September 29 2024 Agenda: Difference between revisions
(→Circle Descriptions: Added Clean insights tea time) |
No edit summary |
||
(32 intermediate revisions by 4 users not shown) | |||
Line 10: | Line 10: | ||
It's the last day! Come say goodbye to new and old friends, and have lunch at the many different vendors at the venue! This is also a great day to exchange contact information, solidify collaborations, and more! | It's the last day! Come say goodbye to new and old friends, and have lunch at the many different vendors at the venue! This is also a great day to exchange contact information, solidify collaborations, and more! | ||
< | <br> | ||
<br> | |||
<br> | |||
<br> | |||
<br> | |||
{| class="wikitable mw-collapsible" style="width:99%;" | |||
{| class="wikitable mw-collapsible" | |||
| rowspan="3" style="background: #fde68a;" |[[File:SOS Icon Agenda 2024.png|frameless|123x123px]] | | rowspan="3" style="background: #fde68a;" |[[File:SOS Icon Agenda 2024.png|frameless|123x123px]] | ||
| style="background: #fde68a;" | | | style="background: #fde68a;" | | ||
Line 27: | Line 27: | ||
|} | |} | ||
{| class="wikitable mw-collapsible" | {| class="wikitable mw-collapsible" style="width:99%;" | ||
| style="background: #5BE6EF;" |[[File:Circles Blue.png|center|frameless|120x120px]] | | style="background: #5BE6EF;" |[[File:Circles Blue.png|center|frameless|120x120px]] | ||
| colspan="3" style="background: #5BE6EF;" | | | colspan="3" style="background: #5BE6EF;" | | ||
Line 36: | Line 36: | ||
! colspan="4" style="background: #5BE6EF;" |<center><big>September 29</big></center> | ! colspan="4" style="background: #5BE6EF;" |<center><big>September 29</big></center> | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |'''<big>Location</big>''' | ||
| style="background: #b9f4f8;" |<center><big>'''13:30 - 14:30'''</big></center> | | style="background: #b9f4f8;" |<center><big>'''13:30 - 14:30'''</big></center> | ||
| style="background: #b9f4f8;" |<center><big>'''15:00 - 16:00'''</big></center> | | style="background: #b9f4f8;" |<center><big>'''15:00 - 16:00'''</big></center> | ||
| style="background: #b9f4f8;" |<center><big>'''16:30 - 17:30'''</big></center> | | style="background: #b9f4f8;" |<center><big>'''16:30 - 17:30'''</big></center> | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 1 | ||
|Self-Organized Circle to be determined (SOC TBD) | |CTRL + ALT + DEL: Learnings on Movement Building from the Digital Rights Asia-Pacific Assemblies | ||
|Incident Response Working Group | |||
|Digital Security Providers in Eastern Europe: New Solutions to Familiar Challenges? | |||
|- | |||
| style="background: #b9f4f8;" |Circle 2 | |||
|World-wide Autonomous Comunication Over HF Band | |||
|Countering digital authoritarianism and online repression in Central Asia | |||
|Return of the Zines: A Hands-on Approach to Censorship Circumvention | |||
|- | |||
| style="background: #b9f4f8;" |Circle 3 | |||
|[https://wiki.digitalrights.community/index.php?title=Global_Gathering_Self-Organized_Circles_or_Booths Self-Organized Circle to be determined (SOC TBD)] | |||
|(SOC TBD) | |(SOC TBD) | ||
|(SOC TBD) | |(SOC TBD) | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 4 | ||
|(SOC TBD) | |(SOC TBD) | ||
|(SOC TBD) | |(SOC TBD) | ||
|(SOC TBD) | |(SOC TBD) | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 5 | ||
|(SOC TBD) | |(SOC TBD) | ||
|(SOC TBD) | |(SOC TBD) | ||
| | |Maximizing Engagement in your Digital Literacy Workshop through Gameplay | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 6 | ||
|Is it Time to Create Certification for Digital Security Practitioners? | |Is it Time to Create Certification for Digital Security Practitioners? | ||
| | |||
|Securing the Digital Frontline: Threat Analysis for Human Rights Defenders in Thailand and Vietnam | |||
|The Costs of Protection: The Global Landscape for Data Privacy and Security Tools | |||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 7 | ||
| | |GenAI & LLMs in COMO & TS: Where Do Human Rights and Communities Fit in Today’s Hottest Acronyms? | ||
| | |How to Stop Promising/Doing Audits and Start Promising/Doing What is Actually Needed | ||
| | |Safeguarding NGOs and Digital Rights Organizations: Tackling Insider Threats and Beyond | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |Circle 8 | ||
|Digital Iran Reloaded: Gamers’ Circumvention Tactics in the IRI | |||
|Building The Asia Digital Rights Community | |Building The Asia Digital Rights Community | ||
|Building a Digital Rights Movement Among the Francophone Community | |Building a Digital Rights Movement Among the Francophone Community | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" | Circle 9 | ||
|Activate the Network: Collective Training Against Internet Shutdowns | |Activate the Network: Collective Training Against Internet Shutdowns | ||
|How | |Bridging the Gaps Between Activists and Hackers: How To Talk With Each Other About Security | ||
| | |Supporting Asian HRDs in the Frontline: How We Shape the Local Supporting System and Model | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" | Circle 10 | ||
|What Are Your Operations and Admin Challenges? | |What Are Your Operations and Admin Challenges? | ||
| | |Growing Support for FOSS Sustainability | ||
|Managers Meetup | |Managers Meetup | ||
|- | |- | ||
| colspan="4" style="background: #5BE6EF;" |<center>'''<big>Circles @ Partner Villages, September 29</big>'''</center> | | colspan="4" style="background: #5BE6EF;" |<center>'''<big>Circles @ Partner Villages, September 29</big>'''</center> | ||
|- | |- | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" |'''<big>Location</big>''' | ||
| style="background: #b9f4f8;" |<center>'''<big>13:30 - 14:30</big>'''</center> | | style="background: #b9f4f8;" |<center>'''<big>13:30 - 14:30</big>'''</center> | ||
| style="background: #b9f4f8;" |<center>'''<big>15:00 - 16:00</big>'''</center> | | style="background: #b9f4f8;" |<center>'''<big>15:00 - 16:00</big>'''</center> | ||
Line 101: | Line 101: | ||
| style="background: #b9f4f8;" |'''Tor Project & Tails Village''' (Booth 9) | | style="background: #b9f4f8;" |'''Tor Project & Tails Village''' (Booth 9) | ||
| | | | ||
|Leveraging Weblate and automated checks for higher quality localization | |Leveraging Weblate and automated checks for higher quality localization | ||
|Tor Browser, Tails, and You | |Tor Browser, Tails, and You | ||
|- | |- | ||
Line 125: | Line 125: | ||
|- | |- | ||
| style="background: #b9f4f8;" |'''Outline Village'''<br /> (Booth 79) | | style="background: #b9f4f8;" |'''Outline Village'''<br /> (Booth 79) | ||
| Knowledge sharing across circumvention tool providers and Outline SDK users around the world | | Partners Share: Knowledge sharing across circumvention tool providers and Outline SDK users around the world | ||
| | |Hangout with the Jigsaw Team | ||
| | |Hangout with the Jigsaw Team | ||
|- | |- | ||
| style="background: #b9f4f8;" |'''WANA Café'''<br /> (Booth 81) | | style="background: #b9f4f8;" |'''WANA Café'''<br /> (Booth 81) | ||
Line 135: | Line 135: | ||
|} | |} | ||
{| class="wikitable mw-collapsible" | {| class="wikitable mw-collapsible" style="width:99%;" | ||
| style="background: #5BE6EF;" |[[File:Booth Icon Agenda 2024 Light Blue.png|center|frameless| | | style="background: #5BE6EF; width:10%;" |[[File:Booth Icon Agenda 2024 Light Blue.png|center|frameless|60x60px]] | ||
| colspan="5" style="background: #5BE6EF;" | | | colspan="5" style="background: #5BE6EF;" | | ||
===<big>Booths</big>=== | ===<big>Booths</big>=== | ||
Each booth has a number, which can be found on top, center above a booth's "window". | Each booth has a number, which can be found on top, center above a booth's "window". | ||
Line 147: | Line 149: | ||
| style="background: #b9f4f8;" | | | style="background: #b9f4f8;" | | ||
| colspan="2" style="background: #b9f4f8;" |<center><big>'''13:00 - 15:00'''</big></center> | | colspan="2" style="background: #b9f4f8;" |<center><big>'''13:00 - 15:00'''</big></center> | ||
| rowspan=" | | rowspan="30" style="background: #5BE6EF;" | | ||
| colspan="2" style="background: #b9f4f8;" |<center><big>'''15:30 - 17:30'''</big> | | colspan="2" style="background: #b9f4f8;" |<center><big>'''15:30 - 17:30'''</big> | ||
|- | |- | ||
Line 201: | Line 203: | ||
| style="background: #b9f4f8;" | Booth 7 | | style="background: #b9f4f8;" | Booth 7 | ||
|'''Usability and Accessibility Clinic''' | |'''Usability and Accessibility Clinic''' | ||
|Accessibility Lab | |Accessibility Lab<br>UXD Lab<br>Ura Design<br>Decent Design<br>Superbloom | ||
UXD Lab | |'''Usability and Accessibility Clinic''' | ||
Ura Design | |Accessibility Lab<br>UXD Lab<br>Ura Design<br>Decent Design<br>Superbloom | ||
Decent Design | |||
| | |||
| | |||
|- | |- | ||
| style="background: #b9f4f8;" |Booth 8 | | style="background: #b9f4f8;" |Booth 8 | ||
Line 257: | Line 256: | ||
|- | |- | ||
| style="background: #b9f4f8;" |Booth 16 | | style="background: #b9f4f8;" |Booth 16 | ||
| | |'''PrivacyLx''' | ||
| | |PrivacyLx | ||
| | | | ||
| | | | ||
Line 316: | Line 315: | ||
| | | | ||
|- | |- | ||
| style="background: #b9f4f8;" |Booth | | style="background: #b9f4f8;" |Booth 83a | ||
| style="background: #FFF9C4;" |'''Digital Justice House''' | | style="background: #FFF9C4;" |'''Digital Justice House''' | ||
|Team CommUNITY | |Team CommUNITY | ||
| style="background: #FFF9C4;" | | |||
| | |||
|- | |||
| style="background: #b9f4f8;" |Booth 83b | |||
|'''Coaching, Leadership and Fundraising Support''' | |||
|<small>Spring Strategies</small> | |||
| | |||
| | |||
|} | |} | ||
{| class="wikitable mw-collapsible" style="width:99%;" | |||
|style="background: #ffa3e8;" |[[File:Evenings Icon Agenda GG 2024.png|frameless|145x145px]] | |||
{| class="wikitable mw-collapsible" | | colspan="2" style="background: #ffa3e8;" | | ||
| style="background: #ffa3e8;" | | === Evening Celebration === | ||
|- | |||
| style="background: #ffa3e8;" | | |||
| style="background: #ffa3e8;" |<big>'''DJ Talie'''</big> | | style="background: #ffa3e8;" |<big>'''DJ Talie'''</big> | ||
'''Time:''' 18:00 | '''Time:''' 18:00 | ||
Natalie (DJ Talie) brings a fresh mix of Afrobeats, Amapiano and AfroHouse in her set, creating a unique blend of rhythms and grooves bringing great vibes and buzz on the dancefloor all night. | Natalie (DJ Talie) brings a fresh mix of Afrobeats, Amapiano and AfroHouse in her set, creating a unique blend of rhythms and grooves bringing great vibes and buzz on the dancefloor all night. | ||
| style="background: #ffa3e8;" | <center>[[File:DJ Talie.png|alt=Dj Talie's picture|185x185px|frameless|center]]</center> | |||
|} | |} | ||
Line 383: | Line 391: | ||
|<small>'''Activate the network:'''</small> <small>'''Collective training against Internet shutdowns'''</small> | |<small>'''Activate the network:'''</small> <small>'''Collective training against Internet shutdowns'''</small> | ||
|<small>We will explore how capacity building can empower activists and organizations to form effective coalitions in the fight against internet shutdowns. Join us to discuss strategies, share experiences, and debate the best approaches to promote resilience and coordinated action in contexts of digital censorship. This session aims to be a catalyst for inter-organizational collaboration, strengthening a global network united by the defense of online freedom.</small> | |<small>We will explore how capacity building can empower activists and organizations to form effective coalitions in the fight against internet shutdowns. Join us to discuss strategies, share experiences, and debate the best approaches to promote resilience and coordinated action in contexts of digital censorship. This session aims to be a catalyst for inter-organizational collaboration, strengthening a global network united by the defense of online freedom.</small> | ||
|- | |- | ||
|<small>'''Bridging the gaps between activists and hackers:'''</small> <small>'''How to talk with each other about security'''</small> | |<small>'''Bridging the gaps between activists and hackers:'''</small> <small>'''How to talk with each other about security'''</small> | ||
Line 401: | Line 400: | ||
|<small>'''Building a digital rights movement among the Francophone community'''</small> | |<small>'''Building a digital rights movement among the Francophone community'''</small> | ||
| <small>During the very first Franchophone monthly meetup hosted by Team CommUNITY, facilitators identified the need to better coordinate efforts across French-speaking countries in Africa and the Middle East to identify patterns of digital threats. Many long-standing will meet in-person for the first time during this circle. However, other GG participants are invited to help continue building community-driven knowledge and strategize advocacy campaigns within the French-speaking digital rights community.</small> | | <small>During the very first Franchophone monthly meetup hosted by Team CommUNITY, facilitators identified the need to better coordinate efforts across French-speaking countries in Africa and the Middle East to identify patterns of digital threats. Many long-standing will meet in-person for the first time during this circle. However, other GG participants are invited to help continue building community-driven knowledge and strategize advocacy campaigns within the French-speaking digital rights community.</small> | ||
|- | |- | ||
|<small>'''Building the Asia digital rights community'''</small> | |<small>'''Building the Asia digital rights community'''</small> | ||
Line 412: | Line 407: | ||
|<small>'''ButterBox:'''</small> <small>'''Life without the internet made smoother'''</small> | |<small>'''ButterBox:'''</small> <small>'''Life without the internet made smoother'''</small> | ||
