September 28 2024 Agenda: Difference between revisions
No edit summary |
No edit summary |
||
(70 intermediate revisions by 4 users not shown) | |||
Line 16: | Line 16: | ||
{| class="wikitable mw-collapsible" | {| class="wikitable mw-collapsible style="width:99%;" | ||
| rowspan="3" style="background: #fde68a;" |[[File:SOS Icon Agenda 2024.png|frameless|123x123px]] | | rowspan="3" style="background: #fde68a;" |[[File:SOS Icon Agenda 2024.png|frameless|123x123px]] | ||
| style="background: #fde68a;" | | | style="background: #fde68a;" | | ||
Line 23: | Line 23: | ||
| style="background: #fde68a;" |Check out the list of self-organized Socials taking place at off-site (but close by) locations, ranging from meetups to numerous activities. https://pad.riseup.net/p/GG-Socials-2024 | | style="background: #fde68a;" |Check out the list of self-organized Socials taking place at off-site (but close by) locations, ranging from meetups to numerous activities. https://pad.riseup.net/p/GG-Socials-2024 | ||
|- | |- | ||
| style="background: #fde68a;" |'''A Sample of Today's Socials:''' | | style="background: #fde68a;" |'''A Sample of Today's Socials:''' Sunrise @ the Beach Meetup | ||
|} | |} | ||
{| class="wikitable mw-collapsible" | {| class="wikitable mw-collapsible style="width:99%;" | ||
| style="background: #c0e590;" |[[File:Circles green.png|center|frameless|100x100px]] | | style="background: #c0e590;" |[[File:Circles green.png|center|frameless|100x100px]] | ||
| colspan="3" style="background: #c0e590;" | | | colspan="3" style="background: #c0e590;" | | ||
Line 34: | Line 34: | ||
| colspan="4" style="background: #c0e590;" |<center><big>'''September 28'''</big></center> | | colspan="4" style="background: #c0e590;" |<center><big>'''September 28'''</big></center> | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |'''<big>Location</big>''' | ||
| style="background: #e8f5d6" |'''<center><big>13:30 - 14:30</big></center>''' | | style="background: #e8f5d6" |'''<center><big>13:30 - 14:30</big></center>''' | ||
| style="background: #e8f5d6" |'''<center><big>15:00 - 16:00</center>''' | | style="background: #e8f5d6" |'''<center><big>15:00 - 16:00</center>''' | ||
| style="background: #e8f5d6" |'''<center><big>16:30 - 17:30</center>''' | | style="background: #e8f5d6" |'''<center><big>16:30 - 17:30</center>''' | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 1 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle1a The LLephant in the RooM: What are we doing about AI?] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle1b Tactics for Engaging Tech Stakeholders in Digital Rights Advocacy. The Experiences and Future Opportunities Across Indo-Pacific Region.] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle1c Discriminatory UX: How Software Can Gatekeep People] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 2 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle2a Nowhere Feels Safe: Digital Transnational Repression Against women human rights defenders in exile] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle2b Technology, Data and Elections: The Role of Data and Technologies in Electoral Processes] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle2c The Future of Decent Work in the Planetary Digital Capitalism: AI, Automation and Digital Platforms] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 3 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle3a Targeted anti-phishing: building anti-phishing training resources tailored to each community’s needs and threats] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle3b Shape the future of Tella, file encryption on mobile, and human rights documentation] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle3c Cybersecurity Assessment Tool from Ford Foundation] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 4 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle4a Public Interest Technology Meet & Greet] / [https://pad.riseup.net/p/GG-2024-Day2-Circle4a Public Interest Technology Group] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle4b Self-Organized Circle TBA] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle4c Protection of Digital Rights in Challenging Contexts: Central America against the UN Cybercrime Convention] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 5 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle5a Reimagination of Freedom: Digital Rights and Kinship through "The Ground Screams to Whisper Ancestral Mapping"] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle5b Building the future of escalation channels with social media platforms] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle5c Building a New Privacy-Preserving and Decentralized Messenger] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 6 | ||
