|
|
(345 intermediate revisions by 4 users not shown) |
Line 1: |
Line 1: |
| __TOC__
| | __NOTOC__ |
|
| |
|
| .
| | '''IMPORTANT MESSAGES (general updates below the schedule)''' |
|
| |
|
| <center><big>'''''Please note this agenda is still being worked on and is subject to change in coming weeks!'''''</big></center>
| | *'''Registration''' will be open daily from 10:30 - 16:00 and the '''venue gates will open at 11:30.''' |
| | *Check out the following documents before you arrive: [[Code of Conduct|1) Code of Conduct]], [[Security Policy|2) Security Policy]], and [[Global Gathering COVID-19 Policy|3) COVID Policy.]] We will be adhering to these policies rigorously. Do a deep dive by reading [https://www.digitalrights.community/blog/2023-global-gathering-how-we-are-approaching-safety-security-and-challenges How We are Approaching Safety, Security, and Challenges] to understand the why. |
|
| |
|
| == Global Gathering @ a Glance == | | == Global Gathering @ a Glance == |
| {| class="wikitable" | | {| class="wikitable" style="width:99%;" |
| |+ | | |+ |
| |- | | |- |
| ! | | ! |
| !'''<big>Friday, Sept. 27th</big>''' | | !'''<big>Friday, Sept. 27</big>''' |
| !'''<big>Saturday, Sept. 28th</big>''' | | !'''<big>Saturday, Sept. 28</big>''' |
| !'''<big>Sunday, Sept. 2th</big>''' | | !'''<big>Sunday, Sept. 29</big>''' |
| |- | | |- |
| !'''11:30 - 13:00''' | | !'''11:30 - 13:00''' |
| |style="background: #ffffcc;"|Opening Ceremony & | | |style="background: #FFF9C4;"|[[September 27 2024 Agenda|Opening Ceremony & Networking Hour]] |
| Networking Lunch | | |style="background: #FFF9C4;"|[[Job Fair 2024|Job Fair 2024 & Networking Hour]] |
| |style="background: #ffffcc;"|Job Fair & | | |style="background: #FFF9C4;"|[[September 29 2024 Agenda|Networking Hour]] |
| Networking Lunch | |
| |style="background: #ffffcc;"|Networking Lunch | |
| |- | | |- |
| !'''13:00 - 18:00''' | | !'''13:00 - 18:00''' |
| |style="background: #38cbd5;"||Circles and Booths | | |style="background: #38cbd5;"|[[September 27 2024 Agenda|Circles and Booths]] |
| |style="background: #ffffcc;"|Circles and Booths | | |style="background: #c0e590;"|[[September 28 2024 Agenda|Circles and Booths]] |
| |style="background: #ffffcc;"|Circle and Booths | | |style="background: #5BE6EF;"|[[September 29 2024 Agenda|Circle and Booths]] |
| |- | | |- |
| !'''18:00 - 20:00''' | | !'''18:00 - 20:00''' |
| |style="background: #ffffcc;"|Evening Celebration: | | |style="background: #ffa3e8;"|Evening Celebration!<br>Valencia Drive and Guest DJs |
| Valencia Drive and Guest DJs | | |style="background: #ffa3e8;"|Evening Celebration!<br>Calyx Institute Karaoke Party! |
| |style="background: #ffffcc;"|Evening Celebration: | | |style="background: #ffa3e8;"|Evening Celebration!<br>Closing Ceremony and Guest DJs |
| Calyx Institute Karaoke Party! | |
| |style="background: #ffffcc;"|Evening Celebration: | |
| Closing Ceremony and Guest DJs | |
| |}
| |
| <br>
| |
| <br>
| |
| | |
| ==Friday, September 27th==
| |
| | |
| ===Circles===
| |
| You can find detailed [[Global Gathering Agenda 2024#Circle Descriptions|Circle descriptions]] the end of this page.
| |
| {| class="wikitable mw-collapsible"
| |
| ! colspan="4" style="background: #3acad3;"|<big>Circles, Sept. 27</big>
| |
| |-
| |
| |style="background: #d5f3f6;"|'''<big>Location</big>'''
| |
| |style="background: #d5f3f6;"|<big>'''13:30 - 14:30'''</big>
| |
| |style="background: #d5f3f6;"|<big>'''15:00 - 16:00'''</big>
| |
| |style="background: #d5f3f6;"|<big>'''16:30 - 17:30'''</big>
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle (TBD)
| |
| |Self-Organized Circle (TBD)
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle (TBD)
| |
| |Self-Organized Circle (TBD)
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Self-Organized Circle
| |
| |Strategic Litigation Reimagined for Justice
| |
| |Self-Organized Circle (TBD)
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Western Europe Regional Meetup
| |
| |Digital Challenges for Journalists and Activists During the Conflict
| |
| |Developing stories and talking points to support fundraising
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |North America Regional Meetup
| |
| |Digital Rights in Portugal: Where do we go from here
| |
| |Current blocking trends, how states in different countries do it
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Asia Regional Meetup
| |
| | |
| |Countering digital authoritarianism and online repression in Central Asia
| |
| |Shield or Sham: How useful are digital security trainings?
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Africa Regional Meetup
| |
| |Policy Workers Meetup
| |
| |Horse before the cart: Empowering change with representative local data
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Latin America Regional Meetup
| |
| |Technologists Meetup
| |
| |Digital threats in the Arab speaking countries
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |MENA Regional Meetup
| |
| |Researchers Meetup
| |
| |Supporting Disrupted Media
| |
| |-
| |
| |style="background: #d5f3f6;"|TBD
| |
| |Eastern Europe, Central Asia and Caucasus Regional Meetup
| |
| |Digital Security Trainers Meetup
| |
| |Reflecting on Surveillance Studies Research Methodologies: The good, the bad and the ugly
| |
| |-
| |
| ! colspan="4" style="background: #3acad3;"|<big>Circles @ Partner Villages, Sept. 27</big>
| |
| |-
| |
| |style="background: #d5f3f6;"|'''<big>Location</big>'''
| |
| |style="background: #d5f3f6;"|<big>'''13:30 - 14:30'''</big>
| |
| |style="background: #d5f3f6;"|<big>'''15:00 - 16:00'''</big>
| |
| |style="background: #d5f3f6;"|<big>'''16:30 - 17:30'''</big>
| |
| |-
| |
| |style="background: #d5f3f6;"|Tor Project & Tails Village
| |
| |<small></small>
| |
| |Working on the well-being of workers
| |
| |Running Tor relays in/by the Global South
| |
| |-
| |
| |style="background: #d5f3f6;"|Calyx Institute Village
| |
| |
| |
| |
| |
| |
| |
| |- | | |- |
| |style="background: #d5f3f6;"|Clean Insights Tea House | | | colspan="4" style="background: #fde68a |<center> <big>'''Off-Site Socials''' will be happening from 8:00am to 11:00pm. These are meetups or activities that are happening at the beach, park, or one of the numerous cafes in the area. Check out the current list, or organize your own:</big> <big>https://pad.riseup.net/p/GG-Socials-2024</big></center> |
| |<small></small> | | |}<center> |
| |<small></small> | | {| class="wikitable" style="width:99%;" |
| |
| | | rowspan="3" style="background: #fde68a;"|[[File:GG proposals Wiki icons 2024.png|center|frameless|detailed agenda]] |
| | | style="background: #38cbd5;" |[[September 27 2024 Agenda|<big>'''Friday, September 27'''</big>]] |
| |- | | |- |
| |style="background: #d5f3f6;"|SplinterCon by eQualitie Village | | | style="background: #c0e590;" |[[September 28 2024 Agenda|<big>'''Saturday, September 28'''</big>]] |
| |You are Here: Splinternet | |
| |Tools of Resistance: Showcase of Existing Solutions and Open Mic for New Projects
| |
| |Make It Worse: Help Us Build the Creepiest Shutdown Simulator
| |
| |- | | |- |
| |style="background: #d5f3f6;"|APC Village | | | style="background: #5BE6EF;" " |[[September 29 2024 Agenda|<big>'''Sunday, September 29'''</big>]] |
| |
| |
| |
| |
| |How do we get the internet we want?: Feminist Provocations and Questions for Internet Governance
| |
| |-
| |
| |style="background: #d5f3f6;"|Outline Village
| |
| |
| |
| | | |
| | | |
| |} | | |} |
| | </center> |
|
| |
|
| ===Booths=== | | == Updates == |
| Each booth has a number, which can be found on top, center above a booth's "window".
| |
|
| |
|
| You can find detailed[[Global Gathering Agenda 2024#Booth Descriptions|Booth descriptions]] at the bottom of this page.
| | '''We will be updating this section daily with announcements, so check back.''' |
| {| class="wikitable"
| |
| |+
| |
| | colspan="6" style="background: #3acad3;"|<center>'''<big>Booths, Sept. 27th</big>'''</center>
| |
| |-
| |
| |style="background: #d5f3f6;"|
| |
| ! colspan="2" style="background: #d5f3f6;"|<big>13:30 - 15:30</big>
| |
| | rowspan="29" style="background:#3acad3;"|
| |
| ! colspan="2" style="background: #d5f3f6;" |<big>16:00 - 18:00</big>
| |
| |-
| |
| |style="background: #d5f3f6;"|'''Location'''
| |
| |style="background: #d5f3f6;"|<center>'''Name'''</center>
| |
| |style="background: #d5f3f6;"|<center>'''Run by'''</center>
| |
| |style="background: #d5f3f6;"|<center>'''Name'''</center>
| |
| |style="background: #d5f3f6;"|<center>'''Run by'''</center>
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 1
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 2
| |
| |'''OONI Run v2 Demo'''
| |
| |Open Observatory of Network Interference
| |
| |'''Wiki-Advocacy: How the people behind Wikipedia work towards a better internet'''
| |
| |Wikimedia Foundation
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 3
| |
| |style="background: #ffffcc;"|'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |style="background: #ffffcc;"|'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 4a
| |
| |
| |
| |
| |
| |'''Numun Fund'''
| |
| |Numun Fund
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 4b
| |
| |'''Conexión Segura y Libre'''
| |
| |Conexión Segura y Libre
| |
| |'''Horizontal Booth: Tools for your digital security'''
| |
| |Horizontal
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 5
| |
| |'''Join the Localization Lab Community!'''
| |
| |Localization Lab
| |
| |'''D3 - Defesa dos Direitos Digitais'''
| |
| |D3 - Defesa dos Direitos Digitais
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 6
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 7
| |
| |'''Usability and Accessibility Clinic'''
| |
| |Accessibility Lab
| |
| UXD Lab
| |
| Ura Design
| |
| Decent Design
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 8
| |
| |'''Whats Happening In Myanmar'''
| |
| |Myanmar Internet Project
| |
| |'''Letro'''
| |
| |Relaycorp
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 9
| |
| |style="background: #ffffcc;"|'''Tor and Tails Village'''
| |
| |The Tor Project and Tails
| |
| |style="background: #ffffcc;"|'''Tor and Tails Village'''
| |
| |The Tor Project and Tails
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 10
| |
| |'''Greenhost'''
| |
| |Greenhost
| |
| |'''Freedom of the Press Foundation'''
| |
| |Freedom of the Press Foundation
| |
|
| |
|
| |-
| | + Check out the [https://docs.google.com/document/d/1Ew_vUUSZQsyMfBnD121qvniEeKWuPcfsHlWvyxq4BVc/edit Facilitator Guide] if you are overseeing a Circle or Booth. |
| |style="background: #d5f3f6;"|Booth 11
| |
| |'''PigeonHut: Get Shredded for Your Bodily Autonomy'''
| |
| |Digital Defense Fund, Plan C, Amnesty International USA
| |
| |'''PiRogue Tool Suite (PTS)'''
| |
| |Defensive Lab Agency
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 12
| |
| |style="background: #ffffcc;"|'''Calyx Institute Village'''
| |
| |The Calyx Institute
| |
| |style="background: #ffffcc;"|'''Calyx Institute Village'''
| |
| |The Calyx Institute
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 13
| |
| |'''CyberStar - Digital safety support for small CSOs'''
| |
|
| |
|
| |The SecDev Foundation
| | '''+ Organize a off-site Social @ the beach''' or central park in front of the venue! Enjoy the city. [https://pad.riseup.net/p/GG-Socials-2024 Check out how.] |
| |'''How to use IODA to Monitor for Internet Shutdowns'''
| |
| |IODA @ Georgia Institute of Technology
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 14
| |
| |'''GlobaLeaks'''
| |
| |GlobaLeaks
| |
| |'''Digital Defenders Partnership'''
| |
| |Digital Defenders Partnership
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 15
| |
| |'''Snowstorm'''
| |
| |Snowstorm
| |
| |'''MapBond Connect Hub'''
| |
| |Mapbond
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 16
| |
| |'''Improving the Lists of Websites (aka Citizen Lab test lists) Used to Measure Internet Censorship'''
| |
| |NETALITICA
| |
| |'''Quiet - A "Slackier Signal for secure team chat"'''
| |
| |Quiet
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 17
| |
| |'''Omidyar Network’s Digital Trust and Safety Strategy'''
| |
| |Omidyar Network
| |
| |'''Censorship Resilient and Distributed Publishing: 451 Tools and more'''
| |
| |Zamaneh Media
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 18
| |
| |'''Open Culture Foundation'''
| |
| |Open Culture Foundation
| |
| |'''Abrimos.info: Generating strategic knowledge from open data'''
| |
| |Abrimos.info
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 19
| |
| |style="background: #ffffcc;"|'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |style="background: #ffffcc;"|'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 21
| |
| |style="background: #ffffcc;"|'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |style="background: #ffffcc;"|'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 22
| |
| |'''Article19'''
| |
| |Article19
| |
| |'''Article19'''
| |
| |Article19
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 79
| |
| |style="background: #ffffcc;"|'''Outline Village'''
| |
| |Outline
| |
| |style="background: #ffffcc;"|'''Outline Village'''
| |
| |Outline
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 80
| |
| |'''Open Technology Fund'''
| |
| |Open Technology Fund
| |
| |'''Human Rights @ Meta'''
| |
| |Meta
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 81
| |
| |'''Fairwork'''
| |
| |Fairwork
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 82
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #d5f3f6;"|Booth 83
| |
| |style="background: #ffffcc;"|'''Digital Justice House'''
| |
| |Team CommUNITY
| |
| |style="background: #ffffcc;"|'''Digital Justice House'''
| |
| |Team CommUNITY
| |
| |}
| |
| | |
| ===<big>Evening Celebration</big>===
| |
| {| class="wikitable"
| |
| |+
| |
| |style="background: #FF69B4;|<center>[[File:Valencia-hs.jpg|alt=Valencia Drive Headshot|185x185px|left|frameless]]</center>
| |
| |style="background: #FF69B4;|<big>'''Drag Show & Guest DJs'''</big>
| |
| '''Date''': Sept 27
| |
| | |
| '''Time:''' 18:00
| |
| | |
| Un)official drag queen of the digital rights community Valencia Drive is your commercial-free hotmix of the 80’s, 90’s and today, here to serve you more fashion, more comedy, and more cartoonish nonsense than ever before. Valencia returns to Global Gathering mainstage this year with yet another iconic, legendary, and absolutely flawless performance, proving yet again why she’s your favorite threat model’s. (Valencia Drive's IG: [https://www.instagram.com/thevalenciadrive/ @thevalenciadrive])
| |
| | |
| This will be followed by guest DJs TBD.
| |
| |}
| |
| <br>
| |
| <br>
| |
| | |
| ==Saturday, September 28th==
| |
| | |
| ===Circles===
| |
| You can find detailed Circle [[Global Gathering Agenda 2024#Circle Descriptions|descriptions]] the end of this page.
