Search results

Jump to navigation Jump to search

Page title matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • 178 bytes (30 words) - 17:57, 5 May 2015
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • 0 bytes (0 words) - 22:26, 26 November 2018
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • 0 bytes (0 words) - 00:47, 28 November 2018
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • * For admins and site builders: http://drupal.org/security/secure-configuration * For everyone: http://drupal.org/security-team
    3 KB (443 words) - 21:30, 20 May 2015
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o
    8 KB (1,412 words) - 23:22, 20 May 2015
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • promoting herd immunity for digital security, lack of implemention around us endangers us
    2 KB (228 words) - 00:59, 22 November 2017
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021

Page text matches

  • Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def Access Now Digital Security Helpline
    656 bytes (81 words) - 22:24, 28 November 2020
  • ...to discuss a notification and collaboration protocol for addressing shared security issues, including a best practices repository, and discovery and reporting
    329 bytes (44 words) - 21:30, 20 May 2015
  • Security and privacy sessions for the rest of the week * Increasing the capacity and number of digital security trainers
    2 KB (314 words) - 00:38, 30 November 2017
  • *general WordPress security Security
    1 KB (166 words) - 17:47, 5 May 2015
  • * Security Education Companion (born w/ EFF, now coordinated by the Level Up community * Security in a Box (for trainers)
    1 KB (206 words) - 18:42, 9 December 2023
  • Check out the [https://sec.eff.org/ Security Education Companion] and take the survey at [https://www.surveymonkey.com/r
    149 bytes (25 words) - 12:22, 19 November 2017
  • ...within alliance. To join EFA, folks need to agree to principals (privacy, security, creativity, free speech, access to knowledge), have to be a US-based not-f ...r security research for marginalized groups traditionally ignored by cyber security industry: journalists, activists, sex workers, etc.
    1 KB (167 words) - 19:19, 9 December 2023
  • ...audit changes to installations made by clients for many reasons, including security. We saw some of the recent developments focused around the block editing i * Managing (and/or locking down) security review of code/plugins added by clients needs help. wpscan is a possible
    2 KB (278 words) - 18:47, 9 December 2023
  • How does an org navigate digital security? The anatomy and roles of that process ...Grounding - Before starting, you must foment motivation to create digital security.=
    4 KB (622 words) - 16:37, 17 November 2017
  • Security in Plone: Strong record of security
    1 KB (197 words) - 22:11, 15 May 2015
  • ...what are some security best practices that we can use and what are peoples security concerns. Observation: With CMSes core security is usually very good, but when you add modules it goes down
    4 KB (697 words) - 22:11, 15 May 2015
  • Evaluating security risks when working with high-risk constituents II. Security Issues
    1 KB (213 words) - 18:07, 5 May 2015
  • Security creates opportunity -“ you don't have to take advantage of it, but it sou How to approach security in a way that does not communicate threat to people, but empowerment.
    5 KB (743 words) - 23:37, 4 May 2015
  • how do tech folx get rest of org to take security seriously (instilling fear?) user training: hands-on to build muscle memory (security table top exercises)
    2 KB (210 words) - 21:49, 9 December 2023
  • Change your philosophy: doing the obvious “pre-digital” security practices =Physical Security=
    2 KB (314 words) - 23:32, 28 November 2017
  • Tech security issues and legal issues often overlap operationally. There correct to avoid libel lawsuits, but needs to improve about security
    4 KB (618 words) - 22:09, 7 December 2018
  • [https://github.com/iecology/security-checklists '''“Security Checklists”'''] on github ...ant that orgs have some basic pieces in place.[https://github.com/iecology/security-checklists/blob/master/2_readiness_checklist.md '''Here's a list'''].
    3 KB (426 words) - 21:45, 22 November 2016
  • * Security * How do we manage usability and security?