|Guardians of Change: Strengthening Cybersecurity in Civil Society | |[https://pad.riseup.net/p/GG-2024-Day2-Circle6a Guardians of Change: Strengthening Cybersecurity in Civil Society] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle6b Law and Policy for IBSA] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle6c Identifying AI-Generated Content: How?] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 7 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle7a Gaming the Far Right Anti-Human Rights Authoritarian Playbook - Big Tech Version] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle7b Digital Rights After the Fall: What Should We do with the Digital Heritage of a Dictatorship] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle7c Amplifying Research on Digital Rights through Popular Culture] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 8 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle8a Countering Digital Authoritarianism and Online Repression in Central Asia] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle8b VPN Provider Transparency: Addressing Threats that Shady VPNs Pose to VPN Clients and Providers] | ||
|VPN Infrastructure: Challenges & Needs | |[https://pad.riseup.net/p/GG-2024-Day2-Circle8c VPN Infrastructure: Challenges & Needs] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 9 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle9a VPN Community Initiative] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle9b Challenges in Data-Driven Journalism] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle9c Rising Digital Authoritarianism in South Asia] | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |Circle 10 | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle10a The How and Why of Rapid Response] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle10b Community Networks Circle] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Circle10c Co-leadership for Sustainable Organizations] | ||
|- | |- | ||
| colspan="4" style="background: #c0e590;" | <center><big>'''Circles @ Partner Villages, September 28'''</big></center> | | colspan="4" style="background: #c0e590;" | <center><big>'''Circles @ Partner Villages, September 28'''</big></center> | ||
|- | |- | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" |'''<big>Location</big>''' | ||
| style="background: #e8f5d6" |'''<center><big>13:30 - 14:30</big></center>''' | | style="background: #e8f5d6" |'''<center><big>13:30 - 14:30</big></center>''' | ||
| style="background: #e8f5d6" |'''<center><big>15:00 - 16:00</big></center>''' | | style="background: #e8f5d6" |'''<center><big>15:00 - 16:00</big></center>''' | ||
Line 104: | Line 104: | ||
| style="background: #e8f5d6" |'''Tor Project & Tails Village''' (Booth 9) | | style="background: #e8f5d6" |'''Tor Project & Tails Village''' (Booth 9) | ||
| | | | ||
|Developing Robust Signalling Channel | |[https://pad.riseup.net/p/GG-2024-Day2-Village1b Developing Robust Signalling Channel] | ||
|Updates about Tor and Tails | |[https://pad.riseup.net/p/GG-2024-Day2-Village1c Updates about Tor and Tails] | ||
|- | |- | ||
| style="background: #e8f5d6" |'''Calyx Institute Village'''<br />(Booth 12) | | style="background: #e8f5d6" |'''The Calyx Institute Village'''<br />(Booth 12) | ||
|Design Sprint for Everyone: Simple Steps in Building Bite-Size Digital Security Tip Cards | |[https://pad.riseup.net/p/GG-2024-Day2-Village2a Design Sprint for Everyone: Simple Steps in Building Bite-Size Digital Security Tip Cards] | ||
| | | | ||
| | | | ||
|- | |- | ||
| style="background: #e8f5d6" |'''Clean Insights Tea House'''<br /> (Booth 19) | | style="background: #e8f5d6" |'''Clean Insights Tea House'''<br /> (Booth 19) | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village3a Clean Insights Tea Time] | ||
|From Wristbands to Smartphones: Designing for Physical Safety! | |[https://pad.riseup.net/p/GG-2024-Day2-Village3b From Wristbands to Smartphones: Designing for Physical Safety!] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village3c Clean Insights Tea Time] | ||
|- | |- | ||
| style="background: #e8f5d6" |'''SplinterCon Village'''<br />(Booth 3) | | style="background: #e8f5d6" |'''SplinterCon Village'''<br />(Booth 3) | ||
|The Case of El Salvador: Strengthening Civil Society and Media through Capacity-Building in a Fragmented Country | |[https://pad.riseup.net/p/GG-2024-Day2-Village4a The Case of El Salvador: Strengthening Civil Society and Media through Capacity-Building in a Fragmented Country] | ||
|Resilient Networks: Hosting federated services in adversarial conditions | |[https://pad.riseup.net/p/GG-2024-Day2-Village4b Resilient Networks: Hosting federated services in adversarial conditions] | ||
|Testing OuiSync for Shutdown Scenarios | |[https://pad.riseup.net/p/GG-2024-Day2-Village4c Testing OuiSync for Shutdown Scenarios] | ||