| |
| {| class="wikitable mw-collapsible"
| |
| | colspan="4" style="background: #c0e590;"|<center><big>'''Circles, Sept. 28'''</big></center>
| |
| |-
| |
| |style="background: #e8f5d6"|'''<big>Location</big>'''
| |
| |style="background: #e8f5d6"|'''<center><big>13:30 - 14:30</big></center>'''
| |
| |style="background: #e8f5d6"|'''<center><big>15:00 - 16:00</center></big>'''
| |
| |style="background: #e8f5d6"|'''<center><big>16:30 - 17:30</center></big>'''
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |Self-Organized<small></small> C<small></small>ircle
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Countering digital authoritarianism and online repression in Central Asia
| |
| |Community Networks Circle
| |
| |Rising Digital Authoritarianism in South Asia
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |The LLephant in the RooM: What are we doing about AI?
| |
| |Sustainable self-hosting?
| |
| |Building a new privacy-preserving and decentralized messenger
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Journalists, Sources and Whistleblowers: Increasing Threats to Press Freedom
| |
| |Tactics for engaging tech stakeholders in digital rights advocacy. The experiences and future opportunities across Indo-Pacific region.
| |
| |Discriminatory UX: How software can gatekeep people
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Guardians of Change: Strengthening Cybersecurity in Civil Society
| |
| | |
| |Technology, Data and Elections: The role of data and technologies in electoral processes
| |
| | |
| |The future of decent work in the planetary digital capitalism: AI, automation and digital platforms
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Nowhere feels safe: Digital transnational repression against women human rights defenders in exile
| |
| | |
| |VPN Provider Transparency - Addressing Threats that Shady VPNs Pose to VPN Clients and Providers
| |
| |Co-leadership for sustainable organizations
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |The How and Why of Rapid Response
| |
| |Challenges in Data-Driven Journalism
| |
| | |
| |VPN Infrastructure - Challanges & needs
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |Reimagination of Freedom: Digital Rights and Kinship through "The Ground Screams to Whisper Ancestral Mapping"
| |
| | |
| |Law and Policy for IBSA
| |
| |Identifying AI-Generated Content: how?
| |
| |-
| |
| |style="background: #e8f5d6"|TBD
| |
| |VPN Community Initiative
| |
| |Digital rights after the fall: what should we do with the digital heritage of a dictatorship
| |
| |Amplifying Research on Digital Rights through Popular Culture
| |
| | |
| |-
| |
| | colspan="4" style="background: #c0e590;"| <center><big>'''Circles @ Partner Villages, Sept. 28'''</big></center>
| |
| |-
| |
| |style="background: #e8f5d6"|'''<big>Location</big>'''
| |
| |style="background: #e8f5d6"|'''<center><big>13:30 - 14:30</big></center>'''
| |
| |style="background: #e8f5d6"|'''<center><big>15:00 - 16:00</big></center>'''
| |
| |style="background: #e8f5d6"|'''<center><big>16:30 - 17:30</big></center>'''
| |
| |-
| |
| |style="background: #e8f5d6"|Tor Project & Tails Village
| |
| |
| |
| |Developing robust signalling channel
| |
| |Updates about Tor and Tails
| |
| |-
| |
| |style="background: #e8f5d6"|Calyx Institute Village
| |
| |
| |
| |
| |
| |Design sprint for everyone: simple steps in building bite-size digital security tip cards
| |
| |-
| |
| |style="background: #e8f5d6"|Clean Insights Tea House
| |
| |
| |
| |From Wristbands to Smartphones: Designing for Physical Safety!
| |
|
| |
|
| |
| | '''+ This [https://www.google.com/maps/d/u/1/viewer?ll=38.77888342135787%2C-9.39305525710096&z=11&mid=14fNAMlvZQvND3fuYLmRh9oGAGFoOPls interactive map], created by the Global Gathering team,''' has the location of nearby services, restaurants, cafes, train spots, supermarkets, and even outdoor locations to organize your own off-site meetups. We have also '''compiled a useful [[Navigating Estoril]]''' page with very useful info including day trips, healthcare, services, and even tips like how to order coffee. |
| |-
| |
| |style="background: #e8f5d6"|SplinterCon by eQualitie Village
| |
| |Empowering a nation: strengthening civil society and media through capacity-building in a fragmented country. The case of El Salvador”
| |
| |Resilient Networks: Hosting Federated Services in Adversarial Conditions
| |
| |Testing OuiSync for Shutdown Scenarios
| |
| |-
| |
| |style="background: #e8f5d6"|APC Village
| |
| |Exchanging feminist methodologies, politics and practice in capacity building and feminist technology
| |
| |
| |
| |On selective protection and regulations: TFGBV and hate speech against gender and sexual rights defenders
| |
| |-
| |
| |style="background: #e8f5d6"|Outline Village
| |
| |
| |
| |
| |
| |
| |
| |}
| |
| | |
| ===Booths===
| |
| Each booth has a number, which can be found on top, center above a booth's "window".
| |
| | |
| You can find detailed [[Global Gathering Agenda 2024#Booth Descriptions|Booth descriptions]] at the bottom of this page.
| |
| {| class="wikitable"
| |
| |+
| |
| ! colspan="6" style="background: #c0e590;"|<big>Booths, September 28</big>
| |
| |-
| |
| |style="background: #e8f5d6"|
| |
| ! colspan="2" style="background: #e8f5d6"|<big>13:30 - 15:30</big>
| |
| | rowspan="29" style="background: #c0e590;"|
| |
| ! colspan="2"style="background: #e8f5d6"|<big>16:00 - 18:00</big>
| |
| |-
| |
| |style="background: #e8f5d6"|'''Location_'''
| |
| |style="background: #e8f5d6"|<center>'''Name'''</center>
| |
| | |
| |style="background: #e8f5d6"|<center>'''Run by'''</center>
| |
| |style="background: #e8f5d6"|<center>'''Name'''</center>
| |
| | |
| |style="background: #e8f5d6"|<center>'''Run by'''<c/enter>
| |
| | |
| |-
| |
| |style="background: #e8f5d6"|Booth 1
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 2
| |
| |'''Introducing the DigiSec.Wiki: Come Collaborate with Us!'''
| |
| |EngageMedia
| |
| |'''Global Voices'''
| |
| |Global Voices
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 3
| |
| |style="background: #ffffcc;"|'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |style="background: #ffffcc;"|'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 4a
| |
| |
| |
| |
| |
| |'''Numun Fund'''
| |
| |Numun Fund
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 4b
| |
| |'''Qubes OS Booth'''
| |
| |Qubes OS
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 5
| |
| |'''Join the Localization Lab Community!'''
| |
| |Localization Lab
| |
| |'''Digital Security Lab Ukraine'''
| |
| |Digital Security Lab Ukraine
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 6
| |
| |'''The current status of a new privacy-preserving and decentralized messenger'''
| |
| |Phoenix R&D / Messaging Layer Security (MLS)
| |
| |'''Kaleidoscope – reliable and convenient censorship circumvention mirroring solution'''
| |
| |DOXA
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 7
| |
| |'''Usability and Accessibility Clinic'''
| |
| |Accessibility Lab
| |
| UXD Lab
| |
| Ura Design
| |
| Decent Design
| |
| |'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks'''
| |
| |Ancestra
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 8
| |
| |'''The Caste of Technology: A Zine Library.'''
| |
| |The Center for Internet & Society
| |
| |'''SafeCommNet: Decentralized, Secure, and Private Communication System for Crisis and Disaster Management'''
| |
| |Alternative Solutions for Rural Communities (ASORCOM)
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 9
| |
| |style="background: #ffffcc;"|'''Tor and Tails'''
| |
| |The Tor Project and Tails
| |
| |style="background: #ffffcc;"|'''Tor and Tails Village'''
| |
| |The Tor Project and Tails
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 10
| |
| |'''Greenhost'''
| |
| |Greenhost
| |
| |'''Freedom of the Press Foundation'''
| |
| |Freedom of the Press Foundation
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 11
| |
| |'''Safety in exile: practical guide to avoiding transnational harassment'''
| |
| |Radio Free Asia
| |
| |'''Preserve Truth to Power with Save by OpenArchive'''
| |
| |OpenArchive
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 12
| |
| |style="background: #ffffcc;"|'''The Calyx Institute Village'''
| |
| |The Calyx Institute
| |
| |style="background: #ffffcc;"|'''The Calyx Institute Village'''
| |
| |The Calyx Institute
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 13
| |
| |'''AmneziaVPN'''
| |
| |AmneziaVPN
| |
| |'''LibResilient'''
| |
| |LibResilient
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 14
| |
| |'''GlobaLeaks'''
| |
| |GlobaLeaks
| |
| |'''Digital Defenders Partnership'''
| |
| |Digital Defenders Partnership
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 15
| |
| |'''How Local Pakistani Apps Puts Vulnerable Citizens at Risk of Surveillance and Targeted Attacks?'''
| |
| |Arizona State University
| |
| |'''JAAKLAC Community'''
| |
| |JAAKLAC
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 16
| |
| |'''The Work of the Internetbolivia.org Foundation'''
| |
| |Fundación Internetbolivia.org
| |
| |'''JOSA - Jordan Open Source Association'''
| |
| |Jordan Open Source Association
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 17
| |
| |'''Omidyar Network’s Digital Trust and Safety Strategy'''
| |
| |Omidyar Network
| |
| |'''Amnesty Tech'''
| |
| |Amnesty International (Tech Programme)
| |
| | |
| |-
| |
| |style="background: #e8f5d6"|Booth 18
| |
| |'''MaadiX'''
| |
| |MaadiX
| |
| |'''0xche'''
| |
| |0xche
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 19
| |
| |style="background: #ffffcc;"|'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |style="background: #ffffcc;"|'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 21
| |
| |style="background: #ffffcc;"|'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |style="background: #ffffcc;"|'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 22
| |
| |'''Article19'''
| |
| |Article19
| |
| |'''Article19'''
| |
| |Article19
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 79
| |
| |style="background: #ffffcc;"|'''Outline Village'''
| |
| |Outline
| |
| |style="background: #ffffcc;"|'''Outline Village'''
| |
| |Outline
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 80
| |
| |'''Open Technology Fund'''
| |
| |Open Technology Fund
| |
| |'''Human Rights @ Meta'''
| |
| |Meta
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 81
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 82
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| |style="background: #e8f5d6"|Booth 83
| |
| |style="background: #ffffcc;"|'''Digital Justice House'''
| |
| |Team CommUNITY
| |
| |style="background: #ffffcc;"|Digital Justice House
| |
| |'''Team CommUNITY'''
| |
| |}
| |
| | |
| ===<big>Evening Celebration</big>===
| |
| | |
| {| class="wikitable"
| |
| |+
| |
| |style="background: #FF69B4;|<center>[[File:Calyx Logo.png|alt=Calyx Institute logo|185x185px|left|frameless]]</center>
| |
| |style="background: #FF69B4;|<big>'''Calyx Institute Karaoke Party!'''</big>
| |
| '''Time:''' 18:00
| |
| | |
| Get your song list ready and come prepared for the return of karaoke at the Global Gathering!!!!
| |
| | |
| This is the time to unleash your inner entertainer, and let us see your moves!
| |
| |}
| |
| <br>
| |
| <br>
| |
| | |
| ==Sunday, September 29th==
| |
| | |
| ===Circles===
| |
| You can find detailed Circle [[Global Gathering Agenda 2024#Circle Descriptions|descriptions]] the end of this page.
| |
| {| class="wikitable"
| |
| |+
| |
| ! colspan="4" |<big>Circles, September 29</big>
| |
| |-
| |
| !''Location''
| |
| !<small></small><big>13:30 - 14:30</big>
| |
| !<small></small><big>15:00 - 16:00</big>
| |
| !<small></small><big>16:30 - 17:30</big>
| |
| |-
| |
| !'''TBD'''<small></small>
| |
| |Self-Organized Circle
| |
| |<small></small>S<small></small>elf-Organized Circle
| |
| |Self-Organized Circle
| |
| |-
| |
| !'''TBD'''
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |-
| |
| !'''TBD'''
| |
| |Self-Organized Circle
| |
| |Self-Organized Circle
| |
| |Supporting Asian HRDs in the frontline : How we shape the local supporting system and model
| |
| |-
| |
| !'''TBD'''
| |
| |Is it time to create certification for digital security practitioners?
| |
| |Bridging the Gaps Between Activists and Hackers: How To Talk With Each Other About Security
| |
| |Maximizing engagement in your digital literacy workshop through gameplay
| |
| |-
| |
| !'''TBD'''
| |
| |World-wide Autonomous Comunication Over HF Band
| |
| |Incident Response Working Group
| |
| |Return of the zines: A hands-on approach to censorship circumvention
| |
| |-
| |
| !'''TBD'''
| |
| |Building The Asia Digital Rights Community
| |
| | |
| |Growing Support for FOSS Sustainability
| |
| |Digital Security Providers in Eastern Europe: New Solutions to FamiliarChallenges?
| |
| |-
| |
| !'''TBD'''
| |
| |Digital Iran Reloaded: Gamers’ Circumvention Tactics in the IRI
| |
| |CTRL + ALT + DEL: Learnings on movement building from the Digital Rights Asia-Pacific Assemblies
| |
| |Building a digital rights movement among the Francophone Community
| |
| |-
| |
| !'''TBD'''
| |
| |GenAI & LLMs in COMO & TS: where do human rights and communities fit in today’s hottest acronyms?
| |
| | |
| |The MENA Alliance for Digital Rights
| |
| | |
| |The Costs of Protection: The global landscape for data privacy and security tools
| |
| |-
| |
| !'''TBD'''
| |
| |Activate the Network: Collective Training Against Internet Shutdowns
| |
| | |
| |How to stop promising/doing audits and start promising/doing what is actually needed
| |
| |Safeguarding NGOs and Digital Rights Organizations: Tackling Insider Threats and Beyond
| |
| |-
| |
| !'''TBD'''
| |
| |What are your operations and admin challenges?
| |
| |Securing the Digital Frontline: Threat Analysis for Human Rights Defenders in Thailand and Vietnam
| |
| |Managers Meetup
| |
| | |
| |-
| |
| ! colspan="4" |<big>Circles @ Partner Villages</big>
| |
| |-
| |
| !''Location''
| |
| !13:30 - 14:30
| |
| !15:00 - 16:00
| |
| !16:30 - 17:30
| |
| |-
| |
| !'''Tor Project & Tails Village'''
| |
| |
| |
| |Leveraging Weblate and automated checks for higher quality
| |
| localization.
| |
| |Tor Browser, Tails, and You
| |
| |-
| |
| !'''Calyx Institute Village'''
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| !'''Clean Insights Tea House'''
| |
| |
| |
| |ButterBox--Life without the internet made smoother
| |
| |
| |
| |-
| |
| !'''SplinterCon by eQualitie Village'''
| |
| |Echoes of Isolation: Gathering First-Hand Accounts from Fragmented Networks
| |
| |Bridging the Void: Deploying Satellite Solutions for Isolated Communities
| |
| | |
| |The Real ESCAPE GAME: 1 Hour to Break Out of the Splinternet!
| |
| |-
| |
| !'''APC Village'''
| |
| |Fostering Diversity and Inclusion in Open Source Projects
| |
| |
| |
| |Safety for Voices: South-South Strategies for WHRDs in Digital Spaces
| |
| |-
| |
| !'''Outline Village'''
| |
| |Knowledge sharing across circumvention tool providers and Outline SDK users around the world
| |
| |
| |
| |
| |
| |}
| |
| <br>
| |
| ===Booths===
| |
| Each booth has a number, which can be found on top, center above a booth's "window".
