Oldest pages
Showing below up to 50 results in range #1 to #50.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Tracks (17:52, 4 February 2016)
- IFF Schedule:Sessions:IBeyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises (01:12, 5 February 2016)
- IFF Schedule:Sessions (01:17, 5 February 2016)
- IFF Schedule:Tracks:Community:session7 (01:21, 5 February 2016)
- IFF Schedule:Tracks:Research (02:58, 5 February 2016)
- How to Juggle (20:54, 6 February 2016)
- Proposed Self-Organized Sessions (21:00, 6 February 2016)
- Your Stories (00:35, 10 February 2016)
- DigSec Curricula Design: when your powers combine... (01:10, 18 February 2016)
- The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation (01:12, 18 February 2016)
- Developing a Digital Advocacy Curriculum for the Global South (01:14, 18 February 2016)
- What is Holistic Security and why is it important? (01:15, 18 February 2016)
- Preventing 'Vandalism' and Preserving Identity in Internet Activism (01:16, 18 February 2016)
- How the Internet Sees You: A Collaborative Workship for Trainers and Digital Literacy Educators (01:21, 18 February 2016)
- Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises (01:23, 18 February 2016)
- SaveTheInternet: Lessons learned from the fight for net neutrality (01:24, 18 February 2016)
- OPEN SOURCE BANKERS' JAILING (01:25, 18 February 2016)
- Evolving Terminology with Evolved Technology (01:27, 18 February 2016)
- Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project (01:29, 18 February 2016)
- How to Fight an Internet Shutdown (01:31, 18 February 2016)
- Investigating human rights violations arising from electronic surveillance (01:48, 18 February 2016)
- Resources for Internet Freedom (01:49, 18 February 2016)
- How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators (10:42, 18 February 2016)
- El poder del enjambre digital para superar episodios de censura (11:01, 18 February 2016)
- Ranking ICT companies on digital rights: A "how to" guide (11:24, 18 February 2016)
- Network disconnections: Affects on Civil and Trade Rights (11:27, 18 February 2016)
- Accessible database of best practice law - digital rights & information freedom (11:29, 18 February 2016)
- 21st Century Activists Need 21st Century Skill Sets (11:31, 18 February 2016)
- Improving New User Experience (11:32, 18 February 2016)
- User Research For All! (11:33, 18 February 2016)
- Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It (11:37, 18 February 2016)
- You and your data (11:52, 18 February 2016)
- User experience of configuring Tor in Tails (and Tor Browser and Whonix) (11:53, 18 February 2016)
- TrollGate: Taking On Cyber Harassment (11:53, 18 February 2016)
- What’s working (or not) in policing online hate speech? (11:53, 18 February 2016)
- Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech? (11:57, 18 February 2016)
- The concept of CONSENT (11:58, 18 February 2016)
- We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights (11:59, 18 February 2016)
- Not Too Inaccessible for Broadband: Connecting Remote Communities (12:00, 18 February 2016)
- Recoding the the Rules - Designing with, not just for, the next billion Internet users. (12:00, 18 February 2016)
- Cuba: Update & Getting involved (12:00, 18 February 2016)
- Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry? (12:01, 18 February 2016)
- Vote1for better Elections (12:01, 18 February 2016)
- What is left of the Hacking Team debate? (12:03, 18 February 2016)
- When, why and how they leak? Thoughts on the psychology of whistleblowers. (12:03, 18 February 2016)
- Digital Tools for Journalist Security (12:04, 18 February 2016)
- Journalism security: meeting the users where they live (12:04, 18 February 2016)
- Ranking tech companies part 2: software, devices and networking equipment (12:11, 18 February 2016)
- Internet Protocols Demystified (12:23, 18 February 2016)
- Adversary resistant computing: Subgraph OS (12:24, 18 February 2016)