|<small>Facilitators: Guardian Project, Digital Society of Africa, Colnodo</small><small>The ButterBox serves as a hotspot and ecosystem, offering curated apps, local encrypted chat, and the ability to share resources via USB. This year it has been deployed in various regions. Join this session to learn about various ButterBox use cases, see a demo demonstrating its functionality, and hear from field agents who implemented the ButterBox in diverse scenarios. This includes digital security trainings, sharing entertainment within apartment buildings, supporting indigenous offline communities, and preparing for internet shutdowns. There will also be time to brainstorm the future of Butter, where you can provide feedback on what you would like to see in the future.</small> | |<small>Facilitators: Guardian Project, Digital Society of Africa, Colnodo</small><small>The ButterBox serves as a hotspot and ecosystem, offering curated apps, local encrypted chat, and the ability to share resources via USB. This year it has been deployed in various regions. Join this session to learn about various ButterBox use cases, see a demo demonstrating its functionality, and hear from field agents who implemented the ButterBox in diverse scenarios. This includes digital security trainings, sharing entertainment within apartment buildings, supporting indigenous offline communities, and preparing for internet shutdowns. There will also be time to brainstorm the future of Butter, where you can provide feedback on what you would like to see in the future.</small> | ||
|- | |- | ||
|'''<small>Clean Insights Tea Time</small>''' | |'''<small>Clean Insights Tea Time</small>''' | ||
|<small>Join the Guardian Project team twice a day to delight in delicious ethical and organic Insightful Tea while chatting about ways in which your work can detox from harmful tracking and data collection practices.</small> | |<small>Join the Guardian Project team twice a day to delight in delicious ethical and organic Insightful Tea while chatting about ways in which your work can detox from harmful tracking and data collection practices.</small> | ||
|- | |- | ||
| <small>'''Countering digital authoritarianism and online repression in Central Asia'''</small> | | <small>'''Countering digital authoritarianism and online repression in Central Asia'''</small> | ||
Line 430: | Line 416: | ||
|<small>'''CTRL + ALT + DEL:'''</small> <small>'''Learnings on movement building from the digital rights Asia-Pacific assemblies'''</small> | |<small>'''CTRL + ALT + DEL:'''</small> <small>'''Learnings on movement building from the digital rights Asia-Pacific assemblies'''</small> | ||
| <small>What comes next after two Digital Rights Asia-Pacific (DRAPAC) Assemblies in Chiang Mai, Thailand, and Taipei, Taiwan? This Circle is open to anyone who wants to discuss how the digital rights movement in the Asia-Pacific can continue to:</small> <small>1</small> <small>Empower peoples across Asia-Pacific to regain control of our civic spaces, fundamental rights, social platforms, and digital technology from the dominance of big tech and interference by the state.</small> <small>2. Platform innovative alternatives in approaching and strategizing human rights advocacy in Asia-Pacific by centering local grassroots communities and strengthening networks across borders.</small><small>3. Shift our thinking and culture towards more open, inclusive, and participatory decision-making processes and governance structures within the regional digital rights movements.</small> | | <small>What comes next after two Digital Rights Asia-Pacific (DRAPAC) Assemblies in Chiang Mai, Thailand, and Taipei, Taiwan? This Circle is open to anyone who wants to discuss how the digital rights movement in the Asia-Pacific can continue to:</small> <small>1</small> <small>Empower peoples across Asia-Pacific to regain control of our civic spaces, fundamental rights, social platforms, and digital technology from the dominance of big tech and interference by the state.</small> <small>2. Platform innovative alternatives in approaching and strategizing human rights advocacy in Asia-Pacific by centering local grassroots communities and strengthening networks across borders.</small><small>3. Shift our thinking and culture towards more open, inclusive, and participatory decision-making processes and governance structures within the regional digital rights movements.</small> | ||
|- | |- | ||
|<small>'''Digital Iran reloaded:'''</small> <small>'''Gamers’ circumvention tactics in the IRI'''</small> | |<small>'''Digital Iran reloaded:'''</small> <small>'''Gamers’ circumvention tactics in the IRI'''</small> | ||
|<small>Participants will discuss current circumvention methods used by gamers in Iran, how methods could be improved based on preliminary findings in the field.</small> | |<small>Participants will discuss current circumvention methods used by gamers in Iran, how methods could be improved based on preliminary findings in the field.</small> | ||
|- | |- | ||
|<small>'''Digital security providers in Eastern Europe:'''</small> <small>'''New solutions to familiar challenges?'''</small> | |<small>'''Digital security providers in Eastern Europe:'''</small> <small>'''New solutions to familiar challenges?'''</small> | ||
|<small>This circle is for those wanting to support digisec work in Eastern Europe, South Caucuses and beyond. Learn about the most recent findings examining the work of digital security (digisec) specialists in Armenia, Azerbaijan, Belarus, Georgia, Moldova, and Ukraine. They are a result of an annual assessment, carried out by the community since 2021, which</small> <small>focuses on the work environment, demand for digisec services within local civil society, security of digisec specialists and formats of their services, availability of resources, and other aspects essential to their work.</small> <small>Current findings in each country will be compared with both old and emergent trends being observed across the region, as well as the results of the annual assessment</small><small>s</small> <small>conducted in 2021, 2022, and 2023.</small> <small>Also discussed will be efforts to</small> <small>support the digisec community, build the capacity of its members, and potential solutions.</small> | |<small>This circle is for those wanting to support digisec work in Eastern Europe, South Caucuses and beyond. Learn about the most recent findings examining the work of digital security (digisec) specialists in Armenia, Azerbaijan, Belarus, Georgia, Moldova, and Ukraine. They are a result of an annual assessment, carried out by the community since 2021, which</small> <small>focuses on the work environment, demand for digisec services within local civil society, security of digisec specialists and formats of their services, availability of resources, and other aspects essential to their work.</small> <small>Current findings in each country will be compared with both old and emergent trends being observed across the region, as well as the results of the annual assessment</small><small>s</small> <small>conducted in 2021, 2022, and 2023.</small> <small>Also discussed will be efforts to</small> <small>support the digisec community, build the capacity of its members, and potential solutions.</small> | ||
|- | |- | ||
|<small>'''Echoes of isolation:'''</small> <small>'''Gathering first-hand accounts from fragmented networks'''</small> | |<small>'''Echoes of isolation:'''</small> <small>'''Gathering first-hand accounts from fragmented networks'''</small> | ||
|<small>Participants are invited to share, analyze, and reflect on personal accounts, weaving a rich tapestry of stories that highlight the human dimension of digital fragmentation.</small> | |<small>Participants are invited to share, analyze, and reflect on personal accounts, weaving a rich tapestry of stories that highlight the human dimension of digital fragmentation.</small> | ||
|- | |- | ||
|<small>'''Fostering diversity and inclusion in Open Source Projects'''</small> | |<small>'''Fostering diversity and inclusion in Open Source Projects'''</small> | ||
|<small>Join this engaging discussion on how diversity and inclusion influence every aspect of open source projects. Learn from others' experiences and insights on creating a welcoming and equitable open source community based on conversations with open source projects under Next Generation Internet Zero (NGI0) initiative. While code is crucial, the management of open source projects, the diversity of contributors and users, selection of communication channels and transparency among others are equally important.</small> | |<small>Join this engaging discussion on how diversity and inclusion influence every aspect of open source projects. Learn from others' experiences and insights on creating a welcoming and equitable open source community based on conversations with open source projects under Next Generation Internet Zero (NGI0) initiative. While code is crucial, the management of open source projects, the diversity of contributors and users, selection of communication channels and transparency among others are equally important.</small> | ||
|- | |- | ||
|<small>'''GenAI & LLMs in COMO & TS: Where do human rights and communities fit in today’s hottest acronyms?'''</small> | |<small>'''GenAI & LLMs in COMO & TS: Where do human rights and communities fit in today’s hottest acronyms?'''</small> | ||
Line 491: | Line 436: | ||
|<small>This Circle brings together FLOSS funders who will share their approaches to funding sustainability for human rights FOSS projects, learn from participants about the sustainability challenges their projects face, and explore ways that the funding ecosystem can be more responsive to their needs.</small> <small>Free and open source code is the foundation for the technology that human rights defenders, activists, journalists, and other at-risk communities rely on to access the internet and communicate safely and securely. Despite the critical role they play, many FOSS projects struggle to find funding that supports their long-term sustainability. The essential, day-to-day bug-squashing, security updates, community management, and operational activities needed to maintain reliable and secure technologies are either squeezed into new-feature proposals, or too often left unfunded altogether.</small> <small>More funders are stepping up to address this challenge.</small> | |<small>This Circle brings together FLOSS funders who will share their approaches to funding sustainability for human rights FOSS projects, learn from participants about the sustainability challenges their projects face, and explore ways that the funding ecosystem can be more responsive to their needs.</small> <small>Free and open source code is the foundation for the technology that human rights defenders, activists, journalists, and other at-risk communities rely on to access the internet and communicate safely and securely. Despite the critical role they play, many FOSS projects struggle to find funding that supports their long-term sustainability. The essential, day-to-day bug-squashing, security updates, community management, and operational activities needed to maintain reliable and secure technologies are either squeezed into new-feature proposals, or too often left unfunded altogether.</small> <small>More funders are stepping up to address this challenge.</small> | ||
|- | |- | ||
| | |'''<small>Hangout with the Jigsaw team</small>''' | ||
|<small>Swing by to enjoy drinks and snacks while we get to Jigsaw team and other users!</small> | |||
|<small> | |||
|- | |- | ||
|<small>'''How to stop promising/doing audits and start promising/doing what is actually needed'''</small> | |<small>'''How to stop promising/doing audits and start promising/doing what is actually needed'''</small> | ||
| <small>Trainings, ToTs, Checklists, Audits - why is our fixation on formats so obsessive? The vicious circle "Applications writers - Donors - Practitioners - CSOs (clients)" makes us to forget what we actually wanted to help to provide real assistance. Not "X audits for $Y money within 12 months" - but real help.</small><small>Let's think together and discuss how could we (practitioners) communicate with applications writers donors and CSOs - in the end to make the programs/projects to reflect what is actually needed a real help instead of "audits/trainings/ToTs/etc".</small><small>I hope to have a honest relaxed conversation"</small> | | <small>Trainings, ToTs, Checklists, Audits - why is our fixation on formats so obsessive? The vicious circle "Applications writers - Donors - Practitioners - CSOs (clients)" makes us to forget what we actually wanted to help to provide real assistance. Not "X audits for $Y money within 12 months" - but real help.</small><small>Let's think together and discuss how could we (practitioners) communicate with applications writers donors and CSOs - in the end to make the programs/projects to reflect what is actually needed a real help instead of "audits/trainings/ToTs/etc".</small><small>I hope to have a honest relaxed conversation"</small> | ||
|- | |- | ||
|<small>'''Incident Response Working Group'''</small> | |||
| <small>'''Incident | |||
|<small>The Incident Response Working Group is an ongoing series of meetings between censorship circumvention tool developers, human rights workers, and help desk administrators to discuss how to better respond to incidents of escalated blocking and Internet shutdowns. The group discusses what barriers exist to collaboration and coordination among multiple stakeholders through structured workgroup sessions. The goal is to help end users get back online faster by reducing the time to detect incidents, develop mitigations, and deploy those mitigations to end users.</small> | |<small>The Incident Response Working Group is an ongoing series of meetings between censorship circumvention tool developers, human rights workers, and help desk administrators to discuss how to better respond to incidents of escalated blocking and Internet shutdowns. The group discusses what barriers exist to collaboration and coordination among multiple stakeholders through structured workgroup sessions. The goal is to help end users get back online faster by reducing the time to detect incidents, develop mitigations, and deploy those mitigations to end users.</small> | ||