| |
| | |
| You can find detailed [[Global Gathering Agenda 2024#Booth Descriptions|Booth descriptions]] at the bottom of this page.
| |
| {| class="wikitable"
| |
| |+
| |
| ! colspan="6" |<big>Booths, September 29</big>
| |
| |-
| |
| !
| |
| ! colspan="2" |<big>13:30 - 15:30</big>
| |
| !
| |
| ! colspan="2" |<big>16:00 - 18:00</big>
| |
| |-
| |
| !'''''Location'''''
| |
| !<big>'''Name'''</big>
| |
| !<big>Run by</big>
| |
| ! rowspan="28" |
| |
| !<big>Name</big>
| |
| !<big>Run by</big>
| |
| | |
| |-
| |
| !'''Booth 1'''
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 2'''
| |
| |
| |
| |
| |
| |'''OONI Run v2 Demo'''
| |
| |Open Observatory of Network Interference
| |
| |-
| |
| !'''Booth 3'''
| |
| |'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |'''SplinterCon by eQualitie Village'''
| |
| |eQualitie
| |
| |-
| |
| !'''Booth 4a'''
| |
| |'''Access Now’s Digital Security Helpline'''
| |
| |Access Now
| |
| |'''Numun Fund'''
| |
| |Numun Fund
| |
| |-
| |
| !'''Booth 4b'''
| |
| |'''Conexión Segura y Libre'''
| |
| |Conexión Segura y Libre
| |
| |'''Horizontal Booth: Tools for your digital security'''
| |
| |Horizontal
| |
| |-
| |
| !'''Booth 5'''
| |
| |'''Join the Localization Lab Community!'''
| |
| |Localization Lab
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 6'''
| |
| |'''Vietnam Rise: Navigating in hostile environments.'''
| |
| |Vietnam Rise
| |
| |'''Emergency Assistance to Frontline Activists'''
| |
| |<nowiki>Emergency Assistance Program | Freedom House</nowiki>
| |
| |-
| |
| !'''Booth 7'''
| |
| |'''Usability and Accessibility Clinic'''
| |
| |Accessibility Lab
| |
| UXD Lab
| |
| | |
| Ura Design
| |
| | |
| Decent Design
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 8'''
| |
| |'''Digital First Aid Kit'''
| |
| |CiviCERT
| |
| |'''Holistic VPN Stack Exploitation - Risks & Threats Across VPN Layers'''
| |
| |Breakpointing Bad / OTF ICFP Fellow
| |
| |-
| |
| !'''Booth 9'''
| |
| |'''Tor and Tails Village'''
| |
| | |
| |The Tor Project and Tails
| |
| |'''Tor and Tails Village'''
| |
| | |
| |The Tor Project and Tails
| |
| | |
| |-
| |
| !'''Booth 10'''
| |
| |'''Greenhost'''
| |
| |Greenhost
| |
| |
| |
| |Freedom of the Press Foundation
| |
| |-
| |
| !'''Booth 11'''
| |
| |'''Journalism for the Future / network booth'''
| |
| |supernova.is
| |
| |'''EFF'''
| |
| | |
| |The Electronic Frontier Foundation (EFF)
| |
| |-
| |
| !'''Booth 12'''
| |
| |
| |
| |Calyx Institute
| |
| |
| |
| |Calyx Institute
| |
| |-
| |
| !'''Booth 13'''
| |
| |'''HURIDOCS (Human Rights Information and Documentation Systems)'''
| |
| |HURIDOCS
| |
| |'''Quad9'''
| |
| |Quad9
| |
| |-
| |
| !'''Booth 14'''
| |
| |'''GlobaLeaks'''
| |
| |GlobaLeaks
| |
| |'''Digital Defenders Partnership'''
| |
| |Digital Defenders Partnership
| |
|
| |
|
| |-
| | '''+ TCU Security Team has compiled a comprehensive <u>[https://docs.google.com/document/d/1ZCrs4PjQQRdYwU8pfZO4-3O7sjzMovu7/edit?usp=sharing&ouid=104123226664325204942&rtpof=true&sd=true 2024 Travel and Safety Advice]</u>''' document with useful information ranging from digital security to local laws. |
| !'''Booth 15'''
| |
| |'''FACTER: Revolutionizing Digital Investigation for Newsrooms to Counter Mis/Dis/Mal Information'''
| |
| |Media Matters for Democracy (MMfD)
| |
| |'''Digital Rights Litigation in West Africa'''
| |
| |Digital Rights Lawyers Initiative
| |
| |-
| |
| !'''Booth 16'''
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 17'''
| |
| |'''Omidyar Network’s Digital Trust and Safety Strategy'''
| |
| |Omidyar Network
| |
| |'''Amnesty Tech'''
| |
| |Amnesty International (Tech Programme)
| |
| |-
| |
| !'''Booth 18'''
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 19'''
| |
| |'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |'''Clean Insights Tea House'''
| |
| |Guardian Project
| |
| |-
| |
| !'''Booth 21'''
| |
| |'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |'''APC Village'''
| |
| |Association for Progressive Communications
| |
| |-
| |
| !'''Booth 22'''
| |
| |'''Article19'''
| |
| |Article19
| |
| |'''Article19'''
| |
| |Article19
| |
| |-
| |
| !'''Booth 79'''
| |
| |'''Outline Village'''
| |
| |Outline
| |
| |'''Outline Village'''
| |
| |Outline
| |
| |-
| |
| !'''Booth 80'''
| |
| |'''OTF Booth'''
| |
| |Open Technology Fund
| |
| |'''Human Rights @ Meta'''
| |
| |Meta
| |
| |-
| |
| !'''Booth 81'''
| |
| |'''Safe Sisters Fellowship Program'''
| |
| |Safe Sisters
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 82'''
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |-
| |
| !'''Booth 83'''
| |
| |'''Digital Justice House'''
| |
| |Team CommUNITY
| |
| |'''Digital Justice House'''
| |
| |Team CommUNITY
| |
| |}
| |
|
| |
|
| ===<big>Evening Celebration</big>===
| | '''+ Connect, be joyful, and immerse yourself in creative energy.''' The sole purpose of this event is to bring digital rights networks together so we can collectively improve the solutions and strategies addressing the acute challenges our communities are facing. We encourage you to check out the [[Community Culture|Community Culture Guidelines]] of this event. |
|
| |
|
| {| class="wikitable"
| | '''+ Please take some time to give Partners love''' - without them this safe, secure, and creative space would not be possible. Running an event like the GG - and the complimentary Equity Fund - is time consuming and financially burdensome because of the amount of care and details required. |
| |+
| |
| |style="background: #FF69B4;|<center>[[File:DJ Talie.png|alt=Dj Talie's picture|185x185px|left|frameless]]</center>
| |
| |style="background: #FF69B4;|<big>'''DJ Talie and Guest DJ'''</big>
| |
| '''Time:''' 18:00
| |
| Natalie (DJ Talie) brings a fresh mix of Afrobeats, Amapiano and AfroHouse in her set, creating a unique blend of rhythms and grooves bringing great vibes and buzz on the dancefloor all night.
| |
| |}
| |
| <br>
| |
| <br>
| |
| <br>
| |
| <br>
| |
| ''<big><center>'''Thank you to all of the partners and sponsors that have made the 2024 Global Gathering possible!'''</center></big>''
| |
|
| |
|
| == Partners == | | == Partners == |
| | <center><big>'''Thank you to all of the partners and sponsors that'''</big> <big>'''have made the 2024 Global Gathering possible!'''</big></center> |
| <gallery widths="160" perrow="5" mode="nolines"> | | <gallery widths="160" perrow="5" mode="nolines"> |
| GG Tor 1600 900.png|alt=Tor logo | | GG Tor 1600 900.png|alt=Tor logo|link=https://www.torproject.org/ |
| GG Calyx 1600 900.png|alt=Calyx logo | | GG Calyx 1600 900.png|alt=Calyx logo|link=https://calyxos.org/ |
| GG Omidyar Network 1600 900.png|alt=Omidyar Network logo | | GG Omidyar Network 1600 900.png|alt=Omidyar Network logo|link=https://omidyar.com/ |
| GG Ford Foundation 1600 900.png|alt=Ford Foundation logo | | GG Ford Foundation 1600 900.png|alt=Ford Foundation logo|link=https://www.fordfoundation.org/ |
| GG Open Tech Fund 1600 900.png|alt=Open Tech Fund logo | | GG Open Tech Fund 1600 900.png|alt=Open Tech Fund logo|link=https://www.opentech.fund/ |
| GG Greenhost 1600 900.png|alt=Greenhost logo | | GG Greenhost 1600 900.png|alt=Greenhost logo|link=https://greenhost.net/ |
| GG Globaleaks 1600 900.png|alt=Globaleaks logo | | GG Globaleaks 1600 900.png|alt=Globaleaks logo|link=https://www.globaleaks.org/ |
| GG Equality Labs 1600 900.png|alt=Equality Labs logo | | GG Equality Labs 1600 900.png|alt=Equality Labs logo|link=https://www.equalitylabs.org/ |
| GG Freedom of the Press Foundation 1600 900.png|alt=Freedom of the Press Foundation logo | | GG Freedom of the Press Foundation 1600 900.png|alt=Freedom of the Press Foundation logo|link=https://freedom.press/ |
| GG Center for Digital Resilience 1600 900.png|alt=Center for Digital Resilience logo | | GG Center for Digital Resilience 1600 900.png|alt=Center for Digital Resilience logo|link=https://digiresilience.org/ |
| GG DRF Pakistan 1600 900.png|alt=Digital Rights Foundation Pakistan logo | | GG DRF Pakistan 1600 900.png|alt=Digital Rights Foundation Pakistan logo|link=https://digitalrightsfoundation.pk/ |
| Citizen Lab logo 1600 900.png|alt=Citizen Lab logo | | File:PartnersGlobal 1600 900.png|alt=PartnersGlobal logo|link=https://www.partnersglobal.org/ |
| GG Internews 1600 900.png|alt=Internews logo | | Citizen Lab logo 1600 900.png|alt=Citizen Lab logo|link=https://citizenlab.ca/ |
| GG Border Center For Journalists And Bloggers 1600 900.png|alt=Border Center for Journalists and Bloggers | | GG Internews 1600 900.png|alt=Internews logo|link=https://internews.org/ |
| GG Save Open Archive 1600 900.png|alt=Save by OpenArchive logo | | GG Border Center For Journalists And Bloggers 1600 900.png|alt=Border Center for Journalists and Bloggers|link=https://bordercenter.net/ |
| GG Privacy Lx 1600 900.png|alt=Privacy Lx logo | | GG Save Open Archive 1600 900.png|alt=Save by OpenArchive logo|link=https://open-archive.org/ |
| Digital Defenders Partnership logo.png|alt=Digital Defenders Partnership logo | | GG Privacy Lx 1600 900.png|alt=Privacy Lx logo|link=https://privacylx.org/ |
| ESOP logo.png|alt=ESOP logo | | Digital Defenders Partnership logo.png|alt=Digital Defenders Partnership logo|link=https://www.digitaldefenders.org/ |
| File:Horizontal logo.png|alt=Horizontal logo | | File:SMEX 1600 900.png|alt=SMEX logo|link=https://smex.org/ |
| File:Clean Insights Guardian Project 1600 900.png|alt=Clean Insights by the Guardian Project logo | | ESOP logo.png|alt=ESOP logo|link=https://esop.pt/ |
| File:Digital Security Lab Ukraine 1600 900.png|alt=Digital Security Lab Ukraine logo | | File:Horizontal logo.png|alt=Horizontal logo|link=https://wearehorizontal.org/index |
| File:Greatfire logo 1600 900.png|alt=Greatfire | | File:Clean Insights Guardian Project 1600 900.png|alt=Clean Insights by the Guardian Project logo|link=https://cleaninsights.org/ |
| File:EQualitie 1600 900.png|alt=eQualitie logo | | File:Digital Security Lab Ukraine 1600 900.png|alt=Digital Security Lab Ukraine logo|link=https://dslua.org/ |
| File:NUMUN_1600_900.png|alt=Numun Fund logo | | File:Greatfire logo 1600 900.png|alt=Greatfire|link=https://en.greatfire.org/ |
| File:Mozilla 1600 900.png|alt=Mozilla logo | | File:EQualitie 1600 900.png|alt=eQualitie logo|link=https://equalit.ie/ |
| File:APC_1600_900.png|alt=Numun Fund logo | | File:NUMUN_1600_900.png|alt=Numun Fund logo|link=https://numun.fund/ |
| File:Conexo 1600 900.png|alt=Conexo logo | | File:Mozilla 1600 900.png|alt=Mozilla logo|link=https://www.mozilla.org/en-US/ |
| File:D3_-_Defesa_dos_Direitos_Digitais_1600_900.png|alt=Defensa dos Direitos Digitais logo | | File:APC_1600_900.png|alt=APC Logo|link=https://www.apc.org/ |
| File:Article 19 1600 900.png|alt=Article 19 logo | | File:Conexo 1600 900.png|alt=Conexo logo|link=https://conexo.org/ |
| | File:D3_-_Defesa_dos_Direitos_Digitais_1600_900.png|alt=Defensa dos Direitos Digitais logo|link=https://www.direitosdigitais.pt/ |
| | File:Article 19 1600 900.png|alt=Article 19 logo|link=https://www.article19.org/ |
| | File:Yubico 1600 900.png|alt=Yubico logo|link=https://www.yubico.com/ |
| </gallery> | | </gallery> |
| '''Equity Fund Sponsors''' | | '''Equity Fund Sponsors''' |
| <gallery widths="160" perrow="5" mode="nolines"> | | <gallery widths="160" perrow="5" mode="nolines"> |
| File:Meta 1600 900.png|alt=Meta logo | | File:Meta 1600 900.png|alt=Meta logo|link=https://about.meta.com/ |
| File:Jigsaw 1600 900.png|alt=Jigsaw logo | | File: Jigsaw 1600 900.png|alt=Jigsaw logo|link=https://jigsaw.google.com/ |
| </gallery> | | </gallery> |
| <br>
| |
|
| |
| ==Circle Descriptions==
| |
| {| class="wikitable mw-collapsible"
| |
| !Circle Description
| |
| !Circle Description
| |
| |-
| |
| |<small>'''Activate the network:'''</small> <small>'''Collective training against Internet shutdowns'''</small>
| |
| |<small>We will explore how capacity building can empower activists and organizations to form effective coalitions in the fight against internet shutdowns. Join us to discuss strategies, share experiences, and debate the best approaches to promote resilience and coordinated action in contexts of digital censorship. This session aims to be a catalyst for inter-organizational collaboration, strengthening a global network united by the defense of online freedom.</small>
| |
| |-
| |
| |<small>'''Amplifying research on digital rights through popular culture'''</small>
| |
| |<small>How can research and digital rights organizations do more to democratize access to information about the future of digital rights? Researchers, technologists, journalists, activists, and creatives are invited to explore together the creative use of media to amplify information about privacy, safety, and the threats of the future. This includes discussing how we can cut through cynicism and apathy about digital autonomy, and how to use popular culture, including film, music, and social media, to put key safety and access information in front of more people.</small>
| |
| |-
| |
| |<small>'''Bridging the gaps between activists and hackers:'''</small> <small>'''How to talk with each other about security'''</small>
| |
| |<small>There is a lot of powerful, open security-related technology that remains known and used only to specialists and hackers - technology that could be used by journalists, activists and other persons with high security needs. However, there are many barriers between activist and hacker spaces, many of which are related to communication problems and lack of awareness of people's needs. As a hacker and UX developer, the facilitator will help lead the exchange of ideas and issues between these two communities.</small>
| |
| |-
| |
| |<small>'''Bridging the void:'''</small> <small>'''Deploying satellite solutions for isolated communities'''</small>
| |
| |<small>Explore the potential of satellite technology to bridge the gaps in isolated digital spaces. This circle will cover the technical, logistical, and regulatory landscapes of satellite deployment, offering a practical guide to implementing these solutions in censored and restricted environments.</small>
| |
| |-
| |
| |<small>'''Building a digital rights movement among the Francophone community'''</small>
| |
| |<small>During the very first Franchophone monthly meetup hosted by Team CommUNITY, facilitators identified the need to better coordinate efforts across French-speaking countries in Africa and the Middle East to identify patterns of digital threats. Many long-standing will meet in-person for the first time during this circle. However, other GG participants are invited to help continue building community-driven knowledge and strategize advocacy campaigns within the French-speaking digital rights community.</small>
| |
|
| |
| |-
| |
| |<small>'''Building a new privacy-preserving and decentralized messenger'''</small>
| |
| |<small>Join the Phoenix R&D team to discuss what the future of secure messaging might look like and what your needs are for messaging applications.</small><small>Phoenix R&D is currently building a new generation of open-source messenger combining privacy, security, and decentralization. It is based on a new standard for end-to-end encryption they co-authored (Messaging Layer Security protocol <nowiki>https://blog.phnx.im/rfc-9420-mls/</nowiki>) and a tech stack they have been developing.</small>
| |
| |-
| |
| |<small>'''Building the Asia digital rights community'''</small>
| |
| |<small>This circle is a networking-cum-strategizing space for digital rights defenders from Asia. It will be facilitated to establish cross-country networks and enable regional collaborations. In addition, participants will co-design strategies to effectively sustain the momentum in the Asia digital rights community; create more welcoming and engaging spaces; and identify ways in which more people can participate and be helped in their digital rights work in the region.</small>
| |
|
| |
| |-
| |
| |<small>'''ButterBox:'''</small> <small>'''Life without the internet made smoother'''</small>
| |
| |<small>Facilitators: Guardian Project, Digital Society of Africa, Colnodo</small><small>The ButterBox serves as a hotspot and ecosystem, offering curated apps, local encrypted chat, and the ability to share resources via USB. This year it has been deployed in various regions. Join this session to learn about various ButterBox use cases, see a demo demonstrating its functionality, and hear from field agents who implemented the ButterBox in diverse scenarios. This includes digital security trainings, sharing entertainment within apartment buildings, supporting indigenous offline communities, and preparing for internet shutdowns. There will also be time to brainstorm the future of Butter, where you can provide feedback on what you would like to see in the future.</small>
| |
| |-
| |
| |<small>'''Challenges in data-driven journalism'''</small>
| |
| |<small>Engage in a collaborative session that delves into the challenges and opportunities in data-driven journalism. Share experiences, tools, and techniques that aid journalists in uncovering and narrating impactful stories through data.</small>
| |
|
| |
| |-
| |
| |<small>'''Co-leadership for sustainable organizations'''</small>
| |
| |<small>Co-leadership is an innovative model to enable sustainability, allowing for alternatives to single-leadership, distributing power and decision making within organizations. Learn about how this approach helps center trust, mutual care, and collaboration, while uplifting the differences in lived experiences. In addition, why its critical to fostering organizational resilience and wellbeing. The Engine Room will also share their experience implementing this co-leadership model, and the experience of other participant's reflections on their journey towards co-leadership models. Participants will also discuss how this model can impact equity, collaboration, wellbeing, funder relations, remote work, decision-making, and strategy setting. Space will also be provided to surface skills, knowledge, practices to be cultivated, and how we can collectively support each other.</small>