|- | |- | ||
| style="background: #e8f5d6" |'''APC Village'''<br /> (Booth 21) | | style="background: #e8f5d6" |'''APC Village'''<br /> (Booth 21) | ||
|Exchanging Feminist Methodologies, Politics and Practice in Capacity Building and Feminist Technology | |[https://pad.riseup.net/p/GG-2024-Day2-Village5a Exchanging Feminist Methodologies, Politics and Practice in Capacity Building and Feminist Technology] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village5b The Full Picture: How Can We See Beyond the Haze of Mis/Disinformation] | ||
|On Selective Protection and Regulations: TFGBV and Hate Speech against Gender and Sexual Rights Defenders | |[https://pad.riseup.net/p/GG-2024-Day2-Village5c On Selective Protection and Regulations: TFGBV and Hate Speech against Gender and Sexual Rights Defenders] | ||
|- | |- | ||
| style="background: #e8f5d6" |'''Outline Village'''<br /> (Booth 79) | | style="background: #e8f5d6" |'''Outline Village'''<br /> (Booth 79) | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village6a Outline SDK Meetup] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village6b Outline Partner Fireside Chat] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village6c Hang out with the Jigsaw team] | ||
|- | |- | ||
| style="background: #e8f5d6" |'''WANA Café'''<br /> (Booth 81) | | style="background: #e8f5d6" |'''WANA Café'''<br /> (Booth 81) | ||
|SWANA Feminist Imagination for Digital Space | |[https://pad.riseup.net/p/GG-2024-Day2-Village7a SWANA Feminist Imagination for Digital Space] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village7b From Palestine to Lebanon: Reflecting on global digital rights] | ||
| | |[https://pad.riseup.net/p/GG-2024-Day2-Village7c WANA geopolitics & technology] | ||
|} | |} | ||
{| class="wikitable mw-collapsible" | {| class="wikitable mw-collapsible style="width:99%;" | ||
| style="background: #c0e590;" |[[File:Booth Icon Agenda 2024 Green.png|center|frameless| | | style="background: #c0e590; width:10%;" |[[File:Booth Icon Agenda 2024 Green.png|center|frameless|60x60px]] | ||
| colspan="5" style="background: #c0e590;" | | | colspan="5" style="background: #c0e590;" | | ||
===<big>Booths</big>=== | ===<big>Booths</big>=== | ||
Each booth has a number, which can be found on top, center above a booth's "window". | Each booth has a number, which can be found on top, center above a booth's "window". | ||
Line 151: | Line 152: | ||
| style="background: #e8f5d6" | | | style="background: #e8f5d6" | | ||
! colspan="2" style="background: #e8f5d6" |<big>13:00 - 15:00</big> | ! colspan="2" style="background: #e8f5d6" |<big>13:00 - 15:00</big> | ||
| rowspan=" | | rowspan="30" style="background: #c0e590;" | | ||
! colspan="2" style="background: #e8f5d6" |<big>15:30 - 17:30</big> | ! colspan="2" style="background: #e8f5d6" |<big>15:30 - 17:30</big> | ||
|- | |- | ||
Line 182: | Line 183: | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 4a | | style="background: #e8f5d6" |Booth 4a | ||
| | |'''Tech-facilitated abuse within the context of domestic abuse''' | ||
| | |Frauenhauskoordinierung | ||
|'''Numun Fund''' | |'''Numun Fund''' | ||
|Numun Fund | |Numun Fund | ||
Line 190: | Line 191: | ||
|'''Qubes OS Booth''' | |'''Qubes OS Booth''' | ||
|Qubes OS | |Qubes OS | ||
| | |'''Arkam''' | ||
| | |Idaraty | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 5 | | style="background: #e8f5d6" |Booth 5 | ||
Line 207: | Line 208: | ||
| style="background: #e8f5d6" |Booth 7 | | style="background: #e8f5d6" |Booth 7 | ||
|'''Usability and Accessibility Clinic''' | |'''Usability and Accessibility Clinic''' | ||
|Accessibility Lab | |Accessibility Lab,<br>UXD Lab,<br>Ura Design,<br>Decent Design,<br>Superbloom | ||
UXD Lab | |||
Ura Design | |||
Decent Design | |||
|'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks''' | |'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks''' | ||
|Ancestra | |Ancestra | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 8 | | style="background: #e8f5d6" |Booth 8 | ||
|'''The | |'''The Powered by the People Activist Help Desk''' | ||
| | |PartnersGlobal | ||
|'''SafeCommNet: Decentralized, Secure, and Private Communication System for Crisis and Disaster Management''' | |'''SafeCommNet: Decentralized, Secure, and Private Communication System for Crisis and Disaster Management''' | ||
|Alternative Solutions for Rural Communities (ASORCOM) | |Alternative Solutions for Rural Communities (ASORCOM) | ||
Line 233: | Line 231: | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 11 | | style="background: #e8f5d6" |Booth 11 | ||
|''' | |'''The Work of the Internetbolivia.org Foundation''' | ||
| | |Fundación Internetbolivia.org | ||