|- | |- | ||
|<small>'''Is it time to create certification for digital security practitioners?'''</small> | |<small>'''Is it time to create certification for digital security practitioners?'''</small> | ||
|<small>There's a growing community of digital security practitioners, who work with the civil society and are often funded by charities and grants. These practitioners often have varying degrees of competence, and sometimes, if they are not technically competent enough, they might do more harm than good. It would seem that establishing some sort of a certification for such practitioners could be a good idea, but there are both positive and negatives. Join this circle to explore these open questions.</small> | |<small>There's a growing community of digital security practitioners, who work with the civil society and are often funded by charities and grants. These practitioners often have varying degrees of competence, and sometimes, if they are not technically competent enough, they might do more harm than good. It would seem that establishing some sort of a certification for such practitioners could be a good idea, but there are both positive and negatives. Join this circle to explore these open questions.</small> | ||
|- | |- | ||
|<small>''' | |<small>'''Partners share: Knowledge sharing across circumvention tool providers and Outline SDK users around the world'''</small> | ||
|<small>In the ever-changing censorship environments, tool providers and content providers must adopt new circumvention technologies at a faster pace. In this circle, we will host a discussion about the situation of censorship circumvention work in different regions (e.g, what are some unmet needs right now, how are censors getting ahead of the cat-and-mouse games, and what are some lessons learned); at the same time, we invite tool providers that have integrated Jigsaw’s Outline to share their experience about how the technology is performing in different regions.</small> | |<small>In the ever-changing censorship environments, tool providers and content providers must adopt new circumvention technologies at a faster pace. In this circle, we will host a discussion about the situation of censorship circumvention work in different regions (e.g, what are some unmet needs right now, how are censors getting ahead of the cat-and-mouse games, and what are some lessons learned); at the same time, we invite tool providers that have integrated Jigsaw’s Outline to share their experience about how the technology is performing in different regions.</small> | ||
|- | |- | ||
|<small>'''Leveraging weblate and automated checks for higher quality localization'''</small> | |||
|<small>'''Leveraging weblate and automated checks for higher quality localization | |||
|<small>Participants will share best practice on localizing Internet Freedom applications and learn about how Tor Project migrated from Transifex into Weblate, a free software project.</small> | |<small>Participants will share best practice on localizing Internet Freedom applications and learn about how Tor Project migrated from Transifex into Weblate, a free software project.</small> | ||
|- | |- | ||
|'''<small>Managers meetup</small>''' | |'''<small>Managers meetup</small>''' | ||
Line 539: | Line 459: | ||
|<small>'''Maximizing engagement in your digital literacy workshop through gameplay'''</small> | |<small>'''Maximizing engagement in your digital literacy workshop through gameplay'''</small> | ||
|<small>Teaching new concepts and skills to adult learners can be tricky business; we all have a million tasks on our to-do lists. Gaining and sustaining the attention of your workshop participants requires a wide variety of strategies. This circle will debut a new card game explicitly designed to teach fundamental data privacy skills to workshop participants and individual groups of learners through a bespoke card game. In addition, participants will learn about experiences developing new games, and help invent a new a game!</small> | |<small>Teaching new concepts and skills to adult learners can be tricky business; we all have a million tasks on our to-do lists. Gaining and sustaining the attention of your workshop participants requires a wide variety of strategies. This circle will debut a new card game explicitly designed to teach fundamental data privacy skills to workshop participants and individual groups of learners through a bespoke card game. In addition, participants will learn about experiences developing new games, and help invent a new a game!</small> | ||
|- | |- | ||
| <small>'''Return of the zines:'''</small> <small>'''A hands-on approach to censorship circumvention'''</small> | | <small>'''Return of the zines:'''</small> <small>'''A hands-on approach to censorship circumvention'''</small> | ||
|<small>More people are online than ever before. But because of increasing levels of censorship, fewer people seem to share the same online experience as populations. In this circle, participants will revisit a pivotal era when photocopiers were revolutionary tools in a fight for access to platforms and audiences. In this hands-on workshop on zine-making, participants will delve into the contemporary power of zines to promote peer-to-peer content sharing. Together, participants will discuss how this grassroots strategy can expand publishers' reach and enhance news consumers' access to information, especially in today's restricted internet environments.</small> | |<small>More people are online than ever before. But because of increasing levels of censorship, fewer people seem to share the same online experience as populations. In this circle, participants will revisit a pivotal era when photocopiers were revolutionary tools in a fight for access to platforms and audiences. In this hands-on workshop on zine-making, participants will delve into the contemporary power of zines to promote peer-to-peer content sharing. Together, participants will discuss how this grassroots strategy can expand publishers' reach and enhance news consumers' access to information, especially in today's restricted internet environments.</small> | ||
|- | |- | ||
| <small>'''Safeguarding NGOs and digital rights organizations: Tackling insider threats and beyond'''</small> | | <small>'''Safeguarding NGOs and digital rights organizations: Tackling insider threats and beyond'''</small> | ||
|<small>Security directors from HRW, Access Now, AI, and other NGOs will tackle the issue of insider threats, focusing on their impact on non-profits and digital rights organizations. With participants, they will define insider threats, discuss the unique risks they pose, especially during crises and events, and provide practical examples from the field, and touch on the broader threat landscape.</small> <small>Participants will engage in an open discussion to share their experiences and strategies for managing insider threats, both physical and digital.</small> <small>In addition, participants will engage in a</small><small>n</small> <small>exercise developing realistic scenario-based training to better equip</small> <small>their</small> <small>team</small><small>s</small><small>. Leave with</small> <small>concrete solutions and resources to strengthen your organization's security against insider threats such mitigation strategies, including robust access controls, cybersecurity measures, and scenario-based trainings.</small> | |<small>Security directors from HRW, Access Now, AI, and other NGOs will tackle the issue of insider threats, focusing on their impact on non-profits and digital rights organizations. With participants, they will define insider threats, discuss the unique risks they pose, especially during crises and events, and provide practical examples from the field, and touch on the broader threat landscape.</small> <small>Participants will engage in an open discussion to share their experiences and strategies for managing insider threats, both physical and digital.</small> <small>In addition, participants will engage in a</small><small>n</small> <small>exercise developing realistic scenario-based training to better equip</small> <small>their</small> <small>team</small><small>s</small><small>. Leave with</small> <small>concrete solutions and resources to strengthen your organization's security against insider threats such mitigation strategies, including robust access controls, cybersecurity measures, and scenario-based trainings.</small> | ||
|- | |- | ||
|<small>'''Safety for voices:'''</small> <small>'''South- | |<small>'''Safety for voices:'''</small> <small>'''South-south strategies for WHRDs in digital spaces'''</small> | ||
|<small>Acknowledging that the threats and attacks targeting women and gender-diverse human rights defenders (WHRDs) in the digital sphere are an extension of patriarchal, racist, and colonial systematic violence, this circle seeks to establish a platform for critical reflection rooted in South-South collaboration. Participants will learn about two studies aimed at documenting the patterns of violence and the tools of resistance employed by WHRDs within their territories. Participants will also share experiences and the development of collective strategies to safeguard their voices. Grounded in a holistic feminist protection approach, the circle aims to foster solidarity and resilience among WHRDs facing digital threats.</small> | |<small>Acknowledging that the threats and attacks targeting women and gender-diverse human rights defenders (WHRDs) in the digital sphere are an extension of patriarchal, racist, and colonial systematic violence, this circle seeks to establish a platform for critical reflection rooted in South-South collaboration. Participants will learn about two studies aimed at documenting the patterns of violence and the tools of resistance employed by WHRDs within their territories. Participants will also share experiences and the development of collective strategies to safeguard their voices. Grounded in a holistic feminist protection approach, the circle aims to foster solidarity and resilience among WHRDs facing digital threats.</small> | ||
|- | |- | ||
|<small>'''Securing the digital frontline: Threat analysis for human rights defenders in Thailand and Vietnam'''</small> | |<small>'''Securing the digital frontline: Threat analysis for human rights defenders in Thailand and Vietnam'''</small> | ||
|<small>In this Circle, participants will recent research findings related to digital security risks for human rights defenders in Thailand and Vietnam, as well as the physical threats that lead to these risks. Explore effective protection mechanisms, share lessons learned, and discuss strategies to enhance the safety and resilience of digital advocates in these regions.</small> | |<small>In this Circle, participants will recent research findings related to digital security risks for human rights defenders in Thailand and Vietnam, as well as the physical threats that lead to these risks. Explore effective protection mechanisms, share lessons learned, and discuss strategies to enhance the safety and resilience of digital advocates in these regions.</small> | ||
|- | |- | ||
|<small>'''Supporting Asian HRDs in the frontline:'''</small> <small>'''How we shape the local supporting system and model'''</small> | |<small>'''Supporting Asian HRDs in the frontline:'''</small> <small>'''How we shape the local supporting system and model'''</small> | ||
|<small>Participants will hear from three Asian digital security supporting groups on their experiencing developing service models that reflect their local socio-political environments and threats. Based on these sharings, participants will discuss how to find the resources grow support work in their locality and region.</small> | |<small>Participants will hear from three Asian digital security supporting groups on their experiencing developing service models that reflect their local socio-political environments and threats. Based on these sharings, participants will discuss how to find the resources grow support work in their locality and region.</small> | ||
|- | |- | ||
| <small>'''The costs of protection:'''</small> <small>'''The global landscape for data privacy and security tools'''</small> | | <small>'''The costs of protection:'''</small> <small>'''The global landscape for data privacy and security tools'''</small> | ||