| |
| |-
| |
| |<small>'''Countering digital authoritarianism and online repression in Central Asia'''</small>
| |
| |<small>In Central Asia, digital rights are facing a significant decline as governments introduce restrictive laws targeting independent media, journalists, bloggers and anti-corruption reporters. Online freedom is increasingly being curtailed by surveillance and privacy crackdowns. The circle brings together leading media lawyers and human rights activists from the region to address these pressing issues.</small>
| |
| |-
| |
| |<small>'''CTRL + ALT + DEL:'''</small> <small>'''Learnings on movement building from the digital rights Asia-Pacific assemblies'''</small>
| |
| |<small>What comes next after two Digital Rights Asia-Pacific (DRAPAC) Assemblies in Chiang Mai, Thailand, and Taipei, Taiwan? This Circle is open to anyone who wants to discuss how the digital rights movement in the Asia-Pacific can continue to:</small> <small>1</small> <small>Empower peoples across Asia-Pacific to regain control of our civic spaces, fundamental rights, social platforms, and digital technology from the dominance of big tech and interference by the state.</small> <small>2. Platform innovative alternatives in approaching and strategizing human rights advocacy in Asia-Pacific by centering local grassroots communities and strengthening networks across borders.</small><small>3. Shift our thinking and culture towards more open, inclusive, and participatory decision-making processes and governance structures within the regional digital rights movements.</small>
| |
| |-
| |
| |<small>'''Current blocking trends:'''</small> <small>'''How states in different countries do it'''</small>
| |
| |<small>Participants will discuss current trends in the field of government blocking and censorship on the Internet. Together they will examine the methods used by governments to control and restrict access to information online, as well as discuss the challenges facing users and technology companies. Topics for discussion</small><small>1. Current trends in government blocking: analysis of recent events and changes in censorship policies in various countries.</small><small>2. Methods of implementing censorship: studying the technologies and methods used by states to block access to certain resources and services on the Internet.</small><small>3. Impact on Freedom of Information: The implications of government censorship for freedom of speech, human rights, and the development of the Internet community.</small><small>4. Development prospects: the search for new approaches to bypassing blocking and protecting user privacy, as well as the role of technology companies in this process.</small>
| |
| |-
| |
| |<small>'''Design sprint for everyone: Simple steps in building bite-size digital security tip cards'''</small>
| |
| |<small>If you wonder how to create engaging and clear digital security tips and how-tos that you can share easily with people online? The Human Rights Centered Design community invites you to this hands-on workshop to take simple steps and tools to build visually appealing info cards, infographics, and presentations to spice up your conversations with diverse communities and add fun to knowledge sharing. You will take away some design tricks and pros and cons for aiding tools, as well as a new communication toolkit by Superbloom to streamline your creative process. Organizers: The Human Rights Centered Design Community, The Calyx Institute, SuperBloom</small>
| |
| |-
| |
| |<small>'''Developing robust signalling channel'''</small>
| |
| |<small>Participants will explore strategies around new signalling channels that might be able to help censored users get essential information to make anti-censorship connections.</small> <small>Users in highly censored regions face difficulty gaining access to anti-censorship tools given that they are prime targets of blocking by censors.</small> <small>A signalling channel is a highly available (i.e., difficult for censors to block), method of communication, typically low-bandwidth, that aims to provide users access to more robust anti-censorship tools. In most cases, a user makes a request to a signalling channel and gets a response that includes secret keys and/or addresses of proxies or bridges for users to make a censorship-resistant connection. Despite the existence of many censorship-resistant tools, options for signalling channels are limited. With many cloud providers opting to discontinue support for domain fronting.</small>
| |
| |-
| |
| |<small>'''Developing stories and talking points to support fundraising'''</small>
| |
| |<small>Storytelling, explaining your work succinctly, and differentiating your program from others are all critical to fundraising successfully. In this circle, participants will go through best practices in these tools and practice communicating their impact for potential funders.</small>
| |
|
| |
| |-
| |
| |<small>'''Digital challenges for journalists and activists during the conflict'''</small>
| |
| |<small>Journalists and activists in Eastern Europe are vulnerable during conflicts because of their coverage of difficult societal topics, which ultimately makes them targets. Participants will discuss digital risks and threats these Eastern European activists and journalists face during conflicts, including exploring</small> <small>common threats, and possible common solutions for security specialists.</small>
| |
| |-
| |
| |<small>'''Digital Iran reloaded:'''</small> <small>'''Gamers’ circumvention tactics in the IRI'''</small>
| |
| |<small>Participants will discuss current circumvention methods used by gamers in Iran, how methods could be improved based on preliminary findings in the field.</small>
| |
|
| |
| |-
| |
| |<small>'''Digital rights after the fall:'''</small> <small>'''What should we do with the digital heritage of a dictatorship'''</small>
| |
| |<small>When modern digital dictatorships fall, they will leave behind an all-inclusive digital police state system, as well as the possibility of the next political system to repeat the same mistakes using inherited tools. In this collaborative discussion, participants will talk about the use of digital tools by the Russian government, and their future. What data should be deleted forever? What systems will require strong policies governing their usage? What should we not be afraid to use for the good of the people? This is our call for help for participant’s collective imagination, hope, and creativity, as well as knowledge, and experience</small>
| |
| |-
| |
| |<small>'''Digital Rights in Portugal:'''</small> <small>'''Where do we go from here'''</small>
| |
| |<small>A get-together for Portugal-based digital rights orgs and activists to sit down, share their struggles and achievements, establish bonds and think up what we can accomplish together.</small>
| |
|
| |
| |-
| |
| |<small>'''Digital Security Providers in Eastern Europe:'''</small> <small>'''New Solutions to Familiar Challenges?'''</small>
| |
| |<small>This circle is for those wanting to support digisec work in Eastern Europe, South Caucuses and beyond. Learn about the most recent findings examining the work of digital security (digisec) specialists in Armenia, Azerbaijan, Belarus, Georgia, Moldova, and Ukraine. They are a result of an annual assessment, carried out by the community since 2021, which</small> <small>focuses on the work environment, demand for digisec services within local civil society, security of digisec specialists and formats of their services, availability of resources, and other aspects essential to their work.</small> <small>Current findings in each country will be compared with both old and emergent trends being observed across the region, as well as the results of the annual assessment</small><small>s</small> <small>conducted in 2021, 2022, and 2023.</small> <small>Also discussed will be efforts to</small> <small>support the digisec community, build the capacity of its members, and potential solutions.</small>
| |
| |-
| |
| |<small>'''Digital threats in the Arab speaking countries'''</small>
| |
| |<small>This circle is for the Arab speaking countries to share their knowledge of the current threats and issues, including direct digital security threats, such as attacks and censorship, and tactics such as laws, police asking people to unlock their phones, etc. Participants will help map current issues in the region, and collect intel and responses, and, if time permits, define and suggest actions to address the gap between supply and demand.</small>
| |
| |-
| |
| |<small>'''Discriminatory UX:'''</small> <small>'''How software can gatekeep people'''</small>
| |
| |<small>Many initiatives are built on powerful and usable software that we use every day. But what happens when software tools keep us from being included based on disabilities, citizenship or language skills? Participants will discuss tools they use for their work, and the issues they are facing.</small>
| |
| |-
| |
| |<small>'''Echoes of Isolation:'''</small> <small>'''Gathering First-Hand Accounts from Fragmented Networks'''</small>
| |
| |<small>Participants are invited to share, analyze, and reflect on personal accounts, weaving a rich tapestry of stories that highlight the human dimension of digital fragmentation.</small>
| |
| |-
| |
| |<small>'''The case of El Salvador:'''</small> <small>'''strengthening civil society and media through capacity-building in a fragmented country'''</small>
| |
| |<small>Participants will learn about the capacity-building program being run in El Salvador for CSO's and independent media outlets in the middle of surveillance and repression by the current government.</small>
| |
| |-
| |
| |<small>'''Exchanging feminist methodologies, politics and practice in capacity building and feminist technology'''</small>
| |
| |<small>This circle is for folks who identify as feminist tech trainers and feminist movement facilitators. Come learn about different approaches and methodologies to learning spaces, and why creative</small> <small>methodological approaches are so critical in shaping caring, collective and engaged training spaces.</small> <small>The internet can be, for many activists and marginal identities, a space of violence, surveillance and constantly evolving and confusing technologies. Come share and learn from a place of care, fun, creativity, awareness of the diversity of contextual realities and the knowledge of the trauma people carry.</small> <small>Learn about how to r</small><small>espon</small><small>d</small> <small>with methodologies that speak to challenging hiera</small><small>r</small><small>chies in training spaces and</small> <small>how to</small> <small>be agile and creative</small> <small>-</small> <small>cornerstones of learning spaces for feminists.</small>
| |
| |-
| |
| |<small>'''Fostering diversity and inclusion in Open Source Projects'''</small>
| |
| |<small>Join this engaging discussion on how diversity and inclusion influence every aspect of open source projects. Learn from others' experiences and insights on creating a welcoming and equitable open source community based on conversations with open source projects under Next Generation Internet Zero (NGI0) initiative. While code is crucial, the management of open source projects, the diversity of contributors and users, selection of communication channels and transparency among others are equally important.</small>
| |
| |-
| |
| |<small>'''From wristbands to smartphones:'''</small> <small>'''Designing for physical safety!'''</small>
| |
| |<small>In this engaging hands-on workshop, Circulo and Natalia Project will share their firsthand experience designing technology and initiatives focused on physical safety. This workshop will provide a space for participants to discuss their strategies for safeguarding themselves and their networks in the field. Let's circle up and collaborate to enhance our collective knowledge about safety protocols and the features technology can embrace to boost safety. Circle Facilitators: Okthanks, Guardian Project, Civil Rights Defenders</small>
| |
| |-
| |
| |<small>'''GenAI & LLMs in COMO & TS: Where do human rights and communities fit in today’s hottest acronyms?'''</small>
| |
| |<small>In this circle, participants will explore the human rights impacts of Generative AI (GenAI) and underlying technologies, such as foundation models or large language models (LLMs), on content governance. As AI-driven platforms increasingly rely on these technologies for content governance, they risk unintentionally suppressing legitimate content while fueling violence online, disproportionately affecting marginalized groups and those living in the Global Majority. Learn about</small> <small>how these systems are deployed in the Global Majority, where considerations of local language, context and cultural nuances are critical, e.g., during elections in fragile democracies or in conflict zones.</small> <small>In addition, a case study</small> <small>on Discord will be presented, as the platform is currently piloting ECNL’s framework for meaningful engagement in AI while developing LLMs for enforcing content moderation policies.</small>
| |
| |-
| |
| |<small>'''Growing support for FOSS sustainability'''</small>
| |
| |<small>This Circle brings together FLOSS funders who will share their approaches to funding sustainability for human rights FOSS projects, learn from participants about the sustainability challenges their projects face, and explore ways that the funding ecosystem can be more responsive to their needs.</small> <small>Free and open source code is the foundation for the technology that human rights defenders, activists, journalists, and other at-risk communities rely on to access the internet and communicate safely and securely. Despite the critical role they play, many FOSS projects struggle to find funding that supports their long-term sustainability. The essential, day-to-day bug-squashing, security updates, community management, and operational activities needed to maintain reliable and secure technologies are either squeezed into new-feature proposals, or too often left unfunded altogether.</small> <small>More funders are stepping up to address this challenge.</small>
| |
| |-
| |
| |<small>'''Guardians of Change: Strengthening cybersecurity in civil society'''</small>
| |
| |<small>Civil society organizations (CSOs) play a pivotal role in driving positive change in today's interconnected world. However, CSOs' impact can be hindered by cybersecurity threats. This circle aims to empower civil society leaders and activists with the knowledge and tools to bolster their cybersecurity defenses. Through discussions on emerging threats, best practices in digital security, and practical tips for implementation, participants will leave equipped to safeguard their organizations and advance their missions securely in the digital age. Join us in becoming the Guardians of Change in the fight to strengthen cybersecurity within civil society.</small>
| |
| |-
| |
| |<small>'''Horse before the cart: Empowering change with representative local data'''</small>
| |
| |<small>Digital rights and IF programs will continue to be a vital lifeline amid the proliferation of censorship and surveillance technologies, and declining internet freedom year after year. This brings essential reflections into focus: Are these crucial programs of tomorrow (and the decades beyond) prepared? Do they appropriately address community needs and priorities? How do we ensure that local voices are represented in our program goals and activities? If our future work is to impact local populations at a significant scale, it necessitates working from a deep understanding of the communities we endeavor to help. Participants will discuss how program management can synergize - not just intersect - with audience research and impact assessment insights that help us understand, and bring into focus, local priorities for future change.</small>
| |
| |-
| |
| |<small>'''How do we get the internet we want?:'''</small> <small>'''Feminist provocations and questions for Internet governance'''</small>
| |
| |<small>The current moment is a reckoning at a global level on internet governance. The power of technology companies has been growing unabated, in spite of the existence of processes for internet governance. This year marks 20 years of the World Summit of Information Society and in 2024, the Global Digital Compact has been introduced by the United Nations for establishing shared principles for digital cooperation and governance worldwide. All these processes forefront inclusion and multistakeholderism, but the lived experience for most activists from a marginalised location has been of inaccessibility and opacity. What is needed right now is a coming together through spaces like the Global Gathering, to determine feminist, queer and radical perspectives on internet governance and more active engagement.</small> <small>As part of the background for this panel, please check out: Preliminary feminist provocations on internet governance and WSIS+20 https://giswatch.org/node/6358/</small>
| |
| |-
| |
| |<small>'''How to stop promising/doing audits and start promising/doing what is actually needed'''</small>
| |
| |<small>Trainings, ToTs, Checklists, Audits - why is our fixation on formats so obsessive? The vicious circle "Applications writers - Donors - Practitioners - CSOs (clients)" makes us to forget what we actually wanted to help to provide real assistance. Not "X audits for $Y money within 12 months" - but real help.</small><small>Let's think together and discuss how could we (practitioners) communicate with applications writers donors and CSOs - in the end to make the programs/projects to reflect what is actually needed a real help instead of "audits/trainings/ToTs/etc".</small><small>I hope to have a honest relaxed conversation"</small>
