online in Iran
Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises
Big Brother and its Corporate Twin
Bridging the Divide: talking to users, trainers, developers, and more!
Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning
Bug Reporting 101: How to make the tools we use better even if we can't code
Build Usable Tools
Building a shared framework for organizational security assessments
Building an inclusive community: Code of Conduct principles and best practices
Building better software
Building Security Culture Within Marginalized Communities
Censorship and online media in the CIS: lessons and best practices
Challenging Corporate Secret, Using the Internet for Accountability
Challenging dominant stories in digital rights
Coming shortly to your screens: Secure Group Messaging
Comparing Security of Gay Dating Apps
Content design - How to write words that people will read, understand and won't scare them
Cuba: Update & Getting involved
Cybercrime and Cybersecurity Legislation in South Africa
Dealing with Trauma and the Psycho Social Effects of Human Rights work
Deploy an emergency Libre-Mesh network with local services
Designing Participatory Algorithmic Decision-Making Processes
Developing a Digital Advocacy Curriculum for the Global South
Developing Understanding via a Needfinding Approach
Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)
Digital Tools for Journalist Security
DigSec Curricula Design: when your powers combine...
Don't Make Killer Apps: Responsible Development Beyond Code
Ebola: A Big Humanitarian Data Disaster
El poder del enjambre digital para superar episodios de censura
Evolving Terminology with Evolved Technology
Explorations in Organizational Security
F-Droid Discussion: your very own private, free, secure, and flexible Android app store
F-Droid Hands-On: your very own private, free, secure, and flexible Android app store
Feedback on secure tools: Giving it and getting it more easily, with graphics
Freedom of expression in Venezuela: Challenges of the new National Assembly
Gender gap in on-line projects, the problem in Wikimedia
Glocalization for Noobs: How to Design Tools for a Global Audience
Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project
Guardía Indígena y Protección Territorial
Hacking User Centred Design for Social Change Efforts
Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?
Herramientas para seguridad y protección
Holding Companies to Account: Advocating for Corporate Respect for Human Rights
Holistic Security: subversive well-being for trainers
How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators
How to Fight an Internet Shutdown
How to organize a privacy advocacy event: Real cases histories, do's and don't
How to run participatory trainings and events
How we can end online harassment together
How women get advantage from ICT : A sharing from Indonesia
Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It
Improving New User Experience
Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil
Internet Protocols Demystified
Investigating human rights violations arising from electronic surveillance
Iranian Cyber Army
Is mass adoption of secure email possible?
Journalism security: meeting the users where they live
Las culturas originarias y el Internet: alternativas contra la exclusión
Latin America Meetup
Machine Learning to Understand and Evade Mass Surveillance Methods on the Internet
Malware Against Political Dissidence in Latam
Men and technology
Middle East Meetup
Multilingual Design: Bringing Language Access to the Full Stack
Network disconnections: Affects on Civil and Trade Rights
Non-formal Education and the Integrated Approach to the Safety
Not Too Inaccessible for Broadband: Connecting Remote Communities
Online Information Controls and Circumvention for Civil Society Groups
Open Integrity Initiative: How software practices impacts real
OPEN SOURCE BANKERS' JAILING
OSScientific Method: How to use open source tech to build open research practice
Pedagogy for Digital Security Education
Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.
Preventing 'Vandalism' and Preserving Identity in Internet Activism
Privacy Across Cultures
Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?
prototyping Qubes trainings for different use-cases and communities
Ranking ICT companies on digital rights: A "how to" guide
Ranking tech companies part 2: software, devices and networking equipment
Recoding the the Rules - Designing with, not just for, the next billion Internet users.
Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support
Resources for Internet Freedom
Risk Analysis from a Holistic Perspective
#SaveTheInternet: Lessons learned from the fight for net neutrality
Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism
Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)
Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?
Significance of Big Data to Socio Economic Development in Municipalities in Africa
Smart cities: networks of people, networks of vigilance?
Social engineering for the good of your users a.k.a. an introduction to user research.
Southeast Asia Meetup
State of secure hosting
State of the VPN
Strengthening advocacy for Internet Freedoms in Africa
Tackling Barriers to Access, Participation and Impact of the Internet in the developing world
Talles de Seguridad Digital para Periodistas de habla hispana
Teaching security to junior web developers
Technology Battlefronts - How to Fight for the User
The “South Open Mic Party (part 2)
The “South" Open Mic Party (part 1)
The 5 W's of journalistic self-protection
The concept of CONSENT
The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation
Time to fight back! If there is no Justice there is Escrache!
Toeing the line – ineffective and unjust national security strategies in MENA
Tools vs threats model: making the conscious use of tools for trainees
Tor on Mobile
Towards freedom of consensual representation online
Trainer Skill Share 1
Trainer Skill Share 2
Training Considerations for Inclusion of LGBTI Community
Training to privacy advocacy and digital security from a gender perspective
TRanslating Tails to spanish
#TrollGate: Taking On Cyber Harassment
UI and Usability Jam Sessions
urban open tech: learnings from the inner-city
User experience of configuring Tor in Tails (and Tor Browser and Whonix)
User Research For All!
Using data to enhance digital rights advocacy in the Middle East
Vigilancia Gubernamental y Seguridad Nacional
Violencia de género en línea. Discusiones en torno al hate speech, el danger speech y los distintos contextos de violencia contra la mujer
Vote (1) for better Elections
We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights
What can circumvention data tell us about the dynamics of internet censorship and online behaviour?
What Do We Know About Behavior Change?
What does re-usable & updatable content look like?
What freedom lovers need to know about Internet governance
What is Holistic Security and why is it important?
What is left of the Hacking Team debate?
What your apps say about you (and how to find out)
What’s working (or not) in policing online hate speech?
WhatsApp and Risks for LGBTI Communities
When, why and how they leak? Thoughts on the psychology of whistleblowers.
Women Advocates and Trainers in Latin America
Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)
You and your data
Your "Enemy" Should Have a Place in Your Internet Space