|<small>In this circle, participants will Identify the best and most useful tools (commercial or open source) available in their region, languages, and cultural context for meeting regional digisec/privacy needs. They will also discuss how</small> <small>existing tools or strategies could be modified/expanded to make them available to users in more parts of the world.</small> <small>Lacking effective national data privacy policies, individual internet users who want to protect their digital privacy and security often need to install and use VPNs, ad blockers, password managers, mail clients, or services like DeleteMe to protect their PII.</small> <small>These solutions are frequently recommended by digisec experts, but for citizens in the Global Majority, using these tools is often hindered by social, political and economic factors, including costs, exchange rates, credit card requirements, the quirks of banking systems, or the fact that interfaces, documentation, and the apps themselves are designed for the English-speaking market.</small> | |<small>In this circle, participants will Identify the best and most useful tools (commercial or open source) available in their region, languages, and cultural context for meeting regional digisec/privacy needs. They will also discuss how</small> <small>existing tools or strategies could be modified/expanded to make them available to users in more parts of the world.</small> <small>Lacking effective national data privacy policies, individual internet users who want to protect their digital privacy and security often need to install and use VPNs, ad blockers, password managers, mail clients, or services like DeleteMe to protect their PII.</small> <small>These solutions are frequently recommended by digisec experts, but for citizens in the Global Majority, using these tools is often hindered by social, political and economic factors, including costs, exchange rates, credit card requirements, the quirks of banking systems, or the fact that interfaces, documentation, and the apps themselves are designed for the English-speaking market.</small> | ||
|- | |- | ||
|<small>'''The MENA Alliance for Digital Rights'''</small> | |<small>'''The MENA Alliance for Digital Rights'''</small> | ||
|<small>The MENA Digital Rights Alliance is a civil society coalition advancing digital rights in the Middle East and North Africa region. We are a group of 12 local and global civil society organizations and activists who believe in the power of collective action and cross-border solidarity in the fight against rising digital authoritarianism. We’ll delve into current and emerging regional trends, threats and opportunities, create shared priorities, and strategize on potential joint advocacy and campaigning. This Circle will set our strategic plan and focus areas for the upcoming year and discuss each other's work. We want to set shared priorities to create joint efforts and advocacy campaigns.</small><small>The MADR meets already every month, online. This meeting will be a continuity of our yearly in-person meetings.</small> <small>These in-person convenings are to set an agenda for the year and they do participate in building momentum for the alliance's advocacy efforts.</small> | |<small>The MENA Digital Rights Alliance is a civil society coalition advancing digital rights in the Middle East and North Africa region. We are a group of 12 local and global civil society organizations and activists who believe in the power of collective action and cross-border solidarity in the fight against rising digital authoritarianism. We’ll delve into current and emerging regional trends, threats and opportunities, create shared priorities, and strategize on potential joint advocacy and campaigning. This Circle will set our strategic plan and focus areas for the upcoming year and discuss each other's work. We want to set shared priorities to create joint efforts and advocacy campaigns.</small><small>The MADR meets already every month, online. This meeting will be a continuity of our yearly in-person meetings.</small> <small>These in-person convenings are to set an agenda for the year and they do participate in building momentum for the alliance's advocacy efforts.</small> | ||
|- | |- | ||
|<small>'''The | |<small>'''The real ESCAPE GAME:'''</small> <small>'''1 Hour to break out of the Splinternet!'''</small> | ||
|<small>An immersive, interactive challenge where participants must collaboratively navigate and escape a simulated splinternet. This circle synthesizes the learnings of SplinterCon, testing participants’ problem-solving abilities and resilience under pressure in a gamified format.</small> | |<small>An immersive, interactive challenge where participants must collaboratively navigate and escape a simulated splinternet. This circle synthesizes the learnings of SplinterCon, testing participants’ problem-solving abilities and resilience under pressure in a gamified format.</small> | ||
|- | |- | ||
|<small>'''Tor Browser, Tails, and You'''</small> | |<small>'''Tor Browser, Tails, and You'''</small> | ||
|<small>How do Tails and the Tor Browser currently fit into the digital security toolbox for your communities? How could they become more helpful in that toolbox? Come and discuss it with the Tor Applications Team and the Tails Team.</small> | |<small>How do Tails and the Tor Browser currently fit into the digital security toolbox for your communities? How could they become more helpful in that toolbox? Come and discuss it with the Tor Applications Team and the Tails Team.</small> | ||
|- | |- | ||
|<small>'''What are your operations and admin challenges?'''</small> | |<small>'''What are your operations and admin challenges?'''</small> | ||
|<small>When it comes to operations and finances, what are the hardest things for you as a civil society activist in the internet freedom space? We want to know! We’re building an organisation, interalia, aimed at lowering the operations barriers for civil society with equity and care at its heart – let us worry about admin, so you don’t have to. We have plenty of experience working in this field, but we’d love to hear about your specific struggles, questions, and challenges. How can we help as intermediaries providing a layer of care and security for you?</small> | |<small>When it comes to operations and finances, what are the hardest things for you as a civil society activist in the internet freedom space? We want to know! We’re building an organisation, interalia, aimed at lowering the operations barriers for civil society with equity and care at its heart – let us worry about admin, so you don’t have to. We have plenty of experience working in this field, but we’d love to hear about your specific struggles, questions, and challenges. How can we help as intermediaries providing a layer of care and security for you?</small> | ||
|- | |- | ||
|<small>'''World-wide autonomous comunication over HF band'''</small> | |<small>'''World-wide autonomous comunication over HF band'''</small> | ||
|<small>In the circle, learn about a project that is connecting isolated communities in the Amazon rain-forest, Central Africa and fisherman boats far away from the shore in Bengali Bay, in Bangladesh. The High-frequency Emergency and Rural Multimedia Exchange System (HERMES) project is a telecommunication system which provides very long range communication capability (hundreds / thousands of kilometers links) by using skywave propagation on the HF band.</small> | |<small>In the circle, learn about a project that is connecting isolated communities in the Amazon rain-forest, Central Africa and fisherman boats far away from the shore in Bengali Bay, in Bangladesh. The High-frequency Emergency and Rural Multimedia Exchange System (HERMES) project is a telecommunication system which provides very long range communication capability (hundreds / thousands of kilometers links) by using skywave propagation on the HF band.</small> | ||
|} | |} | ||
<br> | <br> | ||
Line 709: | Line 529: | ||
|'''<small>WANA Café</small>''' | |'''<small>WANA Café</small>''' | ||
|<small>[https://smex.org/ SMEX]</small> | |<small>[https://smex.org/ SMEX]</small> | ||
|<small>Join our booth for dialogues on WANA’s digital future and a taste of local flavors! | |<small>Join our booth for dialogues on WANA’s digital future and a taste of local flavors!</small> | ||
|- | |- | ||
| style="background: #c0e590;" |<center><big>'''Booths'''</big></center> | | style="background: #c0e590;" |<center><big>'''Booths'''</big></center> | ||
| style="background: #c0e590;" |<center>'''<big>Run by</big>'''</center> | | style="background: #c0e590;" |<center>'''<big>Run by</big>'''</center> | ||
| style="background: #c0e590;" |<center>'''<big>Booth Description</big>'''</center> | | style="background: #c0e590;" |<center>'''<big>Booth Description</big>'''</center> | ||
|- | |- | ||
| <small>'''[https://www.accessnow.org/help/ Access Now’s Digital Security Helpline]'''</small> | | <small>'''[https://www.accessnow.org/help/ Access Now’s Digital Security Helpline]'''</small> | ||
Line 726: | Line 542: | ||
|<small>[https://www.amnesty.org/en/tech/ Amnesty International (Tech Programme)]</small> | |<small>[https://www.amnesty.org/en/tech/ Amnesty International (Tech Programme)]</small> | ||
| <small>Members of Amnesty International’s Tech Programme will engage with attendees on the programme’s work, which includes countering the digital surveillance of activists, banning facial recognition technology for mass surveillance, and working to ensure reproductive rights activists can share accurate abortion information online. We will use the booth as an opportunity to interactively demo our tools for activists, such as verification kits to scan devices for spyware infections, as well as our surveillance camera map in New York City. The proposed activities will share information on different technological threats to activists, as well as providing them with the knowledge and tools to protect themselves and educate others.</small> | | <small>Members of Amnesty International’s Tech Programme will engage with attendees on the programme’s work, which includes countering the digital surveillance of activists, banning facial recognition technology for mass surveillance, and working to ensure reproductive rights activists can share accurate abortion information online. We will use the booth as an opportunity to interactively demo our tools for activists, such as verification kits to scan devices for spyware infections, as well as our surveillance camera map in New York City. The proposed activities will share information on different technological threats to activists, as well as providing them with the knowledge and tools to protect themselves and educate others.</small> | ||
|- | |- | ||
|<small>'''Conexión Segura y Libre'''</small> | |<small>'''Conexión Segura y Libre'''</small> | ||
Line 743: | Line 547: | ||
|<small>Conexión Segura y Libre is a Venezuelan NGO dedicated to the defense of digitals rights and internet freedom. This year we launched an anti-censorship newsreader app, which uses an integrated VPN powered by Psiphon and Outline. We are excited to share this new project with the international digital rights community.</small> | |<small>Conexión Segura y Libre is a Venezuelan NGO dedicated to the defense of digitals rights and internet freedom. This year we launched an anti-censorship newsreader app, which uses an integrated VPN powered by Psiphon and Outline. We are excited to share this new project with the international digital rights community.</small> | ||
|- | |- | ||
| | |'''<small>Coaching, Leadership and Fundraising Support</small>''' | ||
|[https://www.springstrategies.org <small>Spring</small>] | |||
|<small>Spring is a leadership development partner that has worked with changemakers from 1,000+ organizations in 100+ countries over the past 20 years. Visit our booth to sign up for a complimentary 45-minute coaching session in English, Spanish, or Portuguese throughout the Gathering! We can support you to solve the questions keeping you up at night— donor prospecting and communicating with funders, work-life balance, stress, job transitions, delegating effectively, navigating uncertainty and more. Spots are limited so register soon for your coaching session. https://www.springstrategies.org/coaching-global-gathering</small> | |||
| | |||
| <small> | |||
|- | |- | ||
|<small>'''Digital Justice House'''</small> | |<small>'''Digital Justice House'''</small> | ||
|<small>[https://www.digitaljustice.house/ Digital Justice House]</small> | |<small>[https://www.digitaljustice.house/ Digital Justice House]</small> | ||
|<small>Learn more about the [[Digital Justice House]] initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work.</small> | |<small>Learn more about the [[Digital Justice House]] initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work.</small> | ||
|- | |- | ||
|<small>'''Digital Defenders Partnership'''</small> | |<small>'''Digital Defenders Partnership'''</small> | ||
Line 770: | Line 566: | ||
|<small>[https://digitalrightslawyers.org Digital Rights Lawyers Initiative]</small> | |<small>[https://digitalrightslawyers.org Digital Rights Lawyers Initiative]</small> | ||
|<small>The Booth seeks to showcase opportunities for collaboration to litigate digital rights in West Africa</small> | |<small>The Booth seeks to showcase opportunities for collaboration to litigate digital rights in West Africa</small> | ||
|- | |- | ||
|<small>'''EFF'''</small> | |<small>'''EFF'''</small> | ||
Line 786: | Line 578: | ||
| <small>'''Emergency Assistance Program |<small>[https://mediamatters.pk/ Media Matters for Democracy (MMfD)]</small> | | <small>'''Emergency Assistance Program |<small>[https://mediamatters.pk/ Media Matters for Democracy (MMfD)]</small> | ||
|<small>FACTER is a first-of-its-kind digital investigation tool designed exclusively to facilitate newsrooms in countering mis-, dis-, and mal-information (MDM) in Pakistan. The Facter database, which can be accessed by newsrooms via a Chrome extension, is updated with fact-checks by a team of digital investigators and editors on a daily basis.</small> <small>The booth will showcase the Facter project, what sets it apart from other fact-checking initiatives, its functioning, SOPs, and technical infrastructure.</small> | |<small>FACTER is a first-of-its-kind digital investigation tool designed exclusively to facilitate newsrooms in countering mis-, dis-, and mal-information (MDM) in Pakistan. The Facter database, which can be accessed by newsrooms via a Chrome extension, is updated with fact-checks by a team of digital investigators and editors on a daily basis.</small> <small>The booth will showcase the Facter project, what sets it apart from other fact-checking initiatives, its functioning, SOPs, and technical infrastructure.</small> | ||