    2 KB (299 words) - 20:09, 22 November 2016
  • ...ps://www.flickr.com/photos/aspirationtech/31185195215/in/datetaken-public/ Security As Solidarity Install Signal]
    1 KB (136 words) - 00:42, 23 November 2016
  • Call to all information security trainers and capacity builders at How can information security trainers support each other? Let's make a
    5 KB (774 words) - 08:38, 30 December 2019
  • ...grammatic work in the form of web applications. Jake will share stories of security breaches, incident responses and enumerate some of the more common issues t
    424 bytes (68 words) - 21:30, 20 May 2015
  • Keeping site security updated ** Drupal: Security updates only
    1 KB (205 words) - 20:44, 28 November 2016
  • a. SMS Blasts (consider reliability, cost, features, security) c. Problem with SMS: security issues
    1 KB (197 words) - 18:25, 5 May 2015
  • Evolving approaches to organizational digital security as part of larger movements for community safety ** E: Security is a big issue with people's online words & actions bleeding into the real
    6 KB (879 words) - 22:05, 25 November 2021
  • security, workflow and accessibility. Come to this session to learn 10
    555 bytes (83 words) - 21:30, 20 May 2015
  • ...ion of security. Context changes what this means! What domains do we apply security to? "I have smoke detectors; I am secure." # Information security
    5 KB (796 words) - 22:19, 7 December 2018
  • why don't people use security tools? - Hacking laptop/desktop config files for better security is still
    5 KB (889 words) - 18:25, 5 May 2015
  • Remote Organizational Security Assessment Best Practices (Beatrice / Jonah) * Propose a lightweight digital security assessment also when we receive a request for training – as a pre-trainin
    4 KB (656 words) - 01:07, 29 November 2020
  • organizational digital security - digital security for groups of people working together. as small as a 6 person collective to ...se steps, it is very helpful to have someone who is thinking about digital security. Expertize may not be needed up to this point, it could all be done interna
    5 KB (776 words) - 23:46, 21 November 2017
  • ** What does safety and security mean to your group? *** May not know digital security but they know what safety is to them.
    5 KB (852 words) - 19:38, 9 December 2023
  • * Use redaction as a tool for information security
    630 bytes (95 words) - 23:37, 4 May 2015
  • ...d).Activists want stuff that can be hosted on their own servers (for extra security) ...ODF. new, buggy software. Can collaboratively edit an ODF file. Also has a security layer.
    2 KB (361 words) - 23:37, 4 May 2015
  • Session to synthesize providing support for digital security training efforts * Responsibility around providing security guidance
    3 KB (397 words) - 23:08, 30 November 2016
  • * [[Security First Conversations]] * [[Human Rights Security and Privacy]]
    4 KB (491 words) - 00:55, 4 February 2020
  • ...fferent. Best solution is to do lots of research with people who are doing security and research in that country. Overall security threat modelling approach:
    3 KB (471 words) - 23:21, 29 November 2017
  • ...balance our use of phones as vectors of surveillance vs phone as tool for security (how do we decide when to use our phones at home?) ==Mobile security practices we in the room use==
    4 KB (643 words) - 19:26, 22 November 2016
  • security and surveillance: going to gmail security attacks that cannot
    3 KB (406 words) - 18:09, 7 November 2019
  • * Information Strategy|Security|Integrity for NGOs - [https://www.opentech.fund/fellowships/difp Digital In
    1 KB (162 words) - 21:35, 30 March 2016
  • E-(Aspiration) – works with Tech capacity and digital security – wants to do workshops in Spanish; how do we do it…what is needed to d * Cyber Security – there are not too many resources in Spanish
    2 KB (369 words) - 00:59, 20 November 2018
  • Two classes of config, w/ security info & wihtout best practice is to #include security into settings.php
    2 KB (243 words) - 18:25, 5 May 2015
  • * Communication security and counter surveillance * security training for activists
    6 KB (855 words) - 18:28, 5 May 2015
  • * digital security work in protests, researc for people in oppressed areas * anti-doxxing and security
    3 KB (386 words) - 19:28, 9 December 2023
  • ...corner of the screen do not encourage an awareness of or accountability to security issues. ...achable legacy applications with identity management systems, facilitating security and compliance, streamlining administration and reducing development costs.
