Oldest pages
Showing below up to 100 results in range #51 to #150.
View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)
- Security disclaimer (12:10, 16 June 2015)
- FemH3ck – Talking Digital Saving Lives at Egerton University, Njoro, Kenya (10:59, 18 June 2015)
- FemH3ck – Digital Security and Privacy Advocacy Flash training at the ihub Space, Nairobi, Kenya (11:09, 18 June 2015)
- Page:Storytelling (23:58, 18 June 2015)
- One-to-one DigiSec trainings for activists, Argentina (09:10, 19 June 2015)
- Femhack- Encryption and digital security workshop for cis, trans and queer women, Bangalore (06:59, 30 June 2015)
- Uncluttering (14:04, 5 July 2015)
- Psychological warfare (14:46, 5 July 2015)
- SandBox/fr (22:26, 6 July 2015)
- Sex and Security!, UK (13:28, 10 July 2015)
- Panel Women and Digital Security Field - Circumvention Tech Festival, Spain (13:51, 10 July 2015)
- Screenings HackiNetIk, Mexico (18:21, 10 July 2015)
- FemH3ck - Feminist Caravan 1200 km, Mexico (05:51, 12 July 2015)
- Holistic digital security training for women journalists, Mexico (13:11, 12 July 2015)
- Digital security training for antimining activists, Mexico (13:21, 12 July 2015)
- Digital Security in Abya Yala, the land of vital blood. (13:46, 12 July 2015)
- El taller más difícil (13:56, 12 July 2015)
- CryptoFest, Nicaragua (05:02, 13 July 2015)
- FemH3ck - Basic privacy and digital security for feminist & LGTBQIA, Indonesia (16:13, 14 July 2015)
- Digital security trainings for women, Pakistan (17:36, 15 July 2015)
- Women activists from the Balkans, Macedonia (17:49, 15 July 2015)
- Digital security training for women activists from the Balkans, Macedonia (11:07, 16 July 2015)
- Digital Trainer Summit 1- Circumvention Tech Festival, Spain (11:25, 16 July 2015)
- Digital Trainer Summit 2- Circumvention Tech Festival, Spain (11:27, 16 July 2015)
- Digital Trainers Summit 3 - Circumvention Tech Festival, Spain (11:29, 16 July 2015)
- Digital Security Training in Mexico (11:43, 16 July 2015)
- Digital Trainers Summit - Circumvention Tech Festival, Spain (14:18, 16 July 2015)
- EnGENDERing digital security workshop - Circumvention Tech Festival, Spain (15:21, 16 July 2015)
- Panel Gender and Surveillance, Circumvention Tech Festival, Spain (15:31, 16 July 2015)
- Including gender in privacy and digital security (10:29, 17 July 2015)
- Shortest retrospective ever (13:05, 18 July 2015)
- DST̞Kenya̠2 (03:39, 21 July 2015)
- FemH3ck - Hacking our practices: Gender and Technology, Mexico (03:56, 21 July 2015)
- FemH3ck - Hacking our practices: Gender and Technology, Mexico Story (03:58, 21 July 2015)
- Network exploitation and monitoring (09:25, 21 July 2015)
- Digital security training for women activists from the Balkans, Turkey (12:19, 21 July 2015)
- Digital security open and weekly trainings, Mexico (14:46, 25 July 2015)
- Object encryption on linux (16:14, 25 July 2015)
- Holistic security training of trainers, Brasil (10:09, 26 July 2015)
- Linux server security (14:55, 26 July 2015)
- Gender Tech Collective stories (15:56, 27 July 2015)
- Reverse engineering (08:47, 31 July 2015)
- Digital security and privacy session - Geek Girl festival, Kenya (15:20, 1 August 2015)
- Simulation: Game of Goose (13:42, 2 August 2015)
- Holistic Security, Train Of Trainers, Germany (10:24, 3 August 2015)
- Take back the tech (20:27, 4 August 2015)
- Threat analysis - Information Mapping I (17:41, 6 August 2015)
- Gender Tech Privilege in Tech (19:05, 6 August 2015)
- Gender Tech Researching VAW (19:08, 6 August 2015)
- Gender Tech Herstory Exhibition (19:14, 6 August 2015)
- Gender Tech Personal Memories (19:18, 6 August 2015)
- Uncluttering your machine (20:09, 8 August 2015)
- Uncluttering electronic waste (20:10, 8 August 2015)
- Uncluttering your life (20:11, 8 August 2015)
- Linux development process (14:55, 11 August 2015)
- Making our own linux images (15:14, 11 August 2015)
- Simulation: Mixnets (17:29, 11 August 2015)
- Covert operations (08:35, 19 August 2015)
- Roleplay (17:10, 20 August 2015)
- Elicitation (17:36, 20 August 2015)
- Simulations (08:03, 22 August 2015)
- Security: Password security (09:56, 27 August 2015)
- Holistic Security - Demonstrating the interconnectedness (12:29, 27 August 2015)
- Threat analysis (12:37, 27 August 2015)
- Threat analysis - Digital Security Indicators (12:54, 27 August 2015)
- Threat analysis - Individual responses to threat (15:30, 27 August 2015)
- Threat analysis - Information Mapping II (16:06, 27 August 2015)
- Threat analysis - Introducing context & risk analysis (16:14, 27 August 2015)
- Threat analysis - Security planning (16:40, 27 August 2015)
- Threat analysis - Situational analysis (16:41, 27 August 2015)
- Threat analysis - Vision and Actor Mapping (16:50, 27 August 2015)
- Gender Tech Online/Offline Cyberfeminism (17:42, 27 August 2015)
- Hands On How the internet works (17:50, 27 August 2015)
- Privacy Analogue data shadows (17:54, 27 August 2015)
- Training: Training design II (18:14, 27 August 2015)
- Gender Tech Co-creating a safe space (18:15, 27 August 2015)
- Holistic security - Collective Memory (14:22, 1 September 2015)
- Holistic security - Communications Security (14:22, 1 September 2015)
- Holistic security - What is Security? (14:22, 1 September 2015)
- Holistic security - A day in your life (14:23, 1 September 2015)
- Holistic security - Self care (14:23, 1 September 2015)
- Training: Training design III (09:15, 3 September 2015)
- Gender Tech Personal Experiences (09:40, 3 September 2015)
- Digital security for the Association of Media Women, Kenya (10:23, 10 September 2015)
- TransHackFeminist Convergence 2, Mexico (10:48, 10 September 2015)
- Talk Online Misoginy, Pakistan (08:20, 11 September 2015)
- Timeline masters of the internet (08:29, 11 September 2015)
- Anonymising your traffic with linux (08:33, 11 September 2015)
- Trolling (08:35, 11 September 2015)
- Take control of the tech (08:36, 11 September 2015)
- A feminist internet and its reflection on privacy, security, policy and violence against Women (09:14, 11 September 2015)
- Clean up all the things (10:12, 13 September 2015)
- Glossary (09:42, 15 September 2015)
- Installing linux/en (11:29, 16 September 2015)
- Digital security meetup for women human rights defenders, Kenya (13:00, 16 September 2015)
- Holistic Security, WHRD, Mexico (22:59, 16 September 2015)
- A typical linux distribution (14:08, 17 September 2015)
- Digital security trainings for female students, Pakistan (21:34, 21 September 2015)
- Using technology to fight dangerous speech - Peace Tech exchange, Myanmar (12:22, 22 September 2015)
- Ominous dots (17:32, 23 September 2015)