|- | |- | ||
|<small>'''Freedom of the Press Foundation'''</small> | |<small>'''Freedom of the Press Foundation'''</small> | ||
Line 800: | Line 587: | ||
|<small>[https://www.globaleaks.org GlobaLeaks]</small> | |<small>[https://www.globaleaks.org GlobaLeaks]</small> | ||
|<small>GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable to your needs and protects the whistleblower’s privacy and submissions by default.</small> | |<small>GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable to your needs and protects the whistleblower’s privacy and submissions by default.</small> | ||
|- | |- | ||
|<small>'''Greenhost'''</small> | |<small>'''Greenhost'''</small> | ||
Line 813: | Line 595: | ||
|<small>[https://breakpointingbad.com/ Breakpointing Bad] / OTF ICFP Fellow</small> | |<small>[https://breakpointingbad.com/ Breakpointing Bad] / OTF ICFP Fellow</small> | ||
|<small>This booth showcases tools and techniques Breakpointing Bad has developed for identifying threats to VPNs, including risks that might be less well publicized and understood. We have planned three demonstrations: 1. Client Information Leakages - Participants will see CryptoSluice identify applications with weak or no encryption that put them at risk even when using a VPN. 2. VPN Server Attack Demo - Participants will see exploits developed by Breakpointing Bad that seriously undermine VPN security.3. Suspicious VPN Providers - Participants will see preliminary results about suspicious VPNs and how they put users at risk. These tools and techniques address risks and threats VPN clients are exposed to across different components of the VPN software/operational stack.</small> | |<small>This booth showcases tools and techniques Breakpointing Bad has developed for identifying threats to VPNs, including risks that might be less well publicized and understood. We have planned three demonstrations: 1. Client Information Leakages - Participants will see CryptoSluice identify applications with weak or no encryption that put them at risk even when using a VPN. 2. VPN Server Attack Demo - Participants will see exploits developed by Breakpointing Bad that seriously undermine VPN security.3. Suspicious VPN Providers - Participants will see preliminary results about suspicious VPNs and how they put users at risk. These tools and techniques address risks and threats VPN clients are exposed to across different components of the VPN software/operational stack.</small> | ||
|- | |- | ||
|<small>'''Horizontal Booth: Tools for your digital security'''</small> | |<small>'''Horizontal Booth: Tools for your digital security'''</small> | ||
Line 835: | Line 609: | ||
|<small>[https://huridocs.org/ HURIDOCS]</small> | |<small>[https://huridocs.org/ HURIDOCS]</small> | ||
|<small>For the last 40 years, HURIDOCS has supported the human rights community by providing essential tools and solutions for documentation and information management, and offering strategic advice on standards and methodologies for human rights documentation. At this year’s Global Gathering, HURIDOCS will present the roadmap for ongoing and further developments of our flagship tool Uwazi, share the Rapid Response Documentation Principles and showcase Uwazi integration with Tella. Stop by to learn more about how HURIDOCS can support you, your organization or your community. We look forward to seeing our friends and allies, building new connections and exploring potential synergies!</small> | |<small>For the last 40 years, HURIDOCS has supported the human rights community by providing essential tools and solutions for documentation and information management, and offering strategic advice on standards and methodologies for human rights documentation. At this year’s Global Gathering, HURIDOCS will present the roadmap for ongoing and further developments of our flagship tool Uwazi, share the Rapid Response Documentation Principles and showcase Uwazi integration with Tella. Stop by to learn more about how HURIDOCS can support you, your organization or your community. We look forward to seeing our friends and allies, building new connections and exploring potential synergies!</small> | ||
|- | |- | ||
|<small>'''International and regional projects looking at the intersection of digital rights and freedom of expression'''</small> | |<small>'''International and regional projects looking at the intersection of digital rights and freedom of expression'''</small> | ||
|<small>[https://www.article19.org/ Article19]</small> | |<small>[https://www.article19.org/ Article19]</small> | ||
|<small>During the Global Gathering regional and thematic specialists will be facilitating sessions, working with human rights defenders, and providing training. Our booth will be staffed throughout the Gathering and we are looking forward to meeting you and to learning more about your projects too. Our booth will be part of the Job Fair, so feel free to stop by and meet our colleagues to learn more about our work with partners around the world.</small> | |<small>During the Global Gathering regional and thematic specialists will be facilitating sessions, working with human rights defenders, and providing training. Our booth will be staffed throughout the Gathering and we are looking forward to meeting you and to learning more about your projects too. Our booth will be part of the Job Fair, so feel free to stop by and meet our colleagues to learn more about our work with partners around the world.</small> | ||
|- | |- | ||
|<small>'''Join the Localization Lab community!'''</small> | |<small>'''Join the Localization Lab community!'''</small> | ||
|<small>[https://www.localizationlab.org/ Localization Lab]</small> | |<small>[https://www.localizationlab.org/ Localization Lab]</small> | ||
|<small>We have localized nearly 200 internet freedom tools and resources into 220 languages, and we need your help to do more! Drop by our booth to learn about our work and how we can fight tech bias together through co-design, collaboration, and research. Sign up to join our global network of contributors, explore other collaboration opportunities, or help us build our Unified Glossary on-site by translating into your local language, one word at a time.</small> | |<small>We have localized nearly 200 internet freedom tools and resources into 220 languages, and we need your help to do more! Drop by our booth to learn about our work and how we can fight tech bias together through co-design, collaboration, and research. Sign up to join our global network of contributors, explore other collaboration opportunities, or help us build our Unified Glossary on-site by translating into your local language, one word at a time.</small> | ||
|- | |- | ||
| <small>'''Journalism for the Future / network booth'''</small> | | <small>'''Journalism for the Future / network booth'''</small> | ||
| <small>[https://supernova.is/ supernova.is]</small> | | <small>[https://supernova.is/ supernova.is]</small> | ||
|<small>Is there any kind of journalism about digital rights that covers not only problems we face now, but ones that are yet in the boiling pot, soon ready to be served to citizens? Can we catch it before it damages society, vulnerable groups, the internet infrastructure? We invite journalists and anybody interested in the prevention of the anti-utopian future rather than sorting out the rabble after, for the conversation about what can be done differently in informing our audiences and networking for future collaborations across the borders.</small> | |<small>Is there any kind of journalism about digital rights that covers not only problems we face now, but ones that are yet in the boiling pot, soon ready to be served to citizens? Can we catch it before it damages society, vulnerable groups, the internet infrastructure? We invite journalists and anybody interested in the prevention of the anti-utopian future rather than sorting out the rabble after, for the conversation about what can be done differently in informing our audiences and networking for future collaborations across the borders.</small> | ||
|- | |- | ||
|<small>'''Numun Fund'''</small> | |<small>'''Numun Fund'''</small> | ||
Line 900: | Line 633: | ||
|<small>[https://run.ooni.io/ Open Observatory of Network Interference]</small> | |<small>[https://run.ooni.io/ Open Observatory of Network Interference]</small> | ||
|<small>Stop by the OONI booth to see a demo of our improved OONI Run tool! This tools helps people crowd source network measurements and we currently working on improvements requested by the community. Stop by to see how it works!</small> | |<small>Stop by the OONI booth to see a demo of our improved OONI Run tool! This tools helps people crowd source network measurements and we currently working on improvements requested by the community. Stop by to see how it works!</small> | ||
|- | |- | ||
| <small>Ve Sin Filtro's PiProbe and project dashboards |<small>'''Open Technology Fund'''</small> | | <small>Ve Sin Filtro's PiProbe and project dashboards |<small>'''Open Technology Fund'''</small> | ||
|<small>[http://opentech.fund Open Technology Fund]</small> | |<small>[http://opentech.fund Open Technology Fund]</small> | ||
|<small>OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs.</small> | |<small>OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs.</small> | ||
|- | |||
|'''<small>PrivacyLx</small>''' | |||
|[https://privacylx.org <small>PrivacyLx</small>] | |||
|<small>PrivacyLx is a Lisbon-based non-profit association focused on the defense of digital privacy and security as fundamental rights for a free society through education, research and development of tools for safeguarding them. Among other things, we have been organizing privacy events at local libraries and the 2024 Tor Community Day.</small> | |||
|- | |- | ||
|'''<small>The Palestine Booth</small>''' | |'''<small>The Palestine Booth</small>''' | ||
|<small>collective</small> | |<small>collective</small> | ||
|<small>The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza.</small> | |<small>The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza.</small> | ||
|- | |- | ||
|<small>'''Quad9'''</small> | |<small>'''Quad9'''</small> | ||
|<small>[https://quad9.net/ Quad9]</small> | |<small>[https://quad9.net/ Quad9]</small> | ||
|<small>Quad9 is a Swiss NGO providing a free service that replaces your default Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. And we have the data to prove it's effective. As opposed to some other public DNS services, Quad9 respects your privacy and does not market in personally identifiable information about you or your DNS queries.</small> | |<small>Quad9 is a Swiss NGO providing a free service that replaces your default Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. And we have the data to prove it's effective. As opposed to some other public DNS services, Quad9 respects your privacy and does not market in personally identifiable information about you or your DNS queries.</small> | ||
|- | |- | ||
|<small>'''Safe Sisters Fellowship Program'''</small> | |<small>'''Safe Sisters Fellowship Program'''</small> | ||
Line 950: | Line 654: | ||
|<small>Safe Sisters is showcasing its first public exhibit of fellowship products from our community champions. The exhibition will include collections from TFGBV research, Digital rights creative content and Digital safety resources from 7 African countries.</small> | |<small>Safe Sisters is showcasing its first public exhibit of fellowship products from our community champions. The exhibition will include collections from TFGBV research, Digital rights creative content and Digital safety resources from 7 African countries.</small> | ||
|- | |- | ||
| <small>''' | |<small>'''Usability and Accessibility Clinic'''</small> | ||
| <small>[https://www.a11ylab.com/ Accessibility Lab]</small><br><small>[https://www.opentech.fund/labs/uxd-lab/ UXD Lab]</small><br><small>[https://ura.design/ Ura Design]</small><br><small>[https://www.decentdesign.org/ Decent Design]</small><br><small>[https://superbloom.design/ Superbloom]</small> | |||
| <small>[https:// | |||
|<small>Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist.</small> | |<small>Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist.</small> | ||
|- | |- | ||
Line 978: | Line 661: | ||
|<small>[https://www.vietnamrise.org/ Vietnam Rise]</small> | |<small>[https://www.vietnamrise.org/ Vietnam Rise]</small> | ||
|<small>There seems to be reservations from funders and NGOs about funding and working on Vietnam projects due to increasingly harsher government crackdowns. This tendency for risk aversion hurts civil society and grassroots organizing. Vietnam Rise would like to showcase that it is possible to work in Vietnam. We would like to showcase new tactics and work with new communities and issues to navigate in hostile environments but at the same time integrate security into our processes.</small> | |<small>There seems to be reservations from funders and NGOs about funding and working on Vietnam projects due to increasingly harsher government crackdowns. This tendency for risk aversion hurts civil society and grassroots organizing. Vietnam Rise would like to showcase that it is possible to work in Vietnam. We would like to showcase new tactics and work with new communities and issues to navigate in hostile environments but at the same time integrate security into our processes.</small> | ||
|} | |} |
Revision as of 13:55, 19 September 2024
Plenary
11:30 to 13:00 Networking Hour
It's the last day! Come say goodbye to new and old friends, and have lunch at the many different vendors at the venue! This is also a great day to exchange contact information, solidify collaborations, and more!
