Oldest pages
Showing below up to 100 results in range #1 to #100.
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)
- Step 3 (10:15, 8 May 2015)
- Hands On What does your internet look like? (15:54, 12 May 2015)
- Style guide for editing this wiki (16:27, 13 May 2015)
- Holistic digital security training for women activists - self care, Brasil (21:19, 16 May 2015)
- Holistic digital security workshop for women, Brasil (21:21, 16 May 2015)
- Digital security training for students, Cambodia (21:31, 16 May 2015)
- Hackaton - Feminism, Cambodia (21:33, 16 May 2015)
- Digital security trainings, weekly, Cambodia (21:38, 16 May 2015)
- Digital security training for central american activists, Guatemala (13:22, 17 May 2015)
- Digital security tips - Bar Camp Yangon,Myanmar (15:23, 17 May 2015)
- Digital security training for Journalists, Myanmar (15:26, 17 May 2015)
- Encryption trainings for journalists, Mexico (15:36, 17 May 2015)
- Digital security workshops for women, UK (15:42, 17 May 2015)
- Hackaton - election monitoring platform, Guatemala (15:45, 17 May 2015)
- Digital security training for political activists, Cuba (08:24, 18 May 2015)
- Gender Gap Tech (08:48, 18 May 2015)
- Captivating capital and copyfighting (10:07, 25 May 2015)
- Uncluttering your mind (18:33, 26 May 2015)
- Safe Collaborative Tools (10:48, 27 May 2015)
- Safe Space Offline (11:57, 27 May 2015)
- Safe Spaces Tweets (12:02, 27 May 2015)
- Safe Space Wikipedia (13:56, 27 May 2015)
- Safe Mailing list (14:17, 27 May 2015)
- What you need to know before using this manual (15:15, 27 May 2015)
- Step 0 (18:27, 27 May 2015)
- Context - Distance (10:59, 29 May 2015)
- Resources (11:02, 29 May 2015)
- Red pill or blue pill? (10:35, 31 May 2015)
- Digital security trainings for female journalists, Pakistan (11:30, 2 June 2015)
- Hands On Understanding the group – Spectrogram (13:33, 2 June 2015)
- Security PGP 101 (13:36, 2 June 2015)
- Training: Training Skills I (14:15, 2 June 2015)
- Training: Training design I (14:27, 2 June 2015)
- Training: Training design IV (15:15, 2 June 2015)
- FemH3ck - Round table Privacy and security in the Open IT Space, Serbia (00:09, 3 June 2015)
- Timeline of an anonymous journey (08:14, 3 June 2015)
- Edit a thon - Feminisms, Mexico (04:06, 4 June 2015)
- Complete manual 2 (08:32, 4 June 2015)
- Manual introduction (14:19, 4 June 2015)
- Privacy awareness talks, Argentina (03:17, 5 June 2015)
- FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, La Plata, Argentina (04:45, 6 June 2015)
- Threats, detection, protection and (counter) moves (09:51, 6 June 2015)
- Threats and solutions (09:57, 6 June 2015)
- FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Argentina (16:27, 7 June 2015)
- Petty tyrants (17:02, 9 June 2015)
- Propaganda (19:22, 9 June 2015)
- Timeline merchants of death (20:20, 10 June 2015)
- FemH3ck - How the internet works for WHRD, Mexico (16:23, 11 June 2015)
- Step 2 (14:58, 15 June 2015)
- Anonymising with linux (11:43, 16 June 2015)
- Security disclaimer (12:10, 16 June 2015)
- FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya (10:59, 18 June 2015)
- FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya (11:09, 18 June 2015)
- Page:Storytelling (23:58, 18 June 2015)
- One-to-one DigiSec trainings for activists, Argentina (09:10, 19 June 2015)
- Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore (06:59, 30 June 2015)
- Uncluttering (14:04, 5 July 2015)
- Psychological warfare (14:46, 5 July 2015)
- SandBox/fr (22:26, 6 July 2015)
- Sex and Security!, UK (13:28, 10 July 2015)
- Panel Women and Digital Security Field - Circumvention Tech Festival, Spain (13:51, 10 July 2015)
- Screenings HackiNetIk, Mexico (18:21, 10 July 2015)
- FemH3ck - Feminist Caravan 1200 km, Mexico (05:51, 12 July 2015)
- Holistic digital security training for women journalists, Mexico (13:11, 12 July 2015)
- Digital security training for antimining activists, Mexico (13:21, 12 July 2015)
- Digital Security in Abya Yala, the land of vital blood. (13:46, 12 July 2015)
- El taller más difícil (13:56, 12 July 2015)
- CryptoFest, Nicaragua (05:02, 13 July 2015)
- FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia (16:13, 14 July 2015)
- Digital security trainings for women, Pakistan (17:36, 15 July 2015)
- Women activists from the Balkans, Macedonia (17:49, 15 July 2015)
- Digital security training for women activists from the Balkans, Macedonia (11:07, 16 July 2015)
- Digital Trainer Summit 1- Circumvention Tech Festival, Spain (11:25, 16 July 2015)
- Digital Trainer Summit 2- Circumvention Tech Festival, Spain (11:27, 16 July 2015)
- Digital Trainers Summit 3 - Circumvention Tech Festival, Spain (11:29, 16 July 2015)
- Digital Security Training in Mexico (11:43, 16 July 2015)
- Digital Trainers Summit - Circumvention Tech Festival, Spain (14:18, 16 July 2015)
- EnGENDERing digital security workshop - Circumvention Tech Festival, Spain (15:21, 16 July 2015)
- Panel Gender and Surveillance, Circumvention Tech Festival, Spain (15:31, 16 July 2015)
- Including gender in privacy and digital security (10:29, 17 July 2015)
- Shortest retrospective ever (13:05, 18 July 2015)
- DST̞Kenya̠2 (03:39, 21 July 2015)
- FemH3ck - Hacking our practices: Gender and Technology, Mexico (03:56, 21 July 2015)
- FemH3ck - Hacking our practices: Gender and Technology, Mexico Story (03:58, 21 July 2015)
- Network exploitation and monitoring (09:25, 21 July 2015)
- Digital security training for women activists from the Balkans, Turkey (12:19, 21 July 2015)
- Digital security open and weekly trainings, Mexico (14:46, 25 July 2015)
- Object encryption on linux (16:14, 25 July 2015)
- Holistic security training of trainers, Brasil (10:09, 26 July 2015)
- Linux server security (14:55, 26 July 2015)
- Gender Tech Collective stories (15:56, 27 July 2015)
- Reverse engineering (08:47, 31 July 2015)
- Digital security and privacy session - Geek Girl festival, Kenya (15:20, 1 August 2015)
- Simulation: Game of Goose (13:42, 2 August 2015)
- Holistic Security, Train Of Trainers, Germany (10:24, 3 August 2015)
- Take back the tech (20:27, 4 August 2015)
- Threat analysis - Information Mapping I (17:41, 6 August 2015)
- Gender Tech Privilege in Tech (19:05, 6 August 2015)
- Gender Tech Researching VAW (19:08, 6 August 2015)
- Gender Tech Herstory Exhibition (19:14, 6 August 2015)