| |
| |-
| |
| |<small>'''Identifying AI-Generated content: how?'''</small>
| |
| |<small>Join us to discuss the issue of the identification of AI-Generated Content!</small> <small>How and when should we try to implement it? Whose responsibility should it be? How should it be regulated? Is it technically feasible to do it? How will it impact online content sharing, trust, privacy and the safety of civil society?</small><small>We'll talk about everything - join us!</small>
| |
| |-
| |
| |<small>'''Incident response working group'''</small>
| |
| |<small>The Incident Response Working Group is an ongoing series of meetings between censorship circumvention tool developers, human rights workers, and help desk administrators to discuss how to better respond to incidents of escalated blocking and Internet shutdowns. The group discusses what barriers exist to collaboration and coordination among multiple stakeholders through structured workgroup sessions. The goal is to help end users get back online faster by reducing the time to detect incidents, develop mitigations, and deploy those mitigations to end users.</small>
| |
|
| |
| |-
| |
| |<small>'''Is it time to create certification for digital security practitioners?'''</small>
| |
| |<small>There's a growing community of digital security practitioners, who work with the civil society and are often funded by charities and grants. These practitioners often have varying degrees of competence, and sometimes, if they are not technically competent enough, they might do more harm than good. It would seem that establishing some sort of a certification for such practitioners could be a good idea, but there are both positive and negatives. Join this circle to explore these open questions.</small>
| |
|
| |
| |-
| |
| |<small>'''Rising Digital Authoritarianism in South Asia'''</small>
| |
| |<small>This session will explore the alarming rise of digital authoritarianism in South Asia. Participants will examine trends such as internet shutdowns, online censorship, increased surveillance, and the suppression of privacy rights and freedoms of speech and expression. Additionally, participants will discuss the significant challenges faced by human rights defenders, both inside and outside the courts, in their broader efforts to resist digital authoritarianism.</small>
| |
| |-
| |
| |<small>'''Journalists, sources and whistleblowers:'''</small> <small>'''Increasing threats to press freedom'''</small>
| |
| |<small>Journalists, researchers, advocates and whistleblowers holding public and private malign interests accountable are encountering insidious attempts to deter, undermine and silence their work. These attempts are less obvious, less visible and harder to explain to the public than overt tactics like jailing unfriendly journalists, barring foreign outlets or promoting state-controlled propaganda, but they are effectively eroding press freedom, free speech and accountability. Looking at examples of malign donor influence silencing academic research, killing unfavorable media stories, lawfare against journalists and media outlets - compounded by retaliation against whistleblowers and the aggressive use of NDA’s - Libby Liu, Arzu Geybulla and Naomi Seligman will share insights from recent whistleblower cases and convene a conversation on what these tactics look like around the world.</small>
| |
| |-
| |
| |<small>'''Knowledge sharing across circumvention tool providers and Outline SDK users around the world'''</small>
| |
| |<small>In the ever-changing censorship environments, tool providers and content providers must adopt new circumvention technologies at a faster pace. In this circle, we will host a discussion about the situation of censorship circumvention work in different regions (e.g, what are some unmet needs right now, how are censors getting ahead of the cat-and-mouse games, and what are some lessons learned); at the same time, we invite tool providers that have integrated Jigsaw’s Outline to share their experience about how the technology is performing in different regions.</small>
| |
| |-
| |
| |<small>'''Law and policy for IBSA'''</small>
| |
| |<small>Participants will share their thoughts on the current state of law and policy protection against Image Based Sexual Abuse, and to identify measures that platforms and governments can take to address the concern effectively with minimal harm to encryption, freedom of speech and abuse by procedure.</small>
| |
| |-
| |
| |<small>'''Let’s ATT&CK the complexity of threat information sharing'''</small>
| |
| |<small>Participants will discuss how threat sharing platforms and frameworks can be made more relevant to the specific threats faced by civil society, journalists, and human rights defenders and more accessible to digital security providers. As many frameworks, such as MITRE ATT&CK, were developed for large enterprises, they do not reflect the on-the-ground reality of serving at-risk communities. Learn about new framework for sharing threat information (including tactics, techniques and procedures in addition to indicators of compromise) between digital defenders supporting CSOs, journalists, and HRDs as well as with the wider cybersecurity community. This Circle will provide a space for digital defenders to contribute peer review to these new framework while identifying opportunities for supportive incentives and positive feedback loops to enhance threat sharing.</small>
| |
| |-
| |
| |<small>'''Leveraging weblate and automated checks for higher quality localization.'''</small>
| |
| |<small>Participants will share best practice on localizing Internet Freedom applications and learn about how Tor Project migrated from Transifex into Weblate, a free software project.</small>
| |
| |-
| |
| |<small>'''Make it worse:'''</small> <small>'''Help us build the creepiest shutdown simulator'''</small>
| |
| |<small>Engage in a challenge aimed at creating the most dystopian shutdown scenario. This circle is a collective exercise in understanding the extreme edges of digital isolation, encouraging participants to imagine and construct the architecture of a comprehensive shutdown simulator.</small>
| |
| |-
| |
| |<small>'''Maximizing engagement in your digital literacy workshop through gameplay'''</small>
| |
| |<small>Teaching new concepts and skills to adult learners can be tricky business; we all have a million tasks on our to-do lists. Gaining and sustaining the attention of your workshop participants requires a wide variety of strategies. This circle will debut a new card game explicitly designed to teach fundamental data privacy skills to workshop participants and individual groups of learners through a bespoke card game. In addition, participants will learn about experiences developing new games, and help invent a new a game!</small>
| |
| |-
| |
| |<small>'''Nowhere feels safe:'''</small> <small>'''Digital transnational repression against women human rights defenders in exile'''</small>
| |
| |<small>Repressive governments use invasive surveillance, online harassment and defamation campaigns to reach across borders and threaten women activists in exile and diaspora communities. What are the methods and silencing effects of gender-based digital transnational repression? How can we defend and empower the individuals and communities at risk? This circle discusses the findings of the Citizen Lab’s research into digital threats against women human rights defenders living in exile or in the diaspora and seeks input on recommendations for measures of protection and risk mitigation for targets of digital transnational repression.</small>
| |
| |-
| |
| |<small>'''On selective protection and regulations:'''</small> <small>'''TFGBV and hate speech against gender and sexual rights defenders'''</small>
| |
| |<small>The Feminist Internet Research Network (FIRN) brings together feminist researchers and civic society organisations from the Global South to produce evidence and context-based analysis in issues such as access; algorithmic inequality and surveillance; online gender-based violence; and gendered labour in the digital economy. In this Circle, participants will share insights on governments’ and technology organisations’ preferences and selective attention when dealing with online and technology-facilitated violence; and the role of gender and sexual politics in this process.</small>
| |
| |-
| |
| |<small>'''The MENA Alliance for Digital Rights'''</small>
| |
| |<small>The MENA Digital Rights Alliance is a civil society coalition advancing digital rights in the Middle East and North Africa region. We are a group of 12 local and global civil society organizations and activists who believe in the power of collective action and cross-border solidarity in the fight against rising digital authoritarianism. We’ll delve into current and emerging regional trends, threats and opportunities, create shared priorities, and strategize on potential joint advocacy and campaigning. This Circle will set our strategic plan and focus areas for the upcoming year and discuss each other's work. We want to set shared priorities to create joint efforts and advocacy campaigns.</small><small>The MADR meets already every month, online. This meeting will be a continuity of our yearly in-person meetings.</small> <small>These in-person convenings are to set an agenda for the year and they do participate in building momentum for the alliance's advocacy efforts.</small>
| |
| |-
| |
| |<small>'''Rapid response to internet censorship:'''</small> <small>'''How can we do better?'''</small>
| |
| |<small>Participants will discuss how we can do better in building capacity for rapid response to internet censorship. They will focus on collecting</small> <small>best practices and discuss how we can foster collaborations between network measurement projects, civil society organisations, litigation networks and media organisations.</small>
| |
| |-
| |
| |<small>'''Reflecting on surveillance studies research methodologies:'''</small> <small>'''The good, the bad and the ugly'''</small>
| |
| |<small>The rising tide of authoritarianism has led to an increased uptake of suppressive surveillance by governments across the world. Many dedicated researchers and other internet freedom community members have worked to understand and counter repressive surveillance tactics through several different methodologies, including network measurement, supply chain, forensics, and ONSINT. This circle will be for learning the challenges the researchers face, and learning the gaps in surveillance-research funding.</small>
| |
| |-
| |
| |<small>'''Reimagination of freedom: Digital rights and kinship through "The Ground Screams to Whisper Ancestral Mapping"'''</small>
| |
| |<small>This Circle will explore how the ancestral mapping exercise from "The Ground Screams to Whisper" can serve as an innovative approach to addressing digital rights abuses exemplified by services like 23andMe. Participants will engage in a collaborative discussion on the intersections of digital rights personal data sovereignty and the importance of kinship and community in the digital age. Participants will delve into the potential of using arts and crafts-based ancestral mapping as a means to reimagine freedom and privacy in the context of digital rights.</small>
| |
| |-
| |
| |<small>'''Resilient Nnetworks:'''</small> <small>'''Hosting federated services in adversarial conditions'''</small>
| |
| |<small>A hands-on workshop addressing the deployment and sustainability of federated services in adversarial conditions. Participants will learn to navigate the complexities of maintaining decentralized networks in spaces of surveillance and restriction, drawing on real-world examples and practical techniques.</small>
| |
| |-
| |
| |<small>'''Return of the zines:'''</small> <small>'''A hands-on approach to censorship circumvention'''</small>
| |
| |<small>More people are online than ever before. But because of increasing levels of censorship, fewer people seem to share the same online experience as populations. In this circle, participants will revisit a pivotal era when photocopiers were revolutionary tools in a fight for access to platforms and audiences. In this hands-on workshop on zine-making, participants will delve into the contemporary power of zines to promote peer-to-peer content sharing. Together, participants will discuss how this grassroots strategy can expand publishers' reach and enhance news consumers' access to information, especially in today's restricted internet environments.</small>
| |
| |-
| |
| |<small>'''Running Tor relays in/by the Global South'''</small>
| |
| |<small>Tor relays form the backbone of the Tor network, and they are run by volunteers from around the world. Without volunteers Tor would not be possible, however the majority of volunteers are located in the Global North. We need to further (and perhaps genuinely) decentralize the Tor network, and so in this Circle we will talk about how to run Tor relays in our own contexts, and why it matters for the future of privacy.</small>
| |
| |-
| |
| |<small>'''Safeguarding NGOs and digital rights organizations: Tackling insider threats and beyond'''</small>
| |
| |<small>Security directors from HRW, Access Now, AI, and other NGOs will tackle the issue of insider threats, focusing on their impact on non-profits and digital rights organizations. With participants, they will define insider threats, discuss the unique risks they pose, especially during crises and events, and provide practical examples from the field, and touch on the broader threat landscape.</small> <small>Participants will engage in an open discussion to share their experiences and strategies for managing insider threats, both physical and digital.</small> <small>In addition, participants will engage in a</small><small>n</small> <small>exercise developing realistic scenario-based training to better equip</small> <small>their</small> <small>team</small><small>s</small><small>. Leave with</small> <small>concrete solutions and resources to strengthen your organization's security against insider threats such mitigation strategies, including robust access controls, cybersecurity measures, and scenario-based trainings.</small>
| |
| |-
| |
| |<small>'''Safety for voices:'''</small> <small>'''South-South strategies for WHRDs in digital spaces'''</small>
| |
| |<small>Acknowledging that the threats and attacks targeting women and gender-diverse human rights defenders (WHRDs) in the digital sphere are an extension of patriarchal, racist, and colonial systematic violence, this circle seeks to establish a platform for critical reflection rooted in South-South collaboration. Participants will learn about two studies aimed at documenting the patterns of violence and the tools of resistance employed by WHRDs within their territories. Participants will also share experiences and the development of collective strategies to safeguard their voices. Grounded in a holistic feminist protection approach, the circle aims to foster solidarity and resilience among WHRDs facing digital threats.</small>
| |
| |-
| |
| |<small>'''Securing the digital frontline: Threat analysis for human rights defenders in Thailand and Vietnam'''</small>
| |
| |<small>In this Circle, participants will recent research findings related to digital security risks for human rights defenders in Thailand and Vietnam, as well as the physical threats that lead to these risks. Explore effective protection mechanisms, share lessons learned, and discuss strategies to enhance the safety and resilience of digital advocates in these regions.</small>
| |
| |-
| |
| |<small>'''Shield or Sham:'''</small> <small>'''How useful are digital security trainings?'''</small>
| |
| |<small>This circle aims to dive into a critical examination of digital security training’s role in strengthening resilience and threat resistence of journalists, human rights defenders and marginalized groups. Do trainings work? can traditional security trainings keep up with the sophisticated tactics of cybercriminals, in particular when they are state-sponsored? Are trainings equipping individuals and organizations with the necessary tools to better protect themselves, or are they providing a false sense of security? And if trainings do not work, what is the alternative? This circle seeks to explore the effectiveness of digital security trainings in fostering a culture of cyber resilience versus their potential to please donors and funding trends and presenting an “easy fix” to a complex problem.</small>
| |
| |-
| |
| |<small>'''Strategic litigation reimagined for justice'''</small>
| |
| |<small>Strategic litigation is an essential tool for advancing human rights in the digital space and holding corporations and governments accountable. P</small><small>articipants</small> <small>will</small> <small>discuss</small> <small>the prioriti</small><small>zation</small> <small>and fund</small><small>ing</small> <small>of</small> <small>legal cases that centralise the needs of communities most impacted by digital rights violations from an intersectional approach.</small> <small>Parti</small><small>c</small><small>ipants will c</small><small>ollectively imagine a future that prioritises racial, social, economic and environmental justice.</small>
| |
| |-
| |
| |<small>'''Supporting disrupted media'''</small>
| |