Self-Organized Socials | |
Check out the list of self-organized Socials taking place at off-site (but close by) locations, ranging from meetups to numerous activities. https://pad.riseup.net/p/GG-Socials-2024 | |
A Sample of Today's Socials: Global Coalition for Tech Justice Meetup (convened by Digital Action) |
CirclesYou can find detailed Circle descriptions the end of this page. You can also organize your own self-organized Circle or Booth in the empty spaces (marked SOC TBD) by following these instructions. | |||
Location | |||
Circle 1 | CTRL + ALT + DEL: Learnings on Movement Building from the Digital Rights Asia-Pacific Assemblies | Incident Response Working Group | Digital Security Providers in Eastern Europe: New Solutions to Familiar Challenges? |
Circle 2 | World-wide Autonomous Comunication Over HF Band | Countering digital authoritarianism and online repression in Central Asia | Return of the Zines: A Hands-on Approach to Censorship Circumvention |
Circle 3 | Self-Organized Circle to be determined (SOC TBD) | (SOC TBD) | (SOC TBD) |
Circle 4 | (SOC TBD) | (SOC TBD) | (SOC TBD) |
Circle 5 | (SOC TBD) | (SOC TBD) | Maximizing Engagement in your Digital Literacy Workshop through Gameplay |
Circle 6 | Is it Time to Create Certification for Digital Security Practitioners? | Securing the Digital Frontline: Threat Analysis for Human Rights Defenders in Thailand and Vietnam | The Costs of Protection: The Global Landscape for Data Privacy and Security Tools |
Circle 7 | GenAI & LLMs in COMO & TS: Where Do Human Rights and Communities Fit in Today’s Hottest Acronyms? | How to Stop Promising/Doing Audits and Start Promising/Doing What is Actually Needed | Safeguarding NGOs and Digital Rights Organizations: Tackling Insider Threats and Beyond |
Circle 8 | Digital Iran Reloaded: Gamers’ Circumvention Tactics in the IRI | Building The Asia Digital Rights Community | Building a Digital Rights Movement Among the Francophone Community |
Circle 9 | Activate the Network: Collective Training Against Internet Shutdowns | Bridging the Gaps Between Activists and Hackers: How To Talk With Each Other About Security | Supporting Asian HRDs in the Frontline: How We Shape the Local Supporting System and Model |
Circle 10 | What Are Your Operations and Admin Challenges? | Growing Support for FOSS Sustainability | Managers Meetup |
Location | |||
Tor Project & Tails Village (Booth 9) | Leveraging Weblate and automated checks for higher quality localization | Tor Browser, Tails, and You | |
Calyx Institute Village (Booth 12) |
|||
Clean Insights Tea House (Booth 19) |
Clean Insights Tea Time | ButterBox: Life Without the Internet Made Smoother | Clean Insights Tea Time |
SplinterCon Village (Booth 3) |
Echoes of Isolation: Gathering First-Hand Accounts from Fragmented Networks | Bridging the Void: Deploying Satellite Solutions for Isolated Communities | The Real ESCAPE GAME: 1 Hour to Break Out of the Splinternet! |
APC Village (Booth 21) |
Fostering Diversity and Inclusion in Open Source Projects | Safety for Voices: South-South Strategies for WHRDs in Digital Spaces | |
Outline Village (Booth 79) |
Partners Share: Knowledge sharing across circumvention tool providers and Outline SDK users around the world | Hangout with the Jigsaw Team | Hangout with the Jigsaw Team |
WANA Café (Booth 81) |
The MENA Alliance for Digital Rights |
BoothsEach booth has a number, which can be found on top, center above a booth's "window". You can find detailed Booths & Villages descriptions at the bottom of this page. | |||||
Location | |||||
Booth 1 | |||||
Booth 2 | Safe Sisters Fellowship Program | Safe Sisters | OONI Run v2 Demo | Open Observatory of Network Interference | |
Booth 3 | SplinterCon by eQualitie Village | eQualitie | SplinterCon by eQualitie Village | eQualitie | |
Booth 4a | Access Now’s Digital Security Helpline | Access Now | Numun Fund | Numun Fund | |
Booth 4b | Conexión Segura y Libre | Conexión Segura y Libre | Horizontal Booth: Tools for your digital security | Horizontal | |
Booth 5 | Join the Localization Lab Community! | Localization Lab | |||
Booth 6 | Vietnam Rise: Navigating in hostile environments | Vietnam Rise | Emergency Assistance to Frontline Activists | Emergency Assistance Program | Freedom House | |
Booth 7 | Usability and Accessibility Clinic | Accessibility Lab UXD Lab Ura Design Decent Design Superbloom |
Usability and Accessibility Clinic | Accessibility Lab UXD Lab Ura Design Decent Design Superbloom | |
Booth 8 | Digital First Aid Kit | CiviCERT | Holistic VPN Stack Exploitation: Risks & Threats Across VPN Layers | Breakpointing Bad / OTF ICFP Fellow | |
Booth 9 | Tor Project and Tails Village | The Tor Project and Tails | Tor Project and Tails Village | The Tor Project and Tails | |
Booth 10 | Open Technology Fund | Open Technology Fund | Human Rights @ Meta | Meta | |
Booth 11 | Journalism for the Future / network booth | supernova.is | EFF | The Electronic Frontier Foundation (EFF) | |
Booth 12 | Calyx Institute Village | Calyx Institute | Calyx Institute Village | Calyx Institute | |
Booth 13 | HURIDOCS (Human Rights Information and Documentation Systems) | HURIDOCS | Quad9 | Quad9 | |
Booth 14 | GlobaLeaks | GlobaLeaks | Digital Defenders Partnership | Digital Defenders Partnership | |
Booth 15 | FACTER: Revolutionizing Digital Investigation for Newsrooms to Counter Mis/Dis/Mal Information | Media Matters for Democracy (MMfD) | Digital Rights Litigation in West Africa | Digital Rights Lawyers Initiative | |
Booth 16 | PrivacyLx | PrivacyLx | |||
Booth 17 | Omidyar Network’s Digital Trust and Safety Strategy | Omidyar Network | Amnesty Tech | Amnesty International (Tech Programme) | |
Booth 18 | |||||
Booth 19 | Clean Insights Tea House | Guardian Project | Clean Insights Tea House | Guardian Project | |
Booth 21 | APC Village | Association for Progressive Communications | APC Village | Association for Progressive Communications | |
Booth 22 | International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | |
Booth 79 | Outline Village | Outline | Outline Village | Outline | |
Booth 80 | Greenhost | Greenhost | Freedom of the Press Foundation | Freedom of the Press Foundation | |
Booth 81 | WANA Café | SMEX | WANA Café | SMEX | |
Booth 82 | The Palestine Booth | collective | |||
Booth 83a | Digital Justice House | Team CommUNITY | |||
Booth 83b | Coaching, Leadership and Fundraising Support | Spring Strategies |
Partners
Equity Fund Sponsors
Circle Descriptions
Activate the network: Collective training against Internet shutdowns | We will explore how capacity building can empower activists and organizations to form effective coalitions in the fight against internet shutdowns. Join us to discuss strategies, share experiences, and debate the best approaches to promote resilience and coordinated action in contexts of digital censorship. This session aims to be a catalyst for inter-organizational collaboration, strengthening a global network united by the defense of online freedom. |
Bridging the gaps between activists and hackers: How to talk with each other about security | There is a lot of powerful, open security-related technology that remains known and used only to specialists and hackers - technology that could be used by journalists, activists and other persons with high security needs. However, there are many barriers between activist and hacker spaces, many of which are related to communication problems and lack of awareness of people's needs. As a hacker and UX developer, the facilitator will help lead the exchange of ideas and issues between these two communities. |
Bridging the void: Deploying satellite solutions for isolated communities | Explore the potential of satellite technology to bridge the gaps in isolated digital spaces. This circle will cover the technical, logistical, and regulatory landscapes of satellite deployment, offering a practical guide to implementing these solutions in censored and restricted environments. |
Building a digital rights movement among the Francophone community | During the very first Franchophone monthly meetup hosted by Team CommUNITY, facilitators identified the need to better coordinate efforts across French-speaking countries in Africa and the Middle East to identify patterns of digital threats. Many long-standing will meet in-person for the first time during this circle. However, other GG participants are invited to help continue building community-driven knowledge and strategize advocacy campaigns within the French-speaking digital rights community. |
Building the Asia digital rights community | This circle is a networking-cum-strategizing space for digital rights defenders from Asia. It will be facilitated to establish cross-country networks and enable regional collaborations. In addition, participants will co-design strategies to effectively sustain the momentum in the Asia digital rights community; create more welcoming and engaging spaces; and identify ways in which more people can participate and be helped in their digital rights work in the region. |
ButterBox: Life without the internet made smoother | Facilitators: Guardian Project, Digital Society of Africa, ColnodoThe ButterBox serves as a hotspot and ecosystem, offering curated apps, local encrypted chat, and the ability to share resources via USB. This year it has been deployed in various regions. Join this session to learn about various ButterBox use cases, see a demo demonstrating its functionality, and hear from field agents who implemented the ButterBox in diverse scenarios. This includes digital security trainings, sharing entertainment within apartment buildings, supporting indigenous offline communities, and preparing for internet shutdowns. There will also be time to brainstorm the future of Butter, where you can provide feedback on what you would like to see in the future. |
Clean Insights Tea Time | Join the Guardian Project team twice a day to delight in delicious ethical and organic Insightful Tea while chatting about ways in which your work can detox from harmful tracking and data collection practices. |
Countering digital authoritarianism and online repression in Central Asia | In Central Asia, digital rights are facing a significant decline as governments introduce restrictive laws targeting independent media, journalists, bloggers and anti-corruption reporters. Online freedom is increasingly being curtailed by surveillance and privacy crackdowns. The circle brings together leading media lawyers and human rights activists from the region to address these pressing issues. |
CTRL + ALT + DEL: Learnings on movement building from the digital rights Asia-Pacific assemblies | What comes next after two Digital Rights Asia-Pacific (DRAPAC) Assemblies in Chiang Mai, Thailand, and Taipei, Taiwan? This Circle is open to anyone who wants to discuss how the digital rights movement in the Asia-Pacific can continue to: 1 Empower peoples across Asia-Pacific to regain control of our civic spaces, fundamental rights, social platforms, and digital technology from the dominance of big tech and interference by the state. 2. Platform innovative alternatives in approaching and strategizing human rights advocacy in Asia-Pacific by centering local grassroots communities and strengthening networks across borders.3. Shift our thinking and culture towards more open, inclusive, and participatory decision-making processes and governance structures within the regional digital rights movements. |
Digital Iran reloaded: Gamers’ circumvention tactics in the IRI | Participants will discuss current circumvention methods used by gamers in Iran, how methods could be improved based on preliminary findings in the field. |
Digital security providers in Eastern Europe: New solutions to familiar challenges? | This circle is for those wanting to support digisec work in Eastern Europe, South Caucuses and beyond. Learn about the most recent findings examining the work of digital security (digisec) specialists in Armenia, Azerbaijan, Belarus, Georgia, Moldova, and Ukraine. They are a result of an annual assessment, carried out by the community since 2021, which focuses on the work environment, demand for digisec services within local civil society, security of digisec specialists and formats of their services, availability of resources, and other aspects essential to their work. Current findings in each country will be compared with both old and emergent trends being observed across the region, as well as the results of the annual assessments conducted in 2021, 2022, and 2023. Also discussed will be efforts to support the digisec community, build the capacity of its members, and potential solutions. |
Echoes of isolation: Gathering first-hand accounts from fragmented networks | Participants are invited to share, analyze, and reflect on personal accounts, weaving a rich tapestry of stories that highlight the human dimension of digital fragmentation. |
Fostering diversity and inclusion in Open Source Projects | Join this engaging discussion on how diversity and inclusion influence every aspect of open source projects. Learn from others' experiences and insights on creating a welcoming and equitable open source community based on conversations with open source projects under Next Generation Internet Zero (NGI0) initiative. While code is crucial, the management of open source projects, the diversity of contributors and users, selection of communication channels and transparency among others are equally important. |
GenAI & LLMs in COMO & TS: Where do human rights and communities fit in today’s hottest acronyms? | In this circle, participants will explore the human rights impacts of Generative AI (GenAI) and underlying technologies, such as foundation models or large language models (LLMs), on content governance. As AI-driven platforms increasingly rely on these technologies for content governance, they risk unintentionally suppressing legitimate content while fueling violence online, disproportionately affecting marginalized groups and those living in the Global Majority. Learn about how these systems are deployed in the Global Majority, where considerations of local language, context and cultural nuances are critical, e.g., during elections in fragile democracies or in conflict zones. In addition, a case study on Discord will be presented, as the platform is currently piloting ECNL’s framework for meaningful engagement in AI while developing LLMs for enforcing content moderation policies. |