|'''Preserve Truth to Power with Save by OpenArchive''' | |'''Preserve Truth to Power with Save by OpenArchive''' | ||
|OpenArchive | |OpenArchive | ||
Line 257: | Line 255: | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 15 | | style="background: #e8f5d6" |Booth 15 | ||
|''' | |'''The Work of the Internetbolivia.org Foundation''' | ||
| | |Fundación Internetbolivia.org | ||
|'''JAAKLAC Community''' | |'''JAAKLAC Community''' | ||
|JAAKLAC | |JAAKLAC | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 16 | | style="background: #e8f5d6" |Booth 16 | ||
|''' | |'''How Local Pakistani Apps Puts Vulnerable Citizens at Risk of Surveillance and Targeted Attacks''' | ||
| | |Arizona State University | ||
|''' | |'''Safety in exile: Practical guide to avoiding transnational harassment''' | ||
| | |Radio Free Asia | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth 17 | | style="background: #e8f5d6" |Booth 17 | ||
Line 319: | Line 317: | ||
| style="background: #e8f5d6" |Booth 82 | | style="background: #e8f5d6" |Booth 82 | ||
|'''The Palestine Booth''' | |'''The Palestine Booth''' | ||
| | |Collective | ||
|'''JOSA - Jordan Open Source Association''' | |||
|Jordan Open Source Association | |||
|- | |||
| style="background: #e8f5d6" |Booth 83a | |||
| style="background: #FFF9C4;" |'''Digital Justice House''' | |||
|Team CommUNITY | |||
| | | | ||
| | | | ||
|- | |- | ||
| style="background: #e8f5d6" |Booth | | style="background: #e8f5d6"|Booth 83b | ||
|'''Coaching, Leadership and Fundraising Support''' | |||
| | |Spring Strategies | ||
| | | | ||
| | | | ||
|} | |} | ||
===<big>Evening Celebration</big>=== | {| class="wikitable mw-collapsible" style="width:99%;" | ||
|style="background: #ffa3e8;" |[[File:Evenings Icon Agenda GG 2024.png|center|frameless|143x143px]] | |||
| style="background: #ffa3e8;" | | |||
|style="background: #ffa3e8;| | === <big>Evening Celebration</big> === | ||
|style="background: #ffa3e8;|<big>'''Calyx Institute Karaoke Party!'''</big> | |- | ||
| style="background: #ffa3e8;" |[[File:Calyx Logo.png|frameless|157x157px|center]] | |||
| style="background: #ffa3e8;" |<big>'''Calyx Institute Karaoke Party!'''</big> | |||
'''Time:''' 18:00 | '''Time:''' 18:00 | ||
Line 390: | Line 396: | ||
|style="background: #3acad3;"|<center><big>'''Circle Title'''</big></center> | |style="background: #3acad3;"|<center><big>'''Circle Title'''</big></center> | ||
|style="background: #3acad3;"|<center><big>'''Circle Description'''</big></center> | |style="background: #3acad3;"|<center><big>'''Circle Description'''</big></center> | ||
|- | |- | ||
|<small>'''Amplifying research on digital rights through popular culture'''</small> | |<small>'''Amplifying research on digital rights through popular culture'''</small> | ||
|<small>How can research and digital rights organizations do more to democratize access to information about the future of digital rights? Researchers, technologists, journalists, activists, and creatives are invited to explore together the creative use of media to amplify information about privacy, safety, and the threats of the future. This includes discussing how we can cut through cynicism and apathy about digital autonomy, and how to use popular culture, including film, music, and social media, to put key safety and access information in front of more people.</small> | |<small>How can research and digital rights organizations do more to democratize access to information about the future of digital rights? Researchers, technologists, journalists, activists, and creatives are invited to explore together the creative use of media to amplify information about privacy, safety, and the threats of the future. This includes discussing how we can cut through cynicism and apathy about digital autonomy, and how to use popular culture, including film, music, and social media, to put key safety and access information in front of more people.</small> | ||
|- | |- | ||
|<small>'''Building a new privacy-preserving and decentralized messenger'''</small> | |<small>'''Building a new privacy-preserving and decentralized messenger'''</small> | ||
|<small>Join the Phoenix R&D team to discuss what the future of secure messaging might look like and what your needs are for messaging applications.</small><small>Phoenix R&D is currently building a new generation of open-source messenger combining privacy, security, and decentralization. It is based on a new standard for end-to-end encryption they co-authored (Messaging Layer Security protocol <nowiki>https://blog.phnx.im/rfc-9420-mls/</nowiki>) and a tech stack they have been developing.</small> | |<small>Join the Phoenix R&D team to discuss what the future of secure messaging might look like and what your needs are for messaging applications.</small><small>Phoenix R&D is currently building a new generation of open-source messenger combining privacy, security, and decentralization. It is based on a new standard for end-to-end encryption they co-authored (Messaging Layer Security protocol <nowiki>https://blog.phnx.im/rfc-9420-mls/</nowiki>) and a tech stack they have been developing.</small> | ||