    4 KB (600 words) - 21:47, 20 May 2015
  • Security versus Anonymity. EFF has an animation online that explains this difference
    776 bytes (122 words) - 17:47, 5 May 2015
  • * mobile security high priority because access by marginalized community * integrate security into digital literacy
    5 KB (782 words) - 19:34, 22 November 2016
  • ...ity about where you meet and communicate--with full transparency about the security tradeoffs of different channels ...as possible over several iterations, with feedback; trying not to heighten security without giving the users some extra ability/benefit ++1
    6 KB (953 words) - 23:34, 28 November 2020
  • ...nd also make sure you're not giving away your data is important – a lot of security motivation in NSA news recently * many groups are not motivated to think about back-ups or security in general
    3 KB (426 words) - 17:21, 5 May 2015
  • ...get a sense of what questions we want to explore as sessions about digital security at the conference. We went over digital security questions we want answered over the next few days:
    10 KB (1,602 words) - 17:40, 7 November 2019
  • * Security * privacy, security concerns
    2 KB (365 words) - 21:30, 20 May 2015
  • false sense of security from 'safe practices' Strict transport security header that tells not only does this site use https but disallow any usage
    4 KB (717 words) - 17:47, 5 May 2015
  • The technological challenges included security on mobile phones. Goal was capacity building to help people be found or not ...among extended family. This doesn't exist in the states. Overfitting your security model is a problem that can happen.
    4 KB (755 words) - 17:47, 5 May 2015
  • # Wordpress has automatic security updates #* Blue Host has good customer support, security, not sure about privacy
    3 KB (548 words) - 21:46, 22 November 2016
  • ...session he'll share stories and learnings from his experiences, including security process, usability, and the full major-version life cycle, including end-of then in maintenace (bug fixes and security)
    3 KB (576 words) - 21:30, 20 May 2015
  • ...the security of marginalized communiites in development. Think privacy and security. A lot of tech, like Palantir, are built by white men to target marginalize *Prioritize security and privacy
    5 KB (774 words) - 00:27, 22 November 2017
  • * Security * Security - better to load your own fonts from your own server, but it varies from si
    3 KB (364 words) - 21:38, 22 November 2016
  • *Showed stealth video of the security and access entering a data center and the innards including a server rack a
    1 KB (175 words) - 23:37, 4 May 2015
  • --You always need human review of the translation, especially from a security standpoint. --Is there a security concern when using corporate cloud based products to translate sensitive do
    7 KB (929 words) - 00:11, 29 November 2017
  • This process emerged from security practices training / support for clients ...rganizational capacity. We want to empower people to think about their own security.
    8 KB (1,299 words) - 23:03, 30 November 2016
  • * [[Summit agenda brainstorming for digital security practitioners]] - Lisa, Amanda, Martin * [[Organizational digital security]] - Jack, Lisa
    6 KB (883 words) - 21:26, 30 November 2017
  • want to use it, what security it provides, and policy and legal issues. * curious about data security for org and clients
    5 KB (790 words) - 21:30, 20 May 2015
  • ...e https, perfect forward secrecy, disabling SSLv3 (an older version with a security vulnerability), marking cookies as secure to encrypt them, etc
    3 KB (453 words) - 23:37, 4 May 2015
  • * [[Security practitioners planning jam]] * [[Superbloom's Security accessibility framework]]
    4 KB (448 words) - 21:49, 9 December 2023
  • ...asium - Emails you when your software dependencies are out of date or have security warnings *Bug Crowd - Checks security vulnerabilities by having people to poke at your website
    3 KB (401 words) - 23:37, 4 May 2015
  • ...t by their nature resource-challenged. And when resources are constrained, security considerations all too often fall off the bottom of the "hard requirements" ...initiatives. The goal will be to tease out a reasonable-size checklist of security issues, with a particular focus on web applications that store member and o
    8 KB (1,412 words) - 23:22, 20 May 2015
  • * Sami from info security coalition. *vsee.com - like skype, but more video and more security
    4 KB (661 words) - 17:47, 5 May 2015
  • * [[Top reasons not to care about information security]] * [[Well maintained information security curricula]]
    5 KB (667 words) - 23:36, 12 August 2019
  • * Security ...itectural change in D8--if Symfony or Twig (new templating framework) have security releases, Drupal will need to as well.