Growing support for FOSS sustainability | This Circle brings together FLOSS funders who will share their approaches to funding sustainability for human rights FOSS projects, learn from participants about the sustainability challenges their projects face, and explore ways that the funding ecosystem can be more responsive to their needs. Free and open source code is the foundation for the technology that human rights defenders, activists, journalists, and other at-risk communities rely on to access the internet and communicate safely and securely. Despite the critical role they play, many FOSS projects struggle to find funding that supports their long-term sustainability. The essential, day-to-day bug-squashing, security updates, community management, and operational activities needed to maintain reliable and secure technologies are either squeezed into new-feature proposals, or too often left unfunded altogether. More funders are stepping up to address this challenge. |
Hangout with the Jigsaw team | Swing by to enjoy drinks and snacks while we get to Jigsaw team and other users! |
How to stop promising/doing audits and start promising/doing what is actually needed | Trainings, ToTs, Checklists, Audits - why is our fixation on formats so obsessive? The vicious circle "Applications writers - Donors - Practitioners - CSOs (clients)" makes us to forget what we actually wanted to help to provide real assistance. Not "X audits for $Y money within 12 months" - but real help.Let's think together and discuss how could we (practitioners) communicate with applications writers donors and CSOs - in the end to make the programs/projects to reflect what is actually needed a real help instead of "audits/trainings/ToTs/etc".I hope to have a honest relaxed conversation" |
Incident Response Working Group | The Incident Response Working Group is an ongoing series of meetings between censorship circumvention tool developers, human rights workers, and help desk administrators to discuss how to better respond to incidents of escalated blocking and Internet shutdowns. The group discusses what barriers exist to collaboration and coordination among multiple stakeholders through structured workgroup sessions. The goal is to help end users get back online faster by reducing the time to detect incidents, develop mitigations, and deploy those mitigations to end users. |
Is it time to create certification for digital security practitioners? | There's a growing community of digital security practitioners, who work with the civil society and are often funded by charities and grants. These practitioners often have varying degrees of competence, and sometimes, if they are not technically competent enough, they might do more harm than good. It would seem that establishing some sort of a certification for such practitioners could be a good idea, but there are both positive and negatives. Join this circle to explore these open questions. |
Partners share: Knowledge sharing across circumvention tool providers and Outline SDK users around the world | In the ever-changing censorship environments, tool providers and content providers must adopt new circumvention technologies at a faster pace. In this circle, we will host a discussion about the situation of censorship circumvention work in different regions (e.g, what are some unmet needs right now, how are censors getting ahead of the cat-and-mouse games, and what are some lessons learned); at the same time, we invite tool providers that have integrated Jigsaw’s Outline to share their experience about how the technology is performing in different regions. |
Leveraging weblate and automated checks for higher quality localization | Participants will share best practice on localizing Internet Freedom applications and learn about how Tor Project migrated from Transifex into Weblate, a free software project. |
Managers meetup | Managers in the digital rights field are still navigating complex issues that started in 2020 that range from team health to fundraising challenges. Come meet other managers, and gain valuable insights, best practices, and get answers to your pressing questions. This is a great opportunity to cultivate stronger solidarity and support between managers in the field. |
Maximizing engagement in your digital literacy workshop through gameplay | Teaching new concepts and skills to adult learners can be tricky business; we all have a million tasks on our to-do lists. Gaining and sustaining the attention of your workshop participants requires a wide variety of strategies. This circle will debut a new card game explicitly designed to teach fundamental data privacy skills to workshop participants and individual groups of learners through a bespoke card game. In addition, participants will learn about experiences developing new games, and help invent a new a game! |
Return of the zines: A hands-on approach to censorship circumvention | More people are online than ever before. But because of increasing levels of censorship, fewer people seem to share the same online experience as populations. In this circle, participants will revisit a pivotal era when photocopiers were revolutionary tools in a fight for access to platforms and audiences. In this hands-on workshop on zine-making, participants will delve into the contemporary power of zines to promote peer-to-peer content sharing. Together, participants will discuss how this grassroots strategy can expand publishers' reach and enhance news consumers' access to information, especially in today's restricted internet environments. |
Safeguarding NGOs and digital rights organizations: Tackling insider threats and beyond | Security directors from HRW, Access Now, AI, and other NGOs will tackle the issue of insider threats, focusing on their impact on non-profits and digital rights organizations. With participants, they will define insider threats, discuss the unique risks they pose, especially during crises and events, and provide practical examples from the field, and touch on the broader threat landscape. Participants will engage in an open discussion to share their experiences and strategies for managing insider threats, both physical and digital. In addition, participants will engage in an exercise developing realistic scenario-based training to better equip their teams. Leave with concrete solutions and resources to strengthen your organization's security against insider threats such mitigation strategies, including robust access controls, cybersecurity measures, and scenario-based trainings. |
Safety for voices: South-south strategies for WHRDs in digital spaces | Acknowledging that the threats and attacks targeting women and gender-diverse human rights defenders (WHRDs) in the digital sphere are an extension of patriarchal, racist, and colonial systematic violence, this circle seeks to establish a platform for critical reflection rooted in South-South collaboration. Participants will learn about two studies aimed at documenting the patterns of violence and the tools of resistance employed by WHRDs within their territories. Participants will also share experiences and the development of collective strategies to safeguard their voices. Grounded in a holistic feminist protection approach, the circle aims to foster solidarity and resilience among WHRDs facing digital threats. |
Securing the digital frontline: Threat analysis for human rights defenders in Thailand and Vietnam | In this Circle, participants will recent research findings related to digital security risks for human rights defenders in Thailand and Vietnam, as well as the physical threats that lead to these risks. Explore effective protection mechanisms, share lessons learned, and discuss strategies to enhance the safety and resilience of digital advocates in these regions. |
Supporting Asian HRDs in the frontline: How we shape the local supporting system and model | Participants will hear from three Asian digital security supporting groups on their experiencing developing service models that reflect their local socio-political environments and threats. Based on these sharings, participants will discuss how to find the resources grow support work in their locality and region. |
The costs of protection: The global landscape for data privacy and security tools | In this circle, participants will Identify the best and most useful tools (commercial or open source) available in their region, languages, and cultural context for meeting regional digisec/privacy needs. They will also discuss how existing tools or strategies could be modified/expanded to make them available to users in more parts of the world. Lacking effective national data privacy policies, individual internet users who want to protect their digital privacy and security often need to install and use VPNs, ad blockers, password managers, mail clients, or services like DeleteMe to protect their PII. These solutions are frequently recommended by digisec experts, but for citizens in the Global Majority, using these tools is often hindered by social, political and economic factors, including costs, exchange rates, credit card requirements, the quirks of banking systems, or the fact that interfaces, documentation, and the apps themselves are designed for the English-speaking market. |
The MENA Alliance for Digital Rights | The MENA Digital Rights Alliance is a civil society coalition advancing digital rights in the Middle East and North Africa region. We are a group of 12 local and global civil society organizations and activists who believe in the power of collective action and cross-border solidarity in the fight against rising digital authoritarianism. We’ll delve into current and emerging regional trends, threats and opportunities, create shared priorities, and strategize on potential joint advocacy and campaigning. This Circle will set our strategic plan and focus areas for the upcoming year and discuss each other's work. We want to set shared priorities to create joint efforts and advocacy campaigns.The MADR meets already every month, online. This meeting will be a continuity of our yearly in-person meetings. These in-person convenings are to set an agenda for the year and they do participate in building momentum for the alliance's advocacy efforts. |
The real ESCAPE GAME: 1 Hour to break out of the Splinternet! | An immersive, interactive challenge where participants must collaboratively navigate and escape a simulated splinternet. This circle synthesizes the learnings of SplinterCon, testing participants’ problem-solving abilities and resilience under pressure in a gamified format. |
Tor Browser, Tails, and You | How do Tails and the Tor Browser currently fit into the digital security toolbox for your communities? How could they become more helpful in that toolbox? Come and discuss it with the Tor Applications Team and the Tails Team. |
What are your operations and admin challenges? | When it comes to operations and finances, what are the hardest things for you as a civil society activist in the internet freedom space? We want to know! We’re building an organisation, interalia, aimed at lowering the operations barriers for civil society with equity and care at its heart – let us worry about admin, so you don’t have to. We have plenty of experience working in this field, but we’d love to hear about your specific struggles, questions, and challenges. How can we help as intermediaries providing a layer of care and security for you? |
World-wide autonomous comunication over HF band | In the circle, learn about a project that is connecting isolated communities in the Amazon rain-forest, Central Africa and fisherman boats far away from the shore in Bengali Bay, in Bangladesh. The High-frequency Emergency and Rural Multimedia Exchange System (HERMES) project is a telecommunication system which provides very long range communication capability (hundreds / thousands of kilometers links) by using skywave propagation on the HF band. |
Booth & Village Descriptions
Villages | ||
Tor Project and Tails Village | The Tor Project & Tails | At the Tor and Tails booth you can learn more about tools that can help you be anonymous on the internet. Come to chat with us about how to use the Tor Browser or the Tails OS to protect your privacy online and bypass censorship. Learn more about our community and how to volunteer. And if you would like to partner with us for digital security training in your area. |
Calyx Institute Village | Calyx Institute | The Calyx Institute's mission is to educate the public about privacy in digital communications and to develop tools that anyone can use. One of our featured tools is CalyxOS, an Android mobile operating system that puts privacy and security into the hands of everyday users. |
Clean Insights Tea House | Guardian Project | Come by to have tea and chat with the Guardian Project team about their work on privacy-preserving measurement, internet shutdown resilience, anti-censorship and more!https://cleaninsights.org/gg |
SplinterCon by eQualitie Village | eQualitie | Join us at the SplinterCon booth, an initiative by eQualitie dedicated to exploring, challenging, and counteracting global internet fragmentation. Our focus is on resilient, decentralized tools, along with the developers and communities that support them.At our booth, you can:• Breakout from a simulated shutdown environment that mimics a pocket splinternet.• Participate in interactive workshops that reflect the current state of the web.• Test circumvention tools.• Share your experiences with internet fragmentation.• Learn from the expertise of advocates working in affected regions.The SplinterCon booth is a space for discussing the challenges and opportunities of a constantly fragmenting internet, offering you a hands-on experience of navigating and thriving in this evolving landscape. |
