Difference between revisions of "Seguridad digial para defensores de derechos humanos en contextos mineros"
From Gender and Tech Resources
Line 2: | Line 2: | ||
|Title of the activity=Training with Derechos Humanos sin Fronteras | |Title of the activity=Training with Derechos Humanos sin Fronteras | ||
|Category=Digital Security | |Category=Digital Security | ||
− | |Start when ?=2018/ | + | |Start when ?=2018/05/22 |
− | |End when ?=2018/ | + | |End when ?=2018/05/22 |
|Number of hours if only one day ?=9 | |Number of hours if only one day ?=9 | ||
|Where is located the activity ?=Regional | |Where is located the activity ?=Regional | ||
− | |Geo-localization of the activity ?=-12. | + | |Geo-localization of the activity ?=-12.548845587274, -74.00390625 |
|Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU, | |Who organize it=Training with Derechos Humanos sin Fronteras, CEDEP AYLLU, | ||
|organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/ | |organisation(s) website=https://es-la.facebook.com/derechossinfronteras.pe/ |
Latest revision as of 16:32, 21 July 2018
Title | Training with Derechos Humanos sin Fronteras |
---|---|
Category | Digital Security |
Start | 2018/05/22 |
End | 2018/05/22 |
Hours | 9 |
Scale | Regional |
Geolocalization | -12° 32' 56", -74° 0' 14"
Loading map...
|
Organisation | Training with Derechos Humanos sin Fronteras, CEDEP AYLLU, |
Website | https://es-la.facebook.com/derechossinfronteras.pe/ |
Target audience | Human right defenders |
Number of participants | 12 |
Context and motivations | DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted. |
Topics | digital security, mobil, encrypt |
Links | |
Media | [[File:]] |
Agenda | The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information.
During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders. |
---|---|
Methodologies | Popular education, |
Resources | [[Existing toolkits and resources::https://gendersec.tacticaltech.org (Mobil topics)
From the training part of My shadow [1]the following material was: How Mobile Communication Works How the Internet works Mobile Communication Mobile Phone Settings (Hands-on) Additionally we used the following websites. https://trackography.org/]] |
Gendersec | myshadow.org |
Feelings | The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training. |
---|---|
Feedbacks | the participants commented that the workshop was useful and the methodology was adequate |
Start | |
Stop | |
Keep |