    6 KB (966 words) - 17:21, 5 May 2015
  • Security vs. Archive security
    3 KB (536 words) - 18:07, 5 May 2015
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 17:42, 7 November 2019
  • - digital security training scene… peoples live frustrations when they are forced to use the - digital security trainings for Dif types of experts, e.g. journalists, use tools like tor an
    4 KB (631 words) - 00:55, 4 February 2020
  • ...r this reason, even though a large majority of the code is not relevant to security-related issues. The best way to help this is to build the community. The
    4 KB (641 words) - 23:22, 20 May 2015
  • * Is the data in your use case super sensitive? What security threats should you be concerned about? * What your security/privacy model is?
    4 KB (612 words) - 22:33, 26 November 2018
  • * Digital Security Helpline: https://www.accessnow.org/help/
    3 KB (349 words) - 02:23, 19 November 2021
  • Security & Vetting for your Community
    2 KB (225 words) - 19:03, 9 December 2023
  • ''C'' What about Agile and security? ...curity issues and risks from the beginning of the project--i.e. don't make security part of an Agile workflow.
    8 KB (1,324 words) - 22:23, 26 November 2018
  • ** security **data security rules
    5 KB (822 words) - 23:37, 4 May 2015
  • *VPN is only a single hop security, meaning that it can still give location and name information. If someone r '''If there is any security advantage of having multiple hidden services in one server'''
    4 KB (751 words) - 23:37, 4 May 2015
  • Security Pillars: analytics, personalization, security
    4 KB (608 words) - 16:41, 17 November 2017
  • * Seguridad on Espanol / Security in Spanish
    2 KB (275 words) - 22:40, 30 March 2016
  • ...company writing a module for their own service or API it’s OK. We don’t do security support for stuff that’s not on Drupal.org. Discussed privacy/security vs. convenience.
    4 KB (659 words) - 18:13, 5 May 2015
  • promoting herd immunity for digital security, lack of implemention around us endangers us
    2 KB (228 words) - 00:59, 22 November 2017
  • 3) Open Source Security Auditing Project - starting soon, to audit the security of open source products. We need to demonstrate that open source is more
    4 KB (664 words) - 18:48, 5 May 2015
  • * [[Shared Security Protocols for CMS Communities]] * [[Training: Drupal Security and Performance Tuning]]
    6 KB (770 words) - 21:35, 20 May 2015
  • ...ment (and maybe some docs) [security caveat: if you have a dependency with security exploit, you have to redeploy the entire package).
    4 KB (627 words) - 17:21, 5 May 2015
  • ** Security, privacy
    2 KB (254 words) - 19:42, 9 December 2023
  • Proctorware doesnt do much to internet cheating & creating privacy/security risks
    2 KB (291 words) - 23:49, 28 November 2020
  • *security *security
    7 KB (1,140 words) - 23:05, 24 November 2022
  • *Concerned about the security of supporter data Corporate tools do a pretty good job with security. But then privacy is a whole other issue.
    5 KB (800 words) - 22:45, 29 November 2017
  • * -concerns on security, replicatability * meetup is donating to occupy, but still a security issue
    9 KB (1,437 words) - 18:07, 5 May 2015
  • ** Data security
    2 KB (322 words) - 18:35, 9 December 2023
  • * relocated to japan – does organizational security work but now discovering asia isn’t heard in many contexts. Eg; timezones * digisec trainer and helpdesk manager in thailand. Security Matters. Digital rights in thailand. Always translating training materials
    7 KB (1,167 words) - 23:35, 24 November 2022
  • * Security *Keep security in mind – it might be better to not allow integrations in order to keep s
    5 KB (728 words) - 21:48, 22 November 2016
  • **** security ** security, encrypted emails!!
    5 KB (738 words) - 21:30, 20 May 2015
  • Digital security training for young people!
