Time to fight back! If there is no Justice there is Escrache!
Is mass adoption of secure email possible?
DigSec Curricula Design: when your powers combine...
How to run participatory trainings and events
The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation
Developing a Digital Advocacy Curriculum for the Global South
Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning
What is Holistic Security and why is it important?
Preventing 'Vandalism' and Preserving Identity in Internet Activism
Pedagogy for Digital Security Education
What Do We Know About Behavior Change?
Explorations in Organizational Security
Applied Threat Modeling & How I Learned to Start Loving Digital Security Trainings
prototyping Qubes trainings for different use-cases and communities
How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators
Cybercrime and Cybersecurity Legislation in South Africa
Teaching security to junior web developers
Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises
#SaveTheInternet: Lessons learned from the fight for net neutrality
OPEN SOURCE BANKERS' JAILING
Building Security Culture Within Marginalized Communities
Ebola: A Big Humanitarian Data Disaster
How we can end online harassment together
Evolving Terminology with Evolved Technology
Iranian Cyber Army
Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project
What does re-usable & updatable content look like?
Building an inclusive community: Code of Conduct principles and best practices
Avoiding the Traps of Covering Freedom Online in Iran
What freedom lovers need to know about Internet governance
How to Fight an Internet Shutdown
Challenging Corporate Secret, Using the Internet for Accountability
Investigating human rights violations arising from electronic surveillance
Using data to enhance digital rights advocacy in the Middle East
Significance of Big Data to Socio Economic Development in Municipalities in Africa
Resources for Internet Freedom
Toeing the line – ineffective and unjust national security strategies in MENA
Big Brother and its Corporate Twin
Ranking ICT companies on digital rights: A "how to" guide
Strengthening advocacy for Internet Freedoms in Africa
Holding Companies to Account: Advocating for Corporate Respect for Human Rights
Network disconnections: Affects on Civil and Trade Rights
Africa - Where net neutrality goes to die!
Accessible database of best practice law - digital rights & information freedom
21st Century Activists Need 21st Century Skill Sets
Improving New User Experience
UI and Usability Jam Sessions
User Research For All!
Hacking User Centred Design for Social Change Efforts
Build Usable Tools
Multilingual Design: Bringing Language Access to the Full Stack
Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It
Bug Reporting 101: How to make the tools we use better even if we can't code
Feedback on secure tools: Giving it and getting it more easily, with graphics
Designing Participatory Algorithmic Decision-Making Processes
You and your data
Developing Understanding via a Needfinding Approach
User experience of configuring Tor in Tails (and Tor Browser and Whonix)
#TrollGate: Taking On Cyber Harassment
What’s working (or not) in policing online hate speech?
Men and technology
Comparing Security of Gay Dating Apps
WhatsApp and Risks for LGBTI Communities
Training Considerations for Inclusion of LGBTI Community
Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?
How women get advantage from ICT : A sharing from Indonesia
The concept of CONSENT
A Robotics Explanation of Cross-cultural Communication
Privacy Across Cultures
We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights
Not Too Inaccessible for Broadband: Connecting Remote Communities
Recoding the the Rules - Designing with, not just for, the next billion Internet users.
Tackling Barriers to Access, Participation and Impact of the Internet in the developing world
Cuba: Update & Getting involved
Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?
Vote (1) for better Elections
Censorship and online media in the CIS: lessons and best practices
What is left of the Hacking Team debate?
When, why and how they leak? Thoughts on the psychology of whistleblowers.
Digital Tools for Journalist Security
Journalism security: meeting the users where they live
Ranking tech companies part 2: software, devices and networking equipment
Tor on Mobile
Internet Protocols Demystified
Adversary resistant computing: Subgraph OS
Glocalization for Noobs: How to Design Tools for a Global Audience
Don't Make Killer Apps: Responsible Development Beyond Code
Building better software
Deploy an emergency Libre-Mesh network with local services
Autonomus Wireless and GSM Networks
F-Droid Discussion: your very own private, free, secure, and flexible Android app store
F-Droid Hands-On: your very own private, free, secure, and flexible Android app store
Open Integrity Initiative: How software practices impacts real
What can circumvention data tell us about the dynamics of internet censorship and online behaviour?
Technology Battlefronts - How to Fight for the User
State of secure hosting
State of the VPN
Building a shared framework for organizational security assessments
Machine Learning to Understand and Evade Mass Surveillance Methods on the Internet
Advanced topics in GPG key security: smartcards and Yubikeys
Coming shortly to your screens: Secure Group Messaging
Online Information Controls and Circumvention for Civil Society Groups
What your apps say about you (and how to find out)
Social engineering for the good of your users a.k.a. an introduction to user research.
Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support
Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?
Training to privacy advocacy and digital security from a gender perspective
Your "Enemy" Should Have a Place in Your Internet Space
OSScientific Method: How to use open source tech to build open research practice
A Fireside Chat about Internet Measurement, facilitated by M-Lab
Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)
Tools vs threats model: making the conscious use of tools for trainees
Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)
Risk Analysis from a Holistic Perspective
Holistic Security: subversive well-being for trainers
Freedom of expression in Venezuela: Challenges of the new National Assembly
Content design - How to write words that people will read, understand and won't scare them
Dealing with Trauma and the Psycho Social Effects of Human Rights work
How to organize a privacy advocacy event: Real cases histories, do's and don't
Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism
Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil
Bridging the Divide: talking to users, trainers, developers, and more!
Non-formal Education and the Integrated Approach to the Safety
Towards freedom of consensual representation online
Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)
The 5 W's of journalistic self-protection
Women Advocates and Trainers in Latin America
Guardía Indígena y Protección Territorial
Vigilancia Gubernamental y Seguridad Nacional
Violencia de género en línea. Discusiones en torno al hate speech, el danger speech y los distintos contextos de violencia contra la mujer
Las culturas originarias y el Internet: alternativas contra la exclusión
Herramientas para seguridad y protección
Talles de Seguridad Digital para Periodistas de habla hispana
Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.
Smart cities: networks of people, networks of vigilance?
Malware Against Political Dissidence in Latam
Gender gap in on-line projects, the problem in Wikimedia
TRanslating Tails to spanish
Trainer Skill Share 1
Trainer Skill Share 2
Title to come. Combo of of Intersectional Digital Rights: Are we stuck in our lane and Going Global: A Moderated Discussion on How to Create a More Diverse
The “South" Open Mic Party (part 1)
Latin America Meetup
Middle East Meetup
Southeast Asia Meetup
urban open tech: learnings from the inner-city
The “South Open Mic Party (part 2)
5 años tras Wikileaks: presente y futuro de las filtraciones en España.
El poder del enjambre digital para superar episodios de censura
Challenging dominant stories in digital rights