|- | |- | ||
|<small>'''Building the | |<small>'''Building the future of escalation channels with social media platforms'''</small> | ||
|<small> | |<small>What would an efficient escalation channel look like if NGOs had a clear, organized system of communication with social media platforms to support targets of digital attacks? Built on our (un)common lived experiences of escalation channels with social media platforms and previous research, this session will introduce the outcome of a workshop we will have in Estoril, ahead of this Circle. Together with the Global Gathering community, we will discuss indicators for success for effective localized systems and workflows between CSOs and social media platforms when a crisis occurs.</small> | ||
|- | |- | ||
|<small>'''Challenges in data-driven journalism'''</small> | |<small>'''Challenges in data-driven journalism'''</small> | ||
|<small>Engage in a collaborative session that delves into the challenges and opportunities in data-driven journalism. Share experiences, tools, and techniques that aid journalists in uncovering and narrating impactful stories through data.</small> | |<small>Engage in a collaborative session that delves into the challenges and opportunities in data-driven journalism. Share experiences, tools, and techniques that aid journalists in uncovering and narrating impactful stories through data.</small> | ||
|- | |||
|'''<small>Clean Insights Tea Time</small>''' | |||
|<small>Join the Guardian Project team twice a day to delight in delicious ethical and organic Insightful Tea while chatting about ways in which your work can detox from harmful tracking and data collection practices.</small> | |||
|- | |- | ||
|<small>'''Co-leadership for sustainable organizations'''</small> | |<small>'''Co-leadership for sustainable organizations'''</small> | ||
|<small>Co-leadership is an innovative model to enable sustainability, allowing for alternatives to single-leadership, distributing power and decision making within organizations. Learn about how this approach helps center trust, mutual care, and collaboration, while uplifting the differences in lived experiences. In addition, why its critical to fostering organizational resilience and wellbeing. The Engine Room will also share their experience implementing this co-leadership model, and the experience of other participant's reflections on their journey towards co-leadership models. Participants will also discuss how this model can impact equity, collaboration, wellbeing, funder relations, remote work, decision-making, and strategy setting. Space will also be provided to surface skills, knowledge, practices to be cultivated, and how we can collectively support each other.</small> | |<small>Co-leadership is an innovative model to enable sustainability, allowing for alternatives to single-leadership, distributing power and decision making within organizations. Learn about how this approach helps center trust, mutual care, and collaboration, while uplifting the differences in lived experiences. In addition, why its critical to fostering organizational resilience and wellbeing. The Engine Room will also share their experience implementing this co-leadership model, and the experience of other participant's reflections on their journey towards co-leadership models. Participants will also discuss how this model can impact equity, collaboration, wellbeing, funder relations, remote work, decision-making, and strategy setting. Space will also be provided to surface skills, knowledge, practices to be cultivated, and how we can collectively support each other.</small> | ||
|- | |- | ||
|'''<small>Community | |'''<small>Community networks circle</small>''' | ||
|<small>This circle brings together people working on building community internet infrastructure, and folks interested in learning and discussing the synergies between digital rights and community networks. It focuses on mapping out points of collaboration while addressing contextual digital rights needs towards advancing technology rights with local communities.</small> | |<small>This circle brings together people working on building community internet infrastructure, and folks interested in learning and discussing the synergies between digital rights and community networks. It focuses on mapping out points of collaboration while addressing contextual digital rights needs towards advancing technology rights with local communities.</small> | ||
|- | |- | ||
Line 436: | Line 421: | ||