| |<small>Media organizations are facing fundamental disruption after a decade of over-reliance on algorithmic amplification. In response, a new group of media entrepreneurs is emerging, focusing on meeting community needs. This conversation will explore the intersection of technology and media strategy, examining the challenges and opportunities in this evolving landscape. Participants will discuss the impact of algorithmic amplification on traditional media, the rise of community-focused initiatives, and the potential for innovation in the industry. We'll consider how emerging technologies and changing consumer behaviors are reshaping media business models, and what this means for the future of information dissemination and community engagement.</small>
| |
| |-
| |
| |<small>'''Supporting Asian HRDs in the frontline :'''</small> <small>'''How we shape the local supporting system and model'''</small>
| |
| |<small>Participants will hear from three Asian digital security supporting groups on their experiencing developing service models that reflect their local socio-political environments and threats. Based on these sharings, participants will discuss how to find the resources grow support work in their locality and region.</small>
| |
| |-
| |
| |<small>'''Sustainable self-hosting?'''</small>
| |
| |<small>As Big Tech services continue to be enshittified, made costly, or become untrustworthy, self-hosting is an increasingly attractive option. But sustainable, long-term self-hosting can be difficult. It can be expensive, require lots of effort, come with numerous risks and burnout. Participants will share their experiences self-hosting, and explore available tools, best practices, and support networks. They will also map out what is missing.</small>
| |
| |-
| |
| |<small>'''Tactics for engaging tech stakeholders in digital rights advocacy. The experiences and future opportunities across Indo-Pacific region.'''</small>
| |
| |<small>Indo-Pacific is a critical region for global security and economy; yet, civil society in the region faces multiple challenges from digital authoritarianism. These challenges cannot be addressed by one group or a single expertise alone. In this circle, participants will hear from CSOs in the region and the lessons they have learned. In addition, participants will explore strategies to fill current gaps.</small>
| |
| |-
| |
| |<small>'''Technology, data and elections:'''</small> <small>'''The role of data and technologies in electoral processes'''</small>
| |
| |<small>There is an unprecedented number of elections happening in 2024. In this circle, participants will discuss government usage of data-intensive technologies - which goes hand-in-hand with the involvement of private companies - during election cycles. Participants will discuss risks involved, and what can be done to avoid the abuse of technologies during the election cycle? This includes biometric voter registration and e-voting and verification technologies, which often result in the development of nationwide databases containing masses of personal data and technologies that put privacy and electoral integrity at risk; and technologies that are redefining political campaigning and advertising practices. What can be done to prevent the manipulation of opinion through these measures, which also many times exclude voters.</small> <small>Collaborators: Privacy International, The Digital Rights Foundation (Pakistan), Fundacion Karisma (Colombia), Derechos Digitales (Chile), R3D (Mexico)</small>
| |
| |-
| |
| |<small>'''Testing OuiSync for shutdown scenarios'''</small>
| |
| |<small>This circles is dedicated to testing Ouisync in simulated shutdown conditions. Ouisync is a p2p file sharing tool developed by eQualitie. Participants can test the app, providing critical feedback and insights to enhance its robustness and efficacy in real-world applications.</small>
| |
| |-
| |
| |<small>'''The costs of protection:'''</small> <small>'''The global landscape for data privacy and security tools'''</small>
| |
| |<small>In this circle, participants will Identify the best and most useful tools (commercial or open source) available in their region, languages, and cultural context for meeting regional digisec/privacy needs. They will also discuss how</small> <small>existing tools or strategies could be modified/expanded to make them available to users in more parts of the world.</small> <small>Lacking effective national data privacy policies, individual internet users who want to protect their digital privacy and security often need to install and use VPNs, ad blockers, password managers, mail clients, or services like DeleteMe to protect their PII.</small> <small>These solutions are frequently recommended by digisec experts, but for citizens in the Global Majority, using these tools is often hindered by social, political and economic factors, including costs, exchange rates, credit card requirements, the quirks of banking systems, or the fact that interfaces, documentation, and the apps themselves are designed for the English-speaking market.</small>
| |
| |-
| |
| |<small>'''The future of decent work in the planetary digital capitalism:'''</small> <small>'''AI, automation and digital platforms'''</small>
| |
| |<small>This circle aims to generate dialogues and discussions around the future of work in the dawn of generative Artificial Intelligence, the automation of intellectual work and the increasing platformization of the economy. These developments have the potential of reshaping the planetary economy, imposing additional risks on human rights, but most importantly they challenge the work itself of digital rights defenders, policy makers and academics. This circle offers a scenario to discuss if we should adapt or resist these technologies, and both the tactics and strategies that should arise.</small>
| |
| |-
| |
| |<small>'''The how and why of Rapid Response'''</small>
| |
| |<small>We are often expected and incentivized to rapidly respond to censorship events and we want to. But at what cost? How can we respond in ways that are generative and beneficial? Is there a useful entropy we should introduce to rapid response?</small>
| |
| |-
| |
| |<small>'''The LLephant in the RooM: What are we doing about AI?'''</small>
| |
| |<small>AI is no longer avoidable, and has crept quickly yet steadily out of mere pop phenomenon into the reality of how many of us operate as mission-driven, public interest organizations. Participants will discuss their fears, blind spots, and hopes for ethical and helpful interactions with these systems as the world moves increasingly forward with them. In addition, they will explore what could be done to address AI's impact on confidentiality, the integrity of our research (i.e. code, fuzzing, security), public communications, internal organizational security, and other aspects?</small>
| |
| |-
| |
| |<small>'''The Real ESCAPE GAME:'''</small> <small>'''1 Hour to Break Out of the Splinternet!'''</small>
| |
| |<small>An immersive, interactive challenge where participants must collaboratively navigate and escape a simulated splinternet. This circle synthesizes the learnings of SplinterCon, testing participants’ problem-solving abilities and resilience under pressure in a gamified format.</small>
| |
| |-
| |
| |<small>'''Tools of Resistance: Showcase of existing solutions and open mic for new projects'''</small>
| |
| |<small>A deep dive into the evolving arsenal of tools designed to navigate and subvert the splinternet. Participants are invited to not only explore established solutions but also to present nascent projects and innovative ideas. This circle fosters the sharing of insights and the co-creation of resilient digital strategies.</small>
| |
| |-
| |
| |<small>'''Tor Browser, Tails, and You'''</small>
| |
| |<small>How do Tails and the Tor Browser currently fit into the digital security toolbox for your communities? How could they become more helpful in that toolbox? Come and discuss it with the Tor Applications Team and the Tails Team.</small>
| |
| |-
| |
| |<small>'''Updates about Tor and Tails'''</small>
| |
| |<small>Come and hear updates regarding the future of Tor and Tails.</small>
| |
| |-
| |
| |<small>'''VPN Infrastructure: Challenges & needs'''</small>
| |
| |<small>In the community multiple VPN providers are active. As infrastructure provider we try to offer the best available. In this circle we want to share working experiences, missing links and other ideas to better accommodate infrastructure for VPN providers.</small>
| |
| |-
| |
| |<small>'''VPN provider transparency:'''</small> <small>'''Addressing threats that shady VPNs pose to VPN clients and providers'''</small>
| |
| |<small>Participants will learn about threats VPN clients and providers face from the myriad of VPN apps distributed on Google Play and elsewhere, and hear from current researchers looking at suspicious VPN providers and including potential links to malicious actors. Participants will</small> <small>explore current gaps in understanding VPN related threats, map out new issues and challenges, and explore opportunities and solutions to address them.</small>
| |
|
| |
| |-
| |
| |<small>'''What are your operations and admin challenges?'''</small>
| |
| |<small>When it comes to operations and finances, what are the hardest things for you as a civil society activist in the internet freedom space? We want to know! We’re building an organisation, interalia, aimed at lowering the operations barriers for civil society with equity and care at its heart – let us worry about admin, so you don’t have to. We have plenty of experience working in this field, but we’d love to hear about your specific struggles, questions, and challenges. How can we help as intermediaries providing a layer of care and security for you?</small>
| |
|
| |
| |-
| |
| |<small>'''Why is threat sharing hard, and what could it look like instead?'''</small>
| |
| |<small>When we imagine the outcomes of sharing data on digital attacks, what do we most want to see in the world? What is holding us back, and can we dream big enough to make change? Join us this circle and step outside the day-to-day operational practice of our organizations, to think about the theory of change of more inclusive and effective collective action, develop user stories for what successful threat sharing ecosystems and capabilities might look like, and plan with others who share our goals.</small>
| |
| |-
| |
| |<small>'''Working on the well-being of workers'''</small>
| |
| |<small>Let's talk about policies for the well-being of workers andhow to build democratic processes within the organization.</small>
| |
| |-
| |
| |<small>'''World-wide autonomous comunication over HF band'''</small>
| |
| |<small>In the circle, learn about a project that is connecting isolated communities in the Amazon rain-forest, Central Africa and fisherman boats far away from the shore in Bengali Bay, in Bangladesh. The High-frequency Emergency and Rural Multimedia Exchange System (HERMES) project is a telecommunication system which provides very long range communication capability (hundreds / thousands of kilometers links) by using skywave propagation on the HF band.</small>
| |
| |-
| |
| |<small>'''You are Here: Splinternet'''</small>
| |
| |<small>Explore the fragmented digital landscapes that parallel and diverge from the monolithic internet. This circle sets the stage for SplinterCon, guiding participants through the disjointed realities of the splinternet. We delve into the emergent barriers, alternate pathways, and new modalities of connection that define this digital periphery.</small>
| |
| |}
| |
| <br>
| |
| <br>
| |
| ==Booth & Village Descriptions==
| |
| {| class="wikitable "
| |
| !'''<small>Village Name</small>'''
| |
| !<small>'''Run by'''</small>
| |
| !'''<small>Village Description</small>'''
| |
| |-
| |
| |'''<small>Tor and Tails</small>'''
| |
| |<small>[https://www.torproject.org/ The Tor Project] & [https://tails.net/ Tails]</small>
| |
| |<small>At the Tor and Tails booth you can learn more about tools that can help you be anonymous on the internet. Come to chat with us about how to use the Tor Browser or the Tails OS to protect your privacy online and bypass censorship. Learn more about our community and how to volunteer. And if you would like to partner with us for digital security training in your area.</small>
| |
|
| |
| |-
| |
| |'''<small>Calyx Institute Village</small>'''
| |
| |<small>[https://calyxinstitute.org/ Calyx Institute]</small>
| |
| |<small>The Calyx Institute's mission is to educate the public about privacy in digital communications and to develop tools that anyone can use. One of our featured tools is CalyxOS, an Android mobile operating system that puts privacy and security into the hands of everyday users.</small>
| |
| |-
| |
| |<small>'''[https://cleaninsights.org/gg Clean Insights] Tea House'''</small>
| |
| |<small>[https://guardianproject.info/ Guardian Project]</small>
| |
| |<small>Come by to have tea and chat with the Guardian Project team about their work on privacy-preserving measurement, internet shutdown resilience, anti-censorship and more!</small><small>https://cleaninsights.org/gg</small>
| |
| |-
| |
| |<small>'''[https://equalit.ie/portfolio/splintercon/ SplinterCon] by eQualitie'''</small>
| |
| |<small>[https://equalit.ie/ eQualitie]</small>
| |
| |<small>Join us at the SplinterCon booth, an initiative by eQualitie dedicated to exploring, challenging, and counteracting global internet fragmentation. Our focus is on resilient, decentralized tools, along with the developers and communities that support them.At our booth, you can:• Breakout from a simulated shutdown environment that mimics a pocket splinternet.• Participate in interactive workshops that reflect the current state of the web.• Test circumvention tools.• Share your experiences with internet fragmentation.• Learn from the expertise of advocates working in affected regions.The SplinterCon booth is a space for discussing the challenges and opportunities of a constantly fragmenting internet, offering you a hands-on experience of navigating and thriving in this evolving landscape.</small>
| |
| |-
| |
| |'''<small>APC Village</small>'''
| |
| |<small>[https://www.apc.org/ Association for Progressive Communications]</small>
| |
| |<small>The Association for Progressive Communications (APC) is a membership-based network of organisations and activists. It was founded in 1990 to empower individuals, organisations and social movements to use information and communications technologies (ICTs) to build strategic communities to contribute to equitable human development, social justice, participatory political processes and environmental sustainability.</small>
| |
| |-
| |
| |'''<small>Outline Village</small>'''
| |
| |<small>[https://getoutline.org/ Outline]</small>
| |
| |<small>Outline is an open-source project created by Jigsaw that provides a safer way for individuals and organizations to access the open internet. Jigsaw is a unit within Google that explores threats to open societies, and builds technology that inspires scalable solutions.</small>
| |
| |-
| |
| !'''<small>Booth Name</small>'''
| |
| !<small>'''Run by'''</small>
| |
| !'''<small>Booth Description</small>'''
| |
| |-
| |
| |<small>'''Abrimos.info: Generating strategic knowledge from open data'''</small>
| |
| |<small>[https://www.abrimos.info Abrimos.info]</small>
| |
| |<small>This booth features demonstrations of different tools used by Abrimos.info in real-world scenarios to effect change and enhance public policy in Latin America We create digital infrastructure with fundamental information for Latin American democracies. Support organizations, governments and companies to turn data and information into inputs for strategic decision making and provide tools for evidence-based narratives that empower communities, impact relevant stakeholders and promote social justice.</small><small>Showcase the capabilities of TeseoETL, our powerful data processing tool. Experience live demos of how we transform raw data into actionable insights, aiding journalists and NGOs in their fight for transparency and accountability in government contracting.</small><small>Examples of our work: Pidala.info for freedom of information request, Gobernantes.info a latinamerican database of verified information on political candidates and Sociedad.info, a backup for open contracting data.</small>
| |
| |-
| |
| |<small>'''[https://www.accessnow.org/help/ Access Now’s Digital Security Helpline]'''</small>
| |
| |<small>[https://www.accessnow.org/ Access Now]</small>
| |
| |<small>We are a free-of-charge resource for civil society around the world. We offer real-time, direct technical assistance and advice to civil society groups & activists, media organizations, journalists & bloggers, and human rights defenders.</small>
| |
| |-
| |
| |<small>'''Amnesty Tech'''</small>
| |
| |<small>[https://www.amnesty.org/en/tech/ Amnesty International (Tech Programme)]</small>
| |
| |<small>Members of Amnesty International’s Tech Programme will engage with attendees on the programme’s work, which includes countering the digital surveillance of activists, banning facial recognition technology for mass surveillance, and working to ensure reproductive rights activists can share accurate abortion information online. We will use the booth as an opportunity to interactively demo our tools for activists, such as verification kits to scan devices for spyware infections, as well as our surveillance camera map in New York City. The proposed activities will share information on different technological threats to activists, as well as providing them with the knowledge and tools to protect themselves and educate others.</small>
| |
| |-
| |
| |<small>'''AmneziaVPN'''</small>
| |
| |<small>[https://amnezia.org AmneziaVPN]</small>
| |