    2 KB (320 words) - 18:38, 9 December 2023
  • * job security vs tax credits * housing security
    6 KB (904 words) - 05:17, 18 November 2022
  • job security vs tax credits housing security
    6 KB (915 words) - 05:13, 18 November 2022
  • ...-> Only get plugins from wordpress.org. Some bad ones have malware or have security holes.
    2 KB (317 words) - 17:47, 5 May 2015
  • * Salesforce is working on legislation changes about security and records ...ithout notification to customers from subpeonas, some even without them, a security concern with using the cloud. Use cloud services with providers that you t
    5 KB (770 words) - 18:48, 5 May 2015
  • ...s of organizations cannot afford to maintain that code as it rots, creates security holes, etc.
    2 KB (346 words) - 23:37, 4 May 2015
  • Better security
    2 KB (304 words) - 19:10, 9 December 2023
  • Security in box from tactical tech explains best practices. Tactical Tech learned that it's an arms race. You can get security for a
    5 KB (915 words) - 17:47, 5 May 2015
  • * [[Access Now Digital Security Helpline: Supporting security needs of civil society groups & activists, journalists and human rights def * [[Security practices cross-share]]
    7 KB (1,059 words) - 02:27, 3 December 2020
  • ** Google docs , easy to use, security issues, heavy and slow
    3 KB (407 words) - 15:37, 19 November 2021
  • ...urnalists wanted as few intermediaries as possible both for exclusives and security reasons * Far higher security: more air gapped, more customized, takes more time & resources to maintain
    5 KB (762 words) - 17:21, 5 May 2015
  • more security? core mission is free software, privacy, standards, security by design
    5 KB (799 words) - 18:25, 5 May 2015
  • “we noticed one thing - a bunch of security issues with hosting options, clients get hacked from not doing WordPress up - security - do you know of security breaches at this hosting provider?
    7 KB (1,270 words) - 17:47, 5 May 2015
  • *"we were directly creating jobs in the security industry with our actions" *Security guards actually thanked them for creating so many jobs
    5 KB (815 words) - 21:14, 27 November 2017
  • ...gainst self-incrimination as well as non-law enforcement attacks. (private security, foreign governments, etc.) Direct action organizers will be on hand to pr
    2 KB (300 words) - 18:48, 5 May 2015
  • *focusing on security is a waste of time *security is a privilege
    6 KB (849 words) - 23:37, 4 May 2015
  • A good security measure is setting up an SPF record in your DNS setup
    2 KB (389 words) - 22:11, 15 May 2015
  • They used Ushahiti to map time and location of police violence. Clear security reasons to be careful with data.
    2 KB (374 words) - 23:37, 4 May 2015
  • ...concerns about customers' concerns that are not necessarily about end-user security. ...vism community, human rights community, journalism thinking about end user security.
    11 KB (1,719 words) - 17:21, 5 May 2015
  • * Shot Spotter: Targets gunshots city-wide. Provides security, but microphone privacy concerns.
    3 KB (323 words) - 01:20, 23 November 2016
  • human rights, war/security clubs, environment, banks/finance diamond
    2 KB (301 words) - 20:01, 22 November 2016
  • * security is a privilege * Teaching digital security is the equivilent of telling women not to walk the street in a miniskirt
    5 KB (823 words) - 21:52, 19 November 2015
  • * A security certificate is useful, but not strictly necessary. This is an ongoing conv
    2 KB (381 words) - 17:21, 5 May 2015
  • ** Security * Cloudflare – increase use of your data by providing you with security
    6 KB (835 words) - 21:44, 9 December 2023
  • * Work on operational security, worked on cases where social media information was subpoenaed, wound up wi * stronger security culture in Chile, but online has changed the dynamics and less so
    10 KB (1,733 words) - 00:42, 28 November 2018
  • * For admins and site builders: http://drupal.org/security/secure-configuration * For everyone: http://drupal.org/security-team
    3 KB (443 words) - 21:30, 20 May 2015
  • Downside: potential performance problems, security issues
    2 KB (361 words) - 21:30, 20 May 2015
  • Security concerns:
    2 KB (403 words) - 17:47, 5 May 2015
  • * [[Security and Privacy in Projects Supporting At-Risk Populations]] * [[Mobile Security for Activists]]
    6 KB (791 words) - 22:26, 11 May 2015
  • ...tion from Ted is to '''pass on the current generation of these things'''. Security gets really weird in these deployed environments.
