Test page

From IFF Wiki
Revision as of 11:50, 18 February 2016 by Eileencejas (Talk | contribs)

Jump to: navigation, search

Time to fight back! If there is no Justice there is Escrache!

Is mass adoption of secure email possible?

DigSec Curricula Design: when your powers combine...

How to run participatory trainings and events

The Secure Communications Framework: Combining Impact with Adversary Capability and Motivation

Developing a Digital Advocacy Curriculum for the Global South

Bringing it all together: Threat modeling, gender-based violence risk assessment and safety planning

What is Holistic Security and why is it important?

Preventing 'Vandalism' and Preserving Identity in Internet Activism

Pedagogy for Digital Security Education

What Do We Know About Behavior Change?

Explorations in Organizational Security

Applied Threat Modeling & How I Learned to Start Loving Digital Security Trainings

prototyping Qubes trainings for different use-cases and communities

How the Internet Sees You: A Collaborative Workshop for Trainers and Digital Literacy Educators

Cybercrime and Cybersecurity Legislation in South Africa

Teaching security to junior web developers

Beyond the web of trust: how organizations can help build strongly-authenticated ties without privacy compromises

#SaveTheInternet: Lessons learned from the fight for net neutrality


Building Security Culture Within Marginalized Communities

Ebola: A Big Humanitarian Data Disaster

How we can end online harassment together

Evolving Terminology with Evolved Technology

Iranian Cyber Army

Grassroots surveillance and censorship resistance at your local library: the Library Freedom Project

What does re-usable & updatable content look like?

Building an inclusive community: Code of Conduct principles and best practices

Avoiding the Traps of Covering Freedom Online in Iran

What freedom lovers need to know about Internet governance

How to Fight an Internet Shutdown

Challenging Corporate Secret, Using the Internet for Accountability

Investigating human rights violations arising from electronic surveillance

Using data to enhance digital rights advocacy in the Middle East

Significance of Big Data to Socio Economic Development in Municipalities in Africa

Resources for Internet Freedom

Toeing the line – ineffective and unjust national security strategies in MENA

Big Brother and its Corporate Twin

Ranking ICT companies on digital rights: A "how to" guide

Strengthening advocacy for Internet Freedoms in Africa

Holding Companies to Account: Advocating for Corporate Respect for Human Rights

Network disconnections: Affects on Civil and Trade Rights

Africa - Where net neutrality goes to die!

Accessible database of best practice law - digital rights & information freedom

21st Century Activists Need 21st Century Skill Sets

Improving New User Experience

UI and Usability Jam Sessions

User Research For All!

Hacking User Centred Design for Social Change Efforts

Build Usable Tools

Multilingual Design: Bringing Language Access to the Full Stack

Humane Interfaces: What OpenPGP Gets Wrong & How To Fix It

Bug Reporting 101: How to make the tools we use better even if we can't code

Feedback on secure tools: Giving it and getting it more easily, with graphics

Designing Participatory Algorithmic Decision-Making Processes

You and your data

Developing Understanding via a Needfinding Approach

User experience of configuring Tor in Tails (and Tor Browser and Whonix)

#TrollGate: Taking On Cyber Harassment

What’s working (or not) in policing online hate speech?

Men and technology

Comparing Security of Gay Dating Apps

WhatsApp and Risks for LGBTI Communities

Training Considerations for Inclusion of LGBTI Community

Hardly a Laughing Matter: Could Sexist Humor Amount to Dangerous Speech?

How women get advantage from ICT : A sharing from Indonesia

The concept of CONSENT

A Robotics Explanation of Cross-cultural Communication

Privacy Across Cultures

We're Gonna Need a Bigger Tent: Expanding the Internet Freedom and Human Rights

Not Too Inaccessible for Broadband: Connecting Remote Communities

Recoding the the Rules - Designing with, not just for, the next billion Internet users.

Tackling Barriers to Access, Participation and Impact of the Internet in the developing world

Cuba: Update & Getting involved

Should there be a Digi Sec Code of Conduct for journalists (similar to ethic codes for journalists) to set minimum standards for the industry?

Vote (1) for better Elections

Censorship and online media in the CIS: lessons and best practices

What is left of the Hacking Team debate?