| |<small>Amnezia VPN is a simple and free app to run a self-hosted VPN with high privacy requirements. The idea for AmneziaVPN appeared in 2020 during the first Demhack hackathon, and then it was further developed with Privacy Accelerator. We desired to empower users of all technical skill levels to create their own VPN, for simple blocking circumvention and also to ensure privacy and protection of their data. It was important to us to create a free and open source application so that no user data is collected and there is no even hypothetical possibility of data leakage.</small>
| |
|
| |
| |-
| |
| |<small>'''Article19'''</small>
| |
| |<small>[https://www.article19.org/ Article19]</small>
| |
| |<small>International and regional projects looking at the intersection of digital rights and freedom of expression.During the Global Gathering regional and thematic specialists will be facilitating sessions, working with human rights defenders, and providing training. Our booth will be staffed throughout the Gathering and we are looking forward to meeting you and to learning more about your projects too. Our booth will be part of the Job Fair, so feel free to stop by and meet our colleagues to learn more about our work with partners around the world.</small>
| |
| |-
| |
| |<small>'''Censorship Resilient and Distributed Publishing: [https://451.tools 451 Tools] and more'''</small>
| |
| |<small>[https://www.radiozamaneh.com/ Zamaneh Media]</small>
| |
| |<small>Publishers understand their own needs and that of their audiences the best. What would the world of censorship circumvention look like if this understanding is incorporated into tools? At the booth, Zamaneh Media will showcase the tools it has developed and those in the pipeline that take a user-first, publisher-centric approach to tool development. What were some of the challenges, what were the big moments of success? This booth will cover a publisher's journey of taking on tool development and establishing strong partnerships with the iFreedom community all to keep independent information available to news readers.</small>
| |
| |-
| |
| |<small>'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks'''</small>
| |
| |<small>[https://ancestraguia.wordpress.com Ancestra] & [https://noisradio.co Nois Radio]</small>
| |
| |<small>This is a calm, deep listening spaces booth. Come to this booth for Colombian coffee or herbal tea straight from our mountains, to meet and talk about radio. In Colombia, radio enables populations living in remote areas to exercise their human right to communication. What is alternative radio for? Here, we will try to learn about the hopeful power of digital and analog sound content in geographical and sociopolitical contexts where democracy and rights are constantly at stake.</small>
| |
| |-
| |
| |<small>'''Conexión Segura y Libre'''</small>
| |
| |<small>[https://conexionsegura.org Conexión Segura y Libre]</small>
| |
| |<small>Conexión Segura y Libre is a Venezuelan NGO dedicated to the defense of digitals rights and internet freedom. This year we launched an anti-censorship newsreader app, which uses an integrated VPN powered by Psiphon and Outline. We are excited to share this new project with the international digital rights community.</small>
| |
| |-
| |
| |<small>'''[https://cyber-star.org/ CyberStar] - Digital safety support for small CSOs.'''</small>
| |
| |<small>[https://secdev-foundation.org/ The SecDev Foundation]</small>
| |
| |<small>CyberStar is a long-running digital safety audit approach for Eastern Europe/Central Asian civil society groups. Featuring women trainers from the region (Georgia, Ukraine, Kazakhstan), our booth will feature audio-visual materials demonstrating our approach and results. Visitors will be able to demo our 'scorecard' surveys for individuals and organizations, and give us feedback and views on our approach.</small>
| |
| |-
| |
| |<small>'''D3 - Defesa dos Direitos Digitais'''</small>
| |
| |<small>[https://direitosdigitais.pt/ D3 - Defesa dos Direitos Digitais]</small>
| |
| |<small>D3 - Defesa dos Direitos Digitais is the Portuguese digital rights group dedicated to fighting and advocating for fundamental rights in a techno-political context. Since its creation in 2017, D3 has been at the forefront of issues such as copyright reform and censorship filters, net neutrality, contact-tracing apps, public space surveillance, encryption of communications, metadata retention, electronic voting or internet regulation.</small>
| |
| |-
| |
| |<small>'''[https://digitalfirstaid.org Digital First Aid Kit]'''</small>
| |
| |<small>[https://www.civicert.org/ CiviCERT]</small>
| |
| |<small>The Digital First Aid Kit is a free resource to help rapid responders better protect themselves and the communities they support from the most common digital emergencies. Learn how to use the resource, navigate through the 12 available workflows to diagnose your digital security problem, and find support from CiviCERT members.</small>
| |
| |-
| |
| |<small>'''Digital Rights Litigation in West Africa'''</small>
| |
| |<small>[https://digitalrightslawyers.org Digital Rights Lawyers Initiative]</small>
| |
| |<small>The Booth seeks to showcase opportunities for collaboration to litigate digital rights in West Africa</small>
| |
| |-
| |
| |<small>'''Digital Security Lab Ukraine'''</small>
| |
| |<small>[https://dslua.org/ Digital Security Lab Ukraine]</small>
| |
| |<small>Digital Security Lab Ukraine is a non-profit organisation, based in Kyiv, Ukraine, whose main objective is to support safe and free exercise of human rights online by strengthening the digital security capacity of CSOs, human rights defenders and journalists, and advocating for enabling state and corporate policies in the field of digital rights.</small>
| |
| |-
| |
| |<small>'''EFF'''</small>
| |
| |<small>[https://www.eff.org/ The Electronic Frontier Foundation (EFF)]</small>
| |
| |<small>The Electronic Frontier Foundation (EFF) is excited to offer an opportunity to engage in conversations about the formation of coalitions and the implementation of effective tactics for interdisciplinary engagements. In addition, we will be presenting some of our innovative projects and providing complimentary stickers for collection, as well as offering a selection of distinctive EFF merchandise available for purchase.</small>
| |
| |-
| |
| |<small>'''[https://freedomhouse.org/programs/emergency-assistance-and-thematic-programs Emergency Assistance to Frontline Activists]'''</small>
| |
| |<small>[https://freedomhouse.org/ Freedom House]</small>
| |
| |<small>EAP provides short-term support to human rights defenders (HRDs), civil society organizations (CSOs), and survivors of severe religious persecution on the basis of belief or non-belief. The program has worked to support individuals and organizations in some of the world’s most repressive and conflict-ridden environments. On a yearly basis, the program supports more than 1,000 HRDs, CSOs, and survivors of severe religious persecution with emergency assistance, urgent advocacy grants, and preventive security projects.</small>
| |
| |-
| |
| |<small>'''Digital Defenders Partnership'''</small>
| |
| |<small>[https://www.digitaldefenders.org/ Digital Defenders Partnership]</small>
| |
| |<small>Digital Defenders Partnership (DDP) is an international programme that contributes to strengthening the resilience of Human Rights Defenders (HRDs) by increasing their digital security through a holistic and sustainable approach. We envision a world in which HRDs contribute to social justice while enjoying safety, well-being, freedom, and dignity.</small>
| |
| |-
| |
| |<small>'''[https://mediamatters.pk/media-matters-for-democracy-launches-facter-a-collaborative-digital-tool-for-newsrooms-to-counter-misinformation/ FACTER]: Revolutionizing Digital Investigation for Newsrooms to Counter Mis/Dis/Mal Information'''</small>
| |
| | <small>'''Emergency Assistance Program |<small>[https://mediamatters.pk/ Media Matters for Democracy (MMfD)]</small>
| |
| |<small>FACTER is a first-of-its-kind digital investigation tool designed exclusively to facilitate newsrooms in countering mis-, dis-, and mal-information (MDM) in Pakistan. The Facter database, which can be accessed by newsrooms via a Chrome extension, is updated with fact-checks by a team of digital investigators and editors on a daily basis.</small> <small>The booth will showcase the Facter project, what sets it apart from other fact-checking initiatives, its functioning, SOPs, and technical infrastructure.</small>
| |
|
| |
| |-
| |
| | <small>Outline VPN and SDK |<small>'''Fairwork'''</small>
| |
| |<small>[https://fair.work/ Fairwork]</small>
| |
| |<small>Fairwork is a global initiative from Oxford University that aims to promote digital workers rights. My idea for the booth is to promote the initiative by showing workers' testimonies and the project's progress on the matter. I can also bring merchandising like stickers or t-shirts with statements.</small>
| |
| |-
| |
| |<small>'''Freedom of the Press Foundation'''</small>
| |
| |<small>[https://freedom.press/ Freedom of the Press Foundation]</small>
| |
| |<small>Freedom of the Press Foundation (FPF) is a nonprofit working at the intersection of human rights, journalism, and technology. A unique organization in the security and internet freedom community, FPF has pioneered a multilayered approach to preserving and extending the privacy and security of journalists in the interest of advancing a free, adversarial press.</small>
| |
| <small>Our digital security training team provides support to journalists and media-makers working in the public interest through trainings, consulting, and security assessments; run ongoing digital security programs, and participate in conferences and events around the world throughout the year. We also write security guides that address common digital security concerns and conduct research on the latest digital security developments.</small>
| |
| |-
| |
| |<small>'''GlobaLeaks'''</small>
| |
| |<small>[https://www.globaleaks.org GlobaLeaks]</small>
| |
| |<small>GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable to your needs and protects the whistleblower’s privacy and submissions by default.</small>
| |
|
| |
| |-
| |
| |<small>'''Global Voices'''</small>
| |
| |<small>[https://www.globalvoices.org Global Voices]</small>
| |
| |<small>Global Voices is celebrating its 20th anniversary in 2024. Over the past two decades, our network of writers, translators, researchers, and digital rights activists has made significant contributions to the digital rights ecosystem. We create diverse and multilingual content with a special emphasis on underrepresented stories, produce in-depth participatory research about digital rights by those who are affected by the issues at hand, and support Indigenous and historically marginalized communities to exercise their rights to free expression and access to information in Indigenous languages. We also connect and coordinate a diverse network of partners, many of whom do not operate in English, giving their work a wider platform both with translation and republishing, and creating a forum for them to connect with one another. GV strives to foster more inclusive and representative participation around digital rights, ensuring that voices from all parts of the globe are heard.</small>
| |
| |-
| |
| |<small>'''Greenhost'''</small>
| |
| |<small>[https://greenhost.net Greenhost]</small>
| |
| |<small>Greenhost is a digital infrastructure provider in the community. We help organizations to have a safe and trusted place on the internet. The booth will be a place to connect with our users and potential new users.</small>
| |
| |-
| |
| |<small>'''Holistic VPN Stack Exploitation - Risks & Threats Across VPN Layers'''</small>
| |
| |<small>[https://breakpointingbad.com/ Breakpointing Bad] / OTF ICFP Fellow</small>
| |
| |<small>This booth showcases tools and techniques Breakpointing Bad has developed for identifying threats to VPNs, including risks that might be less well publicized and understood. We have planned three demonstrations: 1. Client Information Leakages - Participants will see CryptoSluice identify applications with weak or no encryption that put them at risk even when using a VPN. 2. VPN Server Attack Demo - Participants will see exploits developed by Breakpointing Bad that seriously undermine VPN security.3. Suspicious VPN Providers - Participants will see preliminary results about suspicious VPNs and how they put users at risk. These tools and techniques address risks and threats VPN clients are exposed to across different components of the VPN software/operational stack.</small>
| |
| |-
| |
| |<small>'''How Local Pakistani Apps Puts Vulnerable Citizens at Risk of Surveillance and Targeted Attacks'''</small>
| |
| |<small>[https://www.opentech.fund/fellows/sana-habib/ Arizona State University, OTF ICFP Fellow]</small>
| |
| |<small>Understand how vulnerabilities and development shortcomings in Pakistani apps risk exposing vulnerable citizens to surveillance and targeted attacks.</small>
| |
| |-
| |
| |<small>'''How to use IODA to Monitor for Internet Shutdowns'''</small>
| |
| |<small>[https://ioda.inetintel.cc.gatech.edu/ IODA @ Georgia Institute of Technology]</small>
| |
| |<small>This booth showcases both the IODA interface for live demos on how to use the IODA dashboard as well as share new guides developed for less technical users on how and when to use IODA, the IODA signals, and the IODA rapid response shutdown protocol.</small>
| |
| |-
| |
| |<small>'''Horizontal Booth: Tools for your digital security'''</small>
| |
| |[https://wearehorizontal.org/index <small>Horizontal</small>]
| |
| |<small>[https://wearehorizontal.org/index Horizontal] is an international CSO that support activists, journalist, and human right defenders with technology tools and trainings.</small> <small>We will demo our 2 flagship products:</small>
| |
| *<small>[https://tella-app.org/ Tella]: a free an open source tool to encrypt and hide files in your phone, and collect and share data even with limited or no internet connectivity or in the face of repression.</small>
| |
| *<small>[https://shira.app/ Shira]: Shira helps users develop the skills needed to identify and defeat phishing attacks on email and messaging apps.</small><small>We will also discuss about our forms of support for organizations and activists and will hear feedback and requests to make our apps more accessible and usable to the community</small><small>.</small>
| |
| |-
| |
| |<small>'''[https://humanrights.fb.com/ Human Rights @ Meta]'''</small>
| |
| |<small>[https://about.meta.com/ Meta]</small>
| |
| |<small>Meta's Human Rights Team will be present to answer your questions and hear your feedback about our policies and work to protect human rights defenders across Facebook, Instagram, and WhatsApp. We'll also be hosting two interactive sessions: a tabletop exercise simulating how we respond to conflict and crisis situations, and a structured consultation and update on our Trusted Partner and HRD escalation channels.</small>
| |
| |-
| |
| |<small>'''HURIDOCS (Human Rights Information and Documentation Systems)'''</small>
| |
| |<small>[https://huridocs.org/ HURIDOCS]</small>
| |
| |<small>For the last 40 years, HURIDOCS has supported the human rights community by providing essential tools and solutions for documentation and information management, and offering strategic advice on standards and methodologies for human rights documentation. At this year’s Global Gathering, HURIDOCS will present the roadmap for ongoing and further developments of our flagship tool Uwazi, share the Rapid Response Documentation Principles and showcase Uwazi integration with Tella. Stop by to learn more about how HURIDOCS can support you, your organization or your community. We look forward to seeing our friends and allies, building new connections and exploring potential synergies!</small>
| |
| |-
| |
| |<small>'''Idaraty Hub'''</small>
| |
| |<small>[https://arkam.tn/fr/ Idaraty]</small>
| |
| |<small>Idaraty is a CivicTech startup launched in 2020. Idaraty develops innovative solutions to accelerate citizen-focused digital transformation and contributes to access to information to different actors in order to foster a better digital ecosystem. Idaraty have several projects but the focus for the GG is the Project Arkam (Numbers in English). Arkam is a platform that aggregates public policy-related data, statistics, and stories and presents them in an easy-to-use format for journalists, content creators, and decision-makers.</small>
| |
| |-
| |
| |<small>'''Improving the Lists of Websites (aka Citizen Lab test lists) Used to Measure Internet Censorship'''</small>
| |
| |<small>[https://netalitica.com/ NETALITICA]</small>
| |
| |<small>Netalitica updates Citizen Lab test lists used by network probes (e.g. OONI Probe) to uncover Internet censorship. This booth is designed for people with limited technical skills who are interested in investigating Internet censorship.(e.g. social scientists, activists, media professionals) Get introduce to the lists, their types and structure, reveal the common problems that URLs in them suffer from, and learn how to fix bad URLs and update the lists with fresh content. In addition, review existing methodologies of updating test lists and discuss their advantages and disadvantages to feel comfortable picking the right methodology for your research. In addition, learn about a case study demonstrating how to organize collection of network measurements to produce an analytical report on blocking of websites, with the goal of acquiring practical knowledge on how to update test list.</small>
| |
| |-
| |
| |<small>'''Introducing the [https://en.digisec.wiki/wiki/Main_Page DigiSec.Wiki]: Come Collaborate with Us!'''</small>
| |
| |<small>[https://engagemedia.org/ EngageMedia]</small>
| |