    3 KB (535 words) - 23:37, 4 May 2015
  • FreedomPhone is a distribution of Android to improve security; IMEI number may be the same regardless.
    2 KB (385 words) - 18:07, 5 May 2015
  • *Security
    3 KB (456 words) - 01:25, 23 November 2016
  • Derek: Guardian project (privacy and security) – how to make security easy?
    7 KB (1,028 words) - 18:25, 5 May 2015
  • ...cipation around community safety planning; the efforts to increase digital security.
    3 KB (457 words) - 19:11, 9 December 2023
  • ...e to go next. There was a session the first day for one-pagers concerning security on the internet. OccupyTechnology.org
    3 KB (540 words) - 18:25, 5 May 2015
  • ...s a free certificate authority, and is run by a non-profit called Internet Security Research Group (501c3) : This is the same for internet security
    8 KB (1,293 words) - 19:21, 22 November 2016
  • * Security challenge of encryption
    3 KB (436 words) - 01:30, 23 November 2016
  • ...senior dev made a PR implementing a feature, see if they notice problems/security vulnerabilities
    3 KB (518 words) - 19:44, 16 November 2017
  • ** [[DevSummit07:Security Checkup for Nonprofit Software Developers|Security Checkup for Nonprofit Software Developers]]
    8 KB (1,060 words) - 22:26, 20 May 2015
  • * [[Digital security practitioner circle]]
    3 KB (415 words) - 04:45, 26 March 2023
  • * Use "before" filter and "verify". Verify is useful for security, smart-redirects.
    3 KB (535 words) - 23:22, 20 May 2015
  • security concerns; spoofing
    3 KB (457 words) - 21:30, 20 May 2015
  • ...an Services, Burning Man infrastructure, along with Department of Homeland Security search and rescue and military assistance. * Since FEMA is part of the Department of Homeland Security, it got fucked up under Bush.
    7 KB (1,095 words) - 17:47, 5 May 2015
  • ...face. Can be difficult to deploy bcd you have to do it country by country. Security, translation is difficult. ...r tags or javascript. That has a lot of solutions of web (SSL encryption & security), can use same dev tools as web sites, but very limited.
    7 KB (1,257 words) - 18:48, 5 May 2015
  • Static site generators promise greater security.
    3 KB (496 words) - 08:42, 19 January 2022
  • * security v. anonymmity ** security is not about obscurity, anonymity *is*
    7 KB (1,100 words) - 01:16, 23 November 2016
  • ...ork without Javascript. (Not sure what it does with Javascript in non-high security mode)
    8 KB (1,447 words) - 21:48, 22 November 2016
  • *right now only hard core articulated need is security and privacy ...n source coders. to be honest, although most people care SHOULD care about security, privacy — the majority of social change orgs don’t prioritize these is
    11 KB (1,972 words) - 23:37, 4 May 2015
  • ...a database makes websites a target for hacking, requiring diligence around security updates.
    4 KB (650 words) - 22:24, 26 November 2018
  • ...ring proper levels of permissioning and security for balance of access and security.
    8 KB (1,287 words) - 18:13, 5 May 2015
  • * legal security/emotional security
    9 KB (1,520 words) - 23:15, 28 November 2020
  • Confidential computer -- idea that hosting provider ensures isolation and security at the hardware level, like VM cannot access host maching. Host outside US is useful for avoiding secret national security letters forcing hosting providers to hand over data without telling you. Gr
    7 KB (1,191 words) - 23:04, 17 November 2022
  • • Will provide us with data security for putting docs online.