APC Village | Association for Progressive Communications | The Association for Progressive Communications (APC) is a membership-based network of organisations and activists. It was founded in 1990 to empower individuals, organisations and social movements to use information and communications technologies (ICTs) to build strategic communities to contribute to equitable human development, social justice, participatory political processes and environmental sustainability. |
Outline Village | Outline | Outline is an open-source project created by Jigsaw that provides a safer way for individuals and organizations to access the open internet. Jigsaw is a unit within Google that explores threats to open societies, and builds technology that inspires scalable solutions. |
WANA Café | SMEX | Join our booth for dialogues on WANA’s digital future and a taste of local flavors! |
Access Now’s Digital Security Helpline | Access Now | We are a free-of-charge resource for civil society around the world. We offer real-time, direct technical assistance and advice to civil society groups & activists, media organizations, journalists & bloggers, and human rights defenders. |
Amnesty Tech | Amnesty International (Tech Programme) | Members of Amnesty International’s Tech Programme will engage with attendees on the programme’s work, which includes countering the digital surveillance of activists, banning facial recognition technology for mass surveillance, and working to ensure reproductive rights activists can share accurate abortion information online. We will use the booth as an opportunity to interactively demo our tools for activists, such as verification kits to scan devices for spyware infections, as well as our surveillance camera map in New York City. The proposed activities will share information on different technological threats to activists, as well as providing them with the knowledge and tools to protect themselves and educate others. |
Conexión Segura y Libre | Conexión Segura y Libre | Conexión Segura y Libre is a Venezuelan NGO dedicated to the defense of digitals rights and internet freedom. This year we launched an anti-censorship newsreader app, which uses an integrated VPN powered by Psiphon and Outline. We are excited to share this new project with the international digital rights community. |
Coaching, Leadership and Fundraising Support | Spring | Spring is a leadership development partner that has worked with changemakers from 1,000+ organizations in 100+ countries over the past 20 years. Visit our booth to sign up for a complimentary 45-minute coaching session in English, Spanish, or Portuguese throughout the Gathering! We can support you to solve the questions keeping you up at night— donor prospecting and communicating with funders, work-life balance, stress, job transitions, delegating effectively, navigating uncertainty and more. Spots are limited so register soon for your coaching session. https://www.springstrategies.org/coaching-global-gathering |
Digital Justice House | Digital Justice House | Learn more about the Digital Justice House initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work. |
Digital Defenders Partnership | Digital Defenders Partnership | Digital Defenders Partnership (DDP) is an international programme that contributes to strengthening the resilience of Human Rights Defenders (HRDs) by increasing their digital security through a holistic and sustainable approach. We envision a world in which HRDs contribute to social justice while enjoying safety, well-being, freedom, and dignity. |
Digital First Aid Kit | CiviCERT | The Digital First Aid Kit is a free resource to help rapid responders better protect themselves and the communities they support from the most common digital emergencies. Learn how to use the resource, navigate through the 12 available workflows to diagnose your digital security problem, and find support from CiviCERT members. |
Digital Rights Litigation in West Africa | Digital Rights Lawyers Initiative | The Booth seeks to showcase opportunities for collaboration to litigate digital rights in West Africa |
EFF | The Electronic Frontier Foundation (EFF) | The Electronic Frontier Foundation (EFF) is excited to offer an opportunity to engage in conversations about the formation of coalitions and the implementation of effective tactics for interdisciplinary engagements. In addition, we will be presenting some of our innovative projects and providing complimentary stickers for collection, as well as offering a selection of distinctive EFF merchandise available for purchase. |
Emergency Assistance to Frontline Activists | Freedom House | EAP provides short-term support to human rights defenders (HRDs), civil society organizations (CSOs), and survivors of severe religious persecution on the basis of belief or non-belief. The program has worked to support individuals and organizations in some of the world’s most repressive and conflict-ridden environments. On a yearly basis, the program supports more than 1,000 HRDs, CSOs, and survivors of severe religious persecution with emergency assistance, urgent advocacy grants, and preventive security projects. |
FACTER: Revolutionizing digital investigation for newsrooms to counter mis/dis/mal Information | Media Matters for Democracy (MMfD) | FACTER is a first-of-its-kind digital investigation tool designed exclusively to facilitate newsrooms in countering mis-, dis-, and mal-information (MDM) in Pakistan. The Facter database, which can be accessed by newsrooms via a Chrome extension, is updated with fact-checks by a team of digital investigators and editors on a daily basis. The booth will showcase the Facter project, what sets it apart from other fact-checking initiatives, its functioning, SOPs, and technical infrastructure. |
Freedom of the Press Foundation | Freedom of the Press Foundation | Freedom of the Press Foundation (FPF) is a nonprofit working at the intersection of human rights, journalism, and technology. A unique organization in the security and internet freedom community, FPF has pioneered a multilayered approach to preserving and extending the privacy and security of journalists in the interest of advancing a free, adversarial press.
Our digital security training team provides support to journalists and media-makers working in the public interest through trainings, consulting, and security assessments; run ongoing digital security programs, and participate in conferences and events around the world throughout the year. We also write security guides that address common digital security concerns and conduct research on the latest digital security developments. |
GlobaLeaks | GlobaLeaks | GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable to your needs and protects the whistleblower’s privacy and submissions by default. |
Greenhost | Greenhost | Greenhost is a digital infrastructure provider in the community. We help organizations to have a safe and trusted place on the internet. The booth will be a place to connect with our users and potential new users. |
Holistic VPN stack exploitation: Risks & threats across VPN layers | Breakpointing Bad / OTF ICFP Fellow | This booth showcases tools and techniques Breakpointing Bad has developed for identifying threats to VPNs, including risks that might be less well publicized and understood. We have planned three demonstrations: 1. Client Information Leakages - Participants will see CryptoSluice identify applications with weak or no encryption that put them at risk even when using a VPN. 2. VPN Server Attack Demo - Participants will see exploits developed by Breakpointing Bad that seriously undermine VPN security.3. Suspicious VPN Providers - Participants will see preliminary results about suspicious VPNs and how they put users at risk. These tools and techniques address risks and threats VPN clients are exposed to across different components of the VPN software/operational stack. |
Horizontal Booth: Tools for your digital security | Horizontal | Horizontal is an international CSO that support activists, journalist, and human right defenders with technology tools and trainings. We will demo our 2 flagship products:
|
Human Rights @ Meta | Meta | Meta's Human Rights Team will be present to answer your questions and hear your feedback about our policies and work to protect human rights defenders across Facebook, Instagram, and WhatsApp. We'll also be hosting two interactive sessions: a tabletop exercise simulating how we respond to conflict and crisis situations, and a structured consultation and update on our Trusted Partner and HRD escalation channels. |
HURIDOCS (Human Rights Information and Documentation Systems) | HURIDOCS | For the last 40 years, HURIDOCS has supported the human rights community by providing essential tools and solutions for documentation and information management, and offering strategic advice on standards and methodologies for human rights documentation. At this year’s Global Gathering, HURIDOCS will present the roadmap for ongoing and further developments of our flagship tool Uwazi, share the Rapid Response Documentation Principles and showcase Uwazi integration with Tella. Stop by to learn more about how HURIDOCS can support you, your organization or your community. We look forward to seeing our friends and allies, building new connections and exploring potential synergies! |
International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | During the Global Gathering regional and thematic specialists will be facilitating sessions, working with human rights defenders, and providing training. Our booth will be staffed throughout the Gathering and we are looking forward to meeting you and to learning more about your projects too. Our booth will be part of the Job Fair, so feel free to stop by and meet our colleagues to learn more about our work with partners around the world. |
Join the Localization Lab community! | Localization Lab | We have localized nearly 200 internet freedom tools and resources into 220 languages, and we need your help to do more! Drop by our booth to learn about our work and how we can fight tech bias together through co-design, collaboration, and research. Sign up to join our global network of contributors, explore other collaboration opportunities, or help us build our Unified Glossary on-site by translating into your local language, one word at a time. |
Journalism for the Future / network booth | supernova.is | Is there any kind of journalism about digital rights that covers not only problems we face now, but ones that are yet in the boiling pot, soon ready to be served to citizens? Can we catch it before it damages society, vulnerable groups, the internet infrastructure? We invite journalists and anybody interested in the prevention of the anti-utopian future rather than sorting out the rabble after, for the conversation about what can be done differently in informing our audiences and networking for future collaborations across the borders. |
Numun Fund | Numun Fund | The first dedicated fund for feminist tech in, and for the Larger World. Our aim is to seed and sustain feminist technology infrastructure for movement organising, and we understand digital technologies to be an important part of movement infrastructure. |
Omidyar Network’s digital trust and safety strategy | Omidyar Network | Come learn more about Omidyar Network, our approach to grantmaking, and our strategy as it relates to Digital Trust and Safety. |
OONI Run v2 Demo | Open Observatory of Network Interference | Stop by the OONI booth to see a demo of our improved OONI Run tool! This tools helps people crowd source network measurements and we currently working on improvements requested by the community. Stop by to see how it works! |
Open Technology Fund | Open Technology Fund | OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs. |
PrivacyLx | PrivacyLx | PrivacyLx is a Lisbon-based non-profit association focused on the defense of digital privacy and security as fundamental rights for a free society through education, research and development of tools for safeguarding them. Among other things, we have been organizing privacy events at local libraries and the 2024 Tor Community Day. |
The Palestine Booth | collective | The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza. |
Quad9 | Quad9 | Quad9 is a Swiss NGO providing a free service that replaces your default Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. And we have the data to prove it's effective. As opposed to some other public DNS services, Quad9 respects your privacy and does not market in personally identifiable information about you or your DNS queries. |
Safe Sisters Fellowship Program | Safe Sisters | Safe Sisters is showcasing its first public exhibit of fellowship products from our community champions. The exhibition will include collections from TFGBV research, Digital rights creative content and Digital safety resources from 7 African countries. |
Usability and Accessibility Clinic | Accessibility Lab UXD Lab Ura Design Decent Design Superbloom |
Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist. |
Vietnam Rise: Navigating in hostile environments | Vietnam Rise | There seems to be reservations from funders and NGOs about funding and working on Vietnam projects due to increasingly harsher government crackdowns. This tendency for risk aversion hurts civil society and grassroots organizing. Vietnam Rise would like to showcase that it is possible to work in Vietnam. We would like to showcase new tactics and work with new communities and issues to navigate in hostile environments but at the same time integrate security into our processes. |