| |<small>This booth will be introducing the work EngageMedia has done under the Digital Security Wiki, a Wiki focusing on providing accessible alternative resources for digital safety, particularly on those active in the Asia Pacific (APAC) region. we're inviting people to review, add, translate and contribute to our Wiki, and spread the resources to their community.</small>
| |
| |-
| |
| |<small>'''JAAKLAC Community'''</small>
| |
| |<small>[https://jaaklac.org JAAKLAC]</small>
| |
| |<small>*Share* your visions around a quality education in the digital age;</small> <small>*Learn* about efforts in Critical Digital Education manifested through our diverse Latin American Community;</small><small>*Do!* collaborative projects with us to broaden the participation for better digital futures with your knowledge, creativity and drive.</small><small>This booth will be in Spanish, English and Portuguese</small>
| |
| |-
| |
| |<small>'''Join the Localization Lab Community!'''</small>
| |
| |<small>[https://www.localizationlab.org/ Localization Lab]</small>
| |
| |<small>We have localized nearly 200 internet freedom tools and resources into 220 languages, and we need your help to do more! Drop by our booth to learn about our work and how we can fight tech bias together through co-design, collaboration, and research. Sign up to join our global network of contributors, explore other collaboration opportunities, or help us build our Unified Glossary on-site by translating into your local language, one word at a time.</small>
| |
| |-
| |
| |<small>'''JOSA - Jordan Open Source Association'''</small>
| |
| |<small>[https://josa.ngo/ Jordan Open Source Association]</small>
| |
| |<small>The JOSA booth will be open for discussions on various regional topics, including digital inclusion incident response, help desk services, open source philosophy, open governance, and open data. We will also showcase our work and portal, highlighting our contributions and initiatives in these areas and to engage with visitors on these subjects.</small>
| |
| |-
| |
| |<small>'''Journalism for the Future / network booth'''</small>
| |
| |<small>[https://supernova.is/ supernova.is]</small>
| |
| |<small>Is there any kind of journalism about digital rights that covers not only problems we face now, but ones that are yet in the boiling pot, soon ready to be served to citizens? Can we catch it before it damages society, vulnerable groups, the internet infrastructure? We invite journalists and anybody interested in the prevention of the anti-utopian future rather than sorting out the rabble after, for the conversation about what can be done differently in informing our audiences and networking for future collaborations across the borders.</small>
| |
|
| |
| |-
| |
| | <small>Datávoros: ¿Qué tanto se alimentan de ti tus aplicaciones favoritas? |<small>'''Kaleidoscope – reliable and convenient censorship circumvention mirroring solution'''</small>
| |
| |<small>[https://doxa.team/ DOXA]</small>
| |
| |<small>We - a media in exile called DOXA ([https://doxa.team/ doxa.team]) - have created a solution that automatically creates unblocked mirrors of websites blocked in regions with harsh censorship (such as Belarus, russia Uzbekistan etc). It allows us to always stay one step ahead of censorship agencies and assure readers have access to independent information!</small> <small>We are eager to provide our tool to other media outlets and human rights organisations and are already doing it for 10+ organisations in russia, and we believe this number will most likely triple by the moment our Booth takes place!</small>
| |
| |-
| |
| |<small>'''[https://letro.app/en/ Letro]'''</small>
| |
| |<small>[https://relaycorp.tech/ Relaycorp]</small>
| |
| |<small>Letro is analogous to email, but conversations are end-to-end encrypted, spam is virtually impossible and users can communicate without the Internet too.</small>
| |
| |-
| |
| |<small>'''LibResilient'''</small>
| |
| |<small>[https://resilient.is/ LibResilient]</small>
| |
| |<small>LibResilient is a browser-based decentralized content delivery tool, implemented as a JavaScript library to be deployed easily on any website. It uses ServiceWorkers and a suite of unconventional in-browser delivery mechanisms, with a strong focus on decentralized delivery methods, and does not require website visitors to change any settings or install any extensions to work. The project grew from experience of running infrastructure for (and blocking censorship of) investigative journalism media sites.</small>
| |
| |-
| |
| |<small>'''MapBond Connect Hub'''</small>
| |
| |<small>[https://mapbond.com Mapbond]</small>
| |
| |<small>MapBond Connect Hub is an innovative platform designed to foster connections and build communities. At our booth, attendees can experience a live demo of MapBond, a digital tool that maps social capital to enhance networking and collaborative opportunities. Engage directly and explore how MapBond facilitates connections through interactive maps, helping users share interests, locations, and activities. Join us to discover how you can leverage MapBond to strengthen your networks and community engagements, all within a user-friendly digital environment.</small>
| |
| |-
| |
| |<small>'''MaadiX'''</small>
| |
| |<small>[https://maadix.net MaadiX]</small>
| |
| |<small>MaadiX is a privacy-oriented, affordable and easy-to-use solution that puts users back in control of their data and communications without the need for technical expertise or large investments.It provides one-click installation and maintenance of free and open source online tools on own servers through an easy and intuitive graphical interface.</small>
| |
| |-
| |
| |<small>'''Numun Fund'''</small>
| |
| |<small>[https://maadix.net Numun Fund]</small>
| |
| |<small>The first dedicated fund for feminist tech in, and for the Larger World. Our aim is to seed and sustain feminist technology infrastructure for movement organising, and we understand digital technologies to be an important part of movement infrastructure.</small>
| |
| |-
| |
| |<small>'''Omidyar Network’s Digital Trust and Safety Strategy'''</small>
| |
| |<small>[https://omidyar.com/ Omidyar Network]</small>
| |
| |<small>Come learn more about Omidyar Network, our approach to grantmaking, and our strategy as it relates to Digital Trust and Safety.</small>
| |
| |-
| |
| |<small>'''OONI Run v2 Demo'''</small>
| |
| |<small>[https://run.ooni.io/ Open Observatory of Network Interference]</small>
| |
| |<small>Stop by the OONI booth to see a demo of our improved OONI Run tool! This tools helps people crowd source network measurements and we currently working on improvements requested by the community. Stop by to see how it works!</small>
| |
| |-
| |
| |<small>'''0xche'''</small>
| |
| |<small>[https://www.0xche.org 0xche]</small>
| |
| |<small>We want to showcase our current lines of work and ongoing programs to explore potential partnerships with other organizations, and invite organizations to apply to our Rapid Response and Security Lab programs.</small>
| |
| |-
| |
| |<small>'''Open Culture Foundation'''</small>
| |
| |<small>[https://ocf.tw/en/ Open Culture Foundation]</small>
| |
| |<small>We want to share the newly released report about Taiwan's human rights defenders' cybersecurity situation and how we used these results to develop a 1-year information security support service specifically designed for Taiwan's human rights defenders, especially those confronting digital authoritarian countries.</small>
| |
|
| |
| |-
| |
| | <small>Ve Sin Filtro's PiProbe and project dashboards |<small>'''Open Technology Fund'''</small>
| |
| |<small>[http://opentech.fund Open Technology Fund]</small>
| |
| |<small>OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs.</small>
| |
| |-
| |
| |<small>'''[https://pts-project.org/ PiRogue Tool Suite (PTS)]'''</small>
| |
| |<small>[https://defensive-lab.agency/ Defensive Lab Agency]</small>
| |
| |<small>This booth will demo the PiRogue Tool Suite project, allows attendees to test the PiRogue and ask questions about its usage and features. The booth will have a PiRogue running and attendees will be able to see it in action and get the network traffic of their mobile phone being analyzed. The main PTS developer, along with an expert in mobile forensics, will be there to explain how it works and answer technical questions.</small>
| |
| |-
| |
| |<small>'''PigeonHut: Get Shredded for Your Bodily Autonomy'''</small>
| |
| |<small>[https://digitaldefensefund.org/ Digital Defense Fund], [https://www.plancpills.org/ Plan C], Amnesty International USA</small>
| |
| |<small>What do pigeons, (USB) condoms, paper shredders and doulas have to do with your bodily autonomy? Whether abortion laws target providers, supporters, or pregnant people themselves, the criminalization of abortion care involves the surveillance of bodies. Personal data generated in the course of everyday life can become evidence used in prosecutions against those seeking or assisting in reproductive justice. Visit this space if you're looking for abortion pill info, to brainstorm & discuss ways to meet the challenges to bodily autonomy in a digital world. We’ll have people-powered paper shredders on site!</small>
| |
| |-
| |
| |<small>'''Preserve Truth to Power with Save by OpenArchive'''</small>
| |
| |<small>[https://open-archive.org/save OpenArchive]</small>
| |
| |<small>People armed with mobile devices are becoming history’s first responders, amassing evidentiary records of injustice. Save helps them Share, Archive, Verify, Encrypt this crucial evidence. This will be a participatory demo where we’ll do a demo and foster strategic partnerships with those interested in deploying Save or setting up archives in their communities.</small>
| |
| |-
| |
| |<small>'''Quad9'''</small>
| |
| |<small>[https://quad9.net/ Quad9]</small>
| |
| |<small>Quad9 is a Swiss NGO providing a free service that replaces your default Domain Name Server (DNS) configuration. When your computer performs any Internet transaction that uses the DNS (and most transactions do), Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats. And we have the data to prove it's effective. As opposed to some other public DNS services, Quad9 respects your privacy and does not market in personally identifiable information about you or your DNS queries.</small>
| |
| |-
| |
| |<small>'''Qubes OS Booth'''</small>
| |
| |<small>[https://www.qubes-os.org/ Qubes OS]</small>
| |
| |<small>Qubes OS is a free and open-source security-focused operating system that strives to provide exceptional security, flexibility, and control over your computer. It is also increasingly accessible to users of various level of technical skills. In this booth, I want to showcase Qubes OS capabilities and gather feedback from existing and prospective users.</small>
| |
| |-
| |
| |<small>'''Quiet - A "Slackier Signal for secure team chat"'''</small>
| |
| |<small>[https://tryquiet.org/ Quiet]</small>
| |
| |<small>Quiet is building an alternative to Slack & Discord for human rights defenders with a focus on encryption, deletion, and usability. Worried about the security of your Slack, Discord, or Telegram chats? Frustrated by the chaos of using Signal for a busy team or community? Come learn more about Quiet and let us learn more about your use case!</small>
| |
| |-
| |
| |<small>'''SafeCommNet: Decentralized, Secure, and Private Communication System for Crisis and Disaster Management'''</small>
| |
| |<small>[https://asorcom.net/ Alternative Solutions for Rural Communities (ASORCOM)]</small>
| |
| |<small>Visit our booth to learn about SafeCommNet, an innovative decentralized communication system designed for use during political unrest, crises, and disasters. Our platform ensures secure and private communication, enabling communities to maintain connectivity and coordination even in the most challenging situations. Discover how SafeCommNet can support resilience and safety through cutting-edge technology.</small>
| |
| |-
| |
| |<small>'''Safe Sisters Fellowship Program'''</small>
| |
| |<small>[https://safesisters.org/ Safe Sisters]</small>
| |
| |<small>Safe Sisters is showcasing its first public exhibit of fellowship products from our community champions. The exhibition will include collections from TFGBV research, Digital rights creative content and Digital safety resources from 7 African countries.</small>
| |
| |-
| |
| |<small>'''Safety in exile: practical guide to avoiding transnational harassment'''</small>
| |
| |<small>Radio Free Asia</small>
| |
| |<small>Transnational repression is a tactic used by governments such as China, Iran, and Russia, to reach across borders to harass and intimidate diaspora communities, journalists and human rights defenders living in exile. Out of myriad potential responses, we will showcase best practices and advise on the real world applicability of digital and physical security guidance in the face of such threats.</small>
| |
| |-
| |
| |<small>'''Snowstorm'''</small>
| |
| |<small>[https://snowstorm.net Snowstorm]</small>
| |
| |<small>Snowstorm is a revolutionary internet censorship circumvention technology based on our founder's original software "Snowflake currently being used by Tor Snowstorm brings internet freedom to another level and we'd love to showcase the technology share thoughts and connect with people."</small>
| |
| |-
| |
| |<small>'''[https://Zines.Strangerobot.Design The Caste of Technology: A Zine Library]'''</small>
| |
| |<small>[https://cis-india.org/ The Center for Internet & Society]</small>
| |
|
| |
| |<small>“The Caste of Technology” is a physical and digital Zine library showcasing stories, reflections and aspirations of Anti-caste artists, activists and creatives from India. Through the library, we invite GlobalGathering participants to explore nuanced/complex/messy relationships between caste, the internet and digital platforms, as experienced by marginalised caste users. The library aims to bring awareness, open conversations and build solidarities about caste in the global digital rights discourse.</small>
| |
| |-
| |
| |<small>'''The current status of a new privacy-preserving and decentralized messenger'''</small>
| |
| |<small>[https://phnx.im Phoenix R&D / Messaging Layer Security (MLS)]</small>
| |
| |<small>We’re building a new generation of open-source messenger combining privacy, security, and decentralization. This is based on the Messaging Layer Security protocol (https://blog.phnx.im/rfc-9420-mls/) -a new standard for end-to-end encryption we co-authored-, and a tech stack we have been developing. In this booth, we want to showcase the current status of our project to develop a generation of new privacy-preserving and decentralized messenger with a beta coming soon. We will also have a circle session on the same day at 16:30 where we want to discuss with you what the future of secure messaging might look like and what your needs are for messaging applications.</small>
| |
| |-
| |
| |<small>'''The Work of the Internetbolivia.org Foundation'''</small>
| |
| |<small>[https://internetbolivia.org/ Fundación Internetbolivia.org]</small>
| |
| |<small>The InternetBolivia.org Foundation has been working for more than 6 years in the areas of Digital Economy, Internet Regulation, Digital Inclusion, Fight against Digital Violence, Innovation and Digitalization, Technology and Digital Security.</small><small>We will show all our achievements, our publications, workshops and projects that we have been doing in Bolivia.</small>
| |
| |-
| |
| |<small>'''Usability and Accessibility Clinic'''</small>
| |
| |<small>[https://www.a11ylab.com/ Accessibility Lab]</small><small>[https://www.opentech.fund/labs/uxd-lab/ UXD Lab]<br>[https://ura.design/ Ura Design]<br>[https://www.decentdesign.org/ Decent Design]</small>
| |
| |<small>Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist.</small>
| |
| |-
| |
| |<small>'''Vietnam Rise: Navigating in hostile environments.'''</small>
| |
| |<small>[https://www.vietnamrise.org/ Vietnam Rise]</small>
| |
| |<small>There seems to be reservations from funders and NGOs about funding and working on Vietnam projects due to increasingly harsher government crackdowns. This tendency for risk aversion hurts civil society and grassroots organizing. Vietnam Rise would like to showcase that it is possible to work in Vietnam. We would like to showcase new tactics and work with new communities and issues to navigate in hostile environments but at the same time integrate security into our processes.</small>
| |
| |-
| |
| |<small>'''Whats Happening In Myanmar'''</small>
| |
| |<small>[https://www.myanmarinternet.info/ Myanmar Internet Project]</small>
| |
| |<small>The "Whats Happening In Myanmar" exhibit serve as a vital platform for shedding light on the critical security, threats, and risks associated with the military and digital coup in Myanmar.</small>
| |
| |-
| |
| |<small>'''Wiki-Advocacy: How the people behind Wikipedia work towards a better internet'''</small>
| |
| |<small>[https://wikimediafoundation.org/ Wikimedia Foundation]</small>
| |
| |<small>Everyone knows Wikipedia, but few know how its global volunteer community and the non-profit organization behind it work towards a more equitable digital ecosystem and in favor of regulations and public policies that keep the internet a free and open environment where rights are protected and free knowledge can thrive. Local Wikimedians will be present to share their important work and experiences filling the gender gap on Wikipedia, while the Wikimedia Foundation’s Global Advocacy team will be on hand to discuss its global work engaging governments to advance privacy, transparency, and freedom of expression online. Global Gathering attendees will be able to share their own priorities in these areas and to identify possible areas for collaboration with the global Wikimedia movement.</small>
| |
| |}
| |