    4 KB (593 words) - 23:08, 20 May 2015
  • ...king DRM but it doesn't. But used as excuse to shut down scholarly work on security flaws. Inhibits competition among after-market products, e.g. Lexmark DRM i
    3 KB (525 words) - 23:37, 4 May 2015
  • Security dynamic of what can be public and what needs to remain private makes it dif ...nd practices. Shunning practices. If other communities saw them. Community security practices.
    9 KB (1,535 words) - 22:20, 26 November 2018
  • ...you want to store and use it, etc before you chose your tool. Think about security because you're dealing with people's private information. Or something. * [[What Holistic Digital Security Looks Like]] - Facilitator: Ali, Note taker: Beatrice
    19 KB (2,922 words) - 20:11, 1 April 2016
  • Tor represents a challenge to common assumptions of information control, security through strong identity, privacy by policy, and the need to trust the infra
    4 KB (595 words) - 18:48, 5 May 2015
  • * Legal support database security tools
    4 KB (599 words) - 20:19, 22 November 2016
  • what the sharing of that data mean to people's safety or security. What
    4 KB (744 words) - 19:23, 27 November 2017
  • *“George Bush has staked his presidency on privatizing Social Security. So we’ve launched a petition to stop it.”
    4 KB (648 words) - 21:42, 22 November 2016
  • Security needs to be taken into account when using SMS because traffic is unencrypte
    4 KB (665 words) - 17:57, 5 May 2015
  • '''Security:'''
    4 KB (708 words) - 18:48, 5 May 2015
  • * Tell it how to act / who to act like ("Llike a security researcher with a focus on accessibility")
    4 KB (611 words) - 18:31, 9 December 2023
  • * Has Django's advantages built in, e.g. emphasis on security
    4 KB (676 words) - 21:39, 25 November 2021
  • ...es with a site if all content isn’t secure, displaying broken pages and/or security warnings.
    4 KB (703 words) - 23:37, 4 May 2015
  • - security. YO!
    4 KB (636 words) - 21:51, 22 November 2016
  • From web pages that don't work with screen readers and security mechanisms that require visual ability, to applications that presume specif
    5 KB (806 words) - 23:08, 20 May 2015
  • ...ittle Brother" by Cory Doctorow - a YA book that breaks down lots of these security issues, available completely free on the web. * When I talk about security and privacy; when people get too fear based, people make everything private
    13 KB (2,128 words) - 18:07, 5 May 2015
  • What's different for a typical security training. Security Self Defense
    16 KB (2,897 words) - 23:20, 30 November 2016
  • * [[Evaluating security risks when working with high-risk constituents]], Facilitated by Tomas Krag * [[Communication security and counter surveillance]]
    9 KB (1,197 words) - 22:26, 11 May 2015
  • | Security in plain language | Security when using the cloud
    17 KB (2,437 words) - 16:42, 5 May 2015
  • * Security/Privacy of collected data (we won't spend time on this)
    5 KB (788 words) - 23:01, 28 November 2017
  • * If we are not going to use tools because of privacy and security concerns (ie. no Google Apps), what do we use?
    5 KB (880 words) - 17:21, 5 May 2015
  • * Security considerations, and implications
    4 KB (708 words) - 21:30, 20 May 2015
  • * How to balance security stability profitability
    5 KB (735 words) - 16:42, 5 May 2015
  • - hardware modding is good for hobbyists as well as security; outside testing and scrutiny can find problems before the problems hurt pe
    5 KB (813 words) - 00:44, 29 November 2017
  • ...Avaaz and you decide to build your own CRM, it gets a lot more difficult. Security becomes your problem. Email reputation becomes your problem. (Send emails a
    4 KB (776 words) - 21:47, 22 November 2016
  • are there any security best practices that you can mention?
