Search results

Jump to navigation Jump to search
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * digital security work in protests, researc for people in oppressed areas * anti-doxxing and security
    3 KB (386 words) - 19:28, 9 December 2023
  • ...corner of the screen do not encourage an awareness of or accountability to security issues. ...achable legacy applications with identity management systems, facilitating security and compliance, streamlining administration and reducing development costs.
    4 KB (600 words) - 21:47, 20 May 2015
  • Security versus Anonymity. EFF has an animation online that explains this difference
    776 bytes (122 words) - 17:47, 5 May 2015
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • ...nd also make sure you're not giving away your data is important – a lot of security motivation in NSA news recently * many groups are not motivated to think about back-ups or security in general
    3 KB (426 words) - 17:21, 5 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * Security * privacy, security concerns
    2 KB (365 words) - 21:30, 20 May 2015
  • false sense of security from 'safe practices' Strict transport security header that tells not only does this site use https but disallow any usage
    4 KB (717 words) - 17:47, 5 May 2015
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • # Wordpress has automatic security updates #* Blue Host has good customer support, security, not sure about privacy
    3 KB (548 words) - 21:46, 22 November 2016
  • ...session he'll share stories and learnings from his experiences, including security process, usability, and the full major-version life cycle, including end-of then in maintenace (bug fixes and security)
    3 KB (576 words) - 21:30, 20 May 2015
  • ...the security of marginalized communiites in development. Think privacy and security. A lot of tech, like Palantir, are built by white men to target marginalize *Prioritize security and privacy
    5 KB (774 words) - 00:27, 22 November 2017
  • * Security * Security - better to load your own fonts from your own server, but it varies from si
    3 KB (364 words) - 21:38, 22 November 2016
  • *Showed stealth video of the security and access entering a data center and the innards including a server rack a
    1 KB (175 words) - 23:37, 4 May 2015
  • --You always need human review of the translation, especially from a security standpoint. --Is there a security concern when using corporate cloud based products to translate sensitive do
    7 KB (929 words) - 00:11, 29 November 2017
  • This process emerged from security practices training / support for clients ...rganizational capacity. We want to empower people to think about their own security.
    8 KB (1,299 words) - 23:03, 30 November 2016
  • * [[Summit agenda brainstorming for digital security practitioners]] - Lisa, Amanda, Martin * [[Organizational digital security]] - Jack, Lisa
    6 KB (883 words) - 21:26, 30 November 2017
  • want to use it, what security it provides, and policy and legal issues. * curious about data security for org and clients
    5 KB (790 words) - 21:30, 20 May 2015

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)