When, why and how they leak? Thoughts on the psychology of whistleblowers.

Digital Tools for Journalist Security

Journalism security: meeting the users where they live

Ranking tech companies part 2: software, devices and networking equipment

Tor on Mobile

Internet Protocols Demystified

Adversary resistant computing: Subgraph OS

Glocalization for Noobs: How to Design Tools for a Global Audience

Don't Make Killer Apps: Responsible Development Beyond Code

Building better software

Deploy an emergency Libre-Mesh network with local services

Autonomus Wireless and GSM Networks

F-Droid Discussion: your very own private, free, secure, and flexible Android app store

F-Droid Hands-On: your very own private, free, secure, and flexible Android app store

Open Integrity Initiative: How software practices impacts real

What can circumvention data tell us about the dynamics of internet censorship and online behaviour?

Reproducible Builds

Technology Battlefronts - How to Fight for the User

State of secure hosting

State of the VPN

Building a shared framework for organizational security assessments

Machine Learning to Understand and Evade Mass Surveillance Methods on the Internet

Advanced topics in GPG key security: smartcards and Yubikeys

Coming shortly to your screens: Secure Group Messaging

Online Information Controls and Circumvention for Civil Society Groups

What your apps say about you (and how to find out)

Social engineering for the good of your users a.k.a. an introduction to user research.

Regional networks for tackling gender-based online violence: Good practices, strategies and autonomous infrastructure for counseling and support

Producing guides and self-learning resources for tackling gender-tech based violence: What is there and what is needed?

Training to privacy advocacy and digital security from a gender perspective

Your "Enemy" Should Have a Place in Your Internet Space

OSScientific Method: How to use open source tech to build open research practice

A Fireside Chat about Internet Measurement, facilitated by M-Lab

Sharing tactics, tools and practices for system administrators + security for web developers (Florencia Herra vega)

Tools vs threats model: making the conscious use of tools for trainees

Digital independence in the age of the Big Five (How to cook up independent, secure servers for small groups and organizations)

Risk Analysis from a Holistic Perspective

Holistic Security: subversive well-being for trainers

Freedom of expression in Venezuela: Challenges of the new National Assembly

Content design - How to write words that people will read, understand and won't scare them

Dealing with Trauma and the Psycho Social Effects of Human Rights work

How to organize a privacy advocacy event: Real cases histories, do's and don't

Secure the News: A Dialogue on How News Organizations, Tech Companies and Technologists Can Protect the Future of Journalism

Internet Governance networking efforts: a gathering of groups starting from the deep country of Brazil

Bridging the Divide: talking to users, trainers, developers, and more!

Non-formal Education and the Integrated Approach to the Safety

Towards freedom of consensual representation online

Women's role as key partners in building the future of FLOSS (Free/Libre Open Source Software)

The 5 W's of journalistic self-protection

Women Advocates and Trainers in Latin America

"Guardía Indígena y Protección Territorial

Vigilancia Gubernamental y Seguridad Nacional

Violencia de género en línea. Discusiones en torno al hate speech, el danger speech y los distintos contextos de violencia contra la mujer

Las culturas originarias y el Internet: alternativas contra la exclusión

Herramientas para seguridad y protección

Talles de Seguridad Digital para Periodistas de habla hispana

Periodistas y personas defensoras de derechos humanos en Latinoamérica bajo riesgo: La importancia del contexto y la seguridad en sus comunicaciones.

Smart cities: networks of people, networks of vigilance?

Malware Against Political Dissidence in Latam

Gender gap in on-line projects, the problem in Wikimedia

TRanslating Tails to spanish

Trainer Skill Share 1

Trainer Skill Share 2

Title to come. Combo of of Intersectional Digital Rights: Are we stuck in our lane and Going Global: A Moderated Discussion on How to Create a More Diverse

The “South" Open Mic Party (part 1)

Latin America Meetup

Africa Meetup

Middle East Meetup

Southeast Asia Meetup

urban open tech: learnings from the inner-city

The “South Open Mic Party (part 2)

Unstructured Play

5 años tras Wikileaks: presente y futuro de las filtraciones en España.

El poder del enjambre digital para superar episodios de censura

Challenging dominant stories in digital rights