    5 KB (880 words) - 21:55, 15 May 2015
  • Security - firewalls deep packet inspection to prevent/monitor access
    5 KB (776 words) - 21:37, 9 January 2019
  • *Security
    5 KB (701 words) - 17:21, 5 May 2015
  • security concerns
    4 KB (666 words) - 22:11, 15 May 2015
  • network security (seucre and encrypted)
    5 KB (894 words) - 18:46, 30 November 2017
  • ...he key points that went into its design, and SFCCP policies regarding data security and internet rights. She will also introduce some of the community members
    5 KB (740 words) - 21:47, 20 May 2015
  • ** security posture only as strong as its weakest link, smaller the system, the less li
    4 KB (709 words) - 01:31, 23 November 2016
  • * Security of data for community orgs
    5 KB (727 words) - 23:09, 28 November 2017
  • *Data Security
    5 KB (820 words) - 23:37, 4 May 2015
  • ** T: there are quasi private/state security entities like NSO group as well
    5 KB (784 words) - 22:40, 25 November 2021
  • * I will implement better security policies (email, pass codes) * I would teach the use of security tools to anyone who contacts me with questions '''Cooper'''
    17 KB (2,745 words) - 17:21, 5 May 2015
  • ...e, healthy outside-work life. Personal and professional values. Stability, security, sustainability, agency. Cooperation and individual decision making balance
    6 KB (779 words) - 22:29, 25 November 2021
  • * [[Evolving approaches to organizational digital security as part of larger movements for community safety]]
    5 KB (668 words) - 17:23, 2 December 2021
  • <p class="p3">HIPAA doesn't exist in Malawi; Baobab's system offers security safeguards, but not as many as American systems must provide. Since termina
    6 KB (1,075 words) - 23:22, 20 May 2015
  • security hole in the system.
    6 KB (928 words) - 19:36, 16 November 2017
  • differences: security/development
    6 KB (907 words) - 21:55, 15 May 2015
  • Lee. Crypto identity and offline ident. Privacy versus security.
    6 KB (931 words) - 17:47, 5 May 2015
  • * [[Security tools]] - Jack (Note Taker - Andrew) - Who is at most risk? How do we figur ...Internet of Things (IOT) security]] - Norman (Note Taker - Lisa) - Mobile security threats - how cell phones and smart phones and IoT things work. Where teh d
    22 KB (3,595 words) - 00:51, 14 November 2017
  • * [[Digital Security Best Practices]] - James
    6 KB (790 words) - 02:08, 18 November 2015
  • ...about $10k to produce. Used to have to start field office, get equipment, security staff, etc to be able to then hire a journalist --> Indaba is much less exp
    6 KB (1,004 words) - 18:48, 5 May 2015
  • *Veyr direct and informative security alerts sent out to users.This is an advantage that service providers comin
    5 KB (894 words) - 22:34, 29 November 2017
  • E-mail – '''PGP''' or '''GPG''' used to encrypt your e-mails. A way to bolt security on the e-mail protocol. As the internet grew - malicious activity started t
    7 KB (1,161 words) - 21:49, 22 November 2016
  • * [[Security 101]], Facilitated by Cooper Quintin and Steve McMahon
    7 KB (960 words) - 22:20, 15 May 2015
  • requirements changes quickly and w/ a much better sense of security.
    7 KB (1,210 words) - 21:30, 20 May 2015
  • **are there security alerts,
    7 KB (1,138 words) - 23:37, 4 May 2015
  • - No, due to security considerations
    7 KB (1,155 words) - 21:55, 15 May 2015
  • ...the simplest configuration choices we could to keep it simple, and managed security (other than self-hosting), we minimized the amount of data 'written down',
    8 KB (1,292 words) - 19:09, 30 November 2021
  • ** Physical security infrastructure
    8 KB (1,140 words) - 17:21, 5 May 2015
  • Food security aspects, housing aspects, community self defense, landscape.
    8 KB (1,360 words) - 23:18, 17 November 2017
  • What basic security is needed for in house and cloud-based applications including websites?
    10 KB (1,574 words) - 22:33, 15 May 2015
  • '''Cathy:''' Security researcher interviewed talking about what is realistic for people to do. No
    11 KB (1,895 words) - 19:59, 22 November 2016
  • ...os offline and summarize in human language (ex: talk in terms of speed and security – explain what the decisions mean). Specifications/core requirements and
    13 KB (2,051 words) - 18:48, 5 May 2015