A Fistful of Privacy Tips: Tech at Protests

A Fistful of Privacy Tips: Tech at Protests

The article 'A Fistful of Privacy Tips: Tech at Protests' is hosted on an external resource.

Click here to read the original content on the website https://datadetoxkit.org/en/privacy/protests/

Related content

A Voter's Guide: 7 Tips to Detox Your Data

Our Voter’s Guide explains how personal data is collected and used by political parties and candidates – and what voters can do about it. The seven tips are now available in both English and Dutch.

→︎ Read more

Event Promotion for Organisers

This new chapter of the Organiser's Activity Book from our Data & Activism project looks at event promotion. The playful activities, aimed at organisers, campaigners and human rights defenders, explore the consequences, risks and benefits of using tools like social media in terms of personal data.

The Organiser’s Activity Book

The Organiser’s Activity Book is a new self-learning resource from Tactical Tech’s Data and Activism project. The book is a collection of playful exercises for organisers within civil society who work with the personal data of human rights defenders, investigators, campaigners, and others who are taking part in social or political action.

→︎ Read more

La technologie est stupide : comment choisir la technologie pour le travail à distance

Cet article aborde les questions de savoir quelle technologie est bonne, sûre et appropriée à utiliser en ces temps complexes si nous voulons agir et travailler de manière responsable et à distance. Comment décider de la technologie à laquelle nous devons faire confiance ? Il examine également ce qui pourrait être fait à l'avenir pour répondre à cette question beaucoup plus facilement qu'aujourd'hui.

→︎ Read more

How to Manage Your Sources

From Exposing the Invisible The Kit: Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.

Retrieving and Archiving Information from Websites

In this chapter from Exposing the Invisible - The Kit, Wael Eskandar and Brad Murray explain ways to find and retrieve historical and ‘lost’ information from websites, to serve as evidence that something existed online, and ways to archive and preserve your own copies of webpages for future reference.

Activism on Social Media: A Curated Guide

There has been a lot of resources written on safer use of digital technologies and social media platforms for CSOs, grassroots groups, activists and politically-active individuals. Here we present a curated list of resources, a pool of links that can help you respond to existing risks and threats.

Data Baggage, Travel and Activism

At every stage, travelling means giving away an immense amount of data that is either required by governments or by companies that provide travel-related services, or that can be automatically generated in the background. This article gives insight into the data you give away when travelling.

On Weaponised Design

Weaponised design is a process that allows for harm of users within the defined bounds of a designed system. This article takes a look at how it can be faciliated by designers who are oblivious to the politics of digital infrastructure or consider their design practice output to be apolitical.

Quantifying Homosexuality: A Critique

This article examines a few moments related to the history of homosexuality and its categorisation. It starts with recent facial recognition algorithms to distinguish straight and gay faces and ends with Alan Turing’s questions about gender and The Imitation Game.

Holistic Security: The Trainer's Manual

The Trainer's Manual is the counterpart to the Holistic Security Strategy Manual for Human Rights Defenders. It reflects on further learnings and best practices grown out of Tactical Tech's engagements with experts and trainers on the overall protection, digital security, and psychosocial well-being for human rights defenders between 2013 and 2015.