|<small>In Central Asia, digital rights are facing a significant decline as governments introduce restrictive laws targeting independent media, journalists, bloggers and anti-corruption reporters. Online freedom is increasingly being curtailed by surveillance and privacy crackdowns. The circle brings together leading media lawyers and human rights activists from the region to address these pressing issues.</small> | |<small>In Central Asia, digital rights are facing a significant decline as governments introduce restrictive laws targeting independent media, journalists, bloggers and anti-corruption reporters. Online freedom is increasingly being curtailed by surveillance and privacy crackdowns. The circle brings together leading media lawyers and human rights activists from the region to address these pressing issues.</small> | ||
|- | |- | ||
|<small>''' | |<small>'''Cybersecurity Assessment Tool from Ford Foundation'''</small> | ||
|<small> | |<small>Learn how to build up and level up organizational cybersecurity</small> | ||
|- | |- | ||
|<small>'''Design sprint for everyone: Simple steps in building bite-size digital security tip cards'''</small> | |<small>'''Design sprint for everyone: Simple steps in building bite-size digital security tip cards'''</small> | ||
Line 447: | Line 429: | ||
|<small>'''Developing robust signalling channel'''</small> | |<small>'''Developing robust signalling channel'''</small> | ||
|<small>Participants will explore strategies around new signalling channels that might be able to help censored users get essential information to make anti-censorship connections.</small> <small>Users in highly censored regions face difficulty gaining access to anti-censorship tools given that they are prime targets of blocking by censors.</small> <small>A signalling channel is a highly available (i.e., difficult for censors to block), method of communication, typically low-bandwidth, that aims to provide users access to more robust anti-censorship tools. In most cases, a user makes a request to a signalling channel and gets a response that includes secret keys and/or addresses of proxies or bridges for users to make a censorship-resistant connection. Despite the existence of many censorship-resistant tools, options for signalling channels are limited. With many cloud providers opting to discontinue support for domain fronting.</small> | |<small>Participants will explore strategies around new signalling channels that might be able to help censored users get essential information to make anti-censorship connections.</small> <small>Users in highly censored regions face difficulty gaining access to anti-censorship tools given that they are prime targets of blocking by censors.</small> <small>A signalling channel is a highly available (i.e., difficult for censors to block), method of communication, typically low-bandwidth, that aims to provide users access to more robust anti-censorship tools. In most cases, a user makes a request to a signalling channel and gets a response that includes secret keys and/or addresses of proxies or bridges for users to make a censorship-resistant connection. Despite the existence of many censorship-resistant tools, options for signalling channels are limited. With many cloud providers opting to discontinue support for domain fronting.</small> | ||
|- | |- | ||
|<small>'''Digital rights after the fall:'''</small> <small>'''What should we do with the digital heritage of a dictatorship'''</small> | |<small>'''Digital rights after the fall:'''</small> <small>'''What should we do with the digital heritage of a dictatorship'''</small> | ||
|<small>When modern digital dictatorships fall, they will leave behind an all-inclusive digital police state system, as well as the possibility of the next political system to repeat the same mistakes using inherited tools. In this collaborative discussion, participants will talk about the use of digital tools by the Russian government, and their future. What data should be deleted forever? What systems will require strong policies governing their usage? What should we not be afraid to use for the good of the people? This is our call for help for participant’s collective imagination, hope, and creativity, as well as knowledge, and experience</small> | |<small>When modern digital dictatorships fall, they will leave behind an all-inclusive digital police state system, as well as the possibility of the next political system to repeat the same mistakes using inherited tools. In this collaborative discussion, participants will talk about the use of digital tools by the Russian government, and their future. What data should be deleted forever? What systems will require strong policies governing their usage? What should we not be afraid to use for the good of the people? This is our call for help for participant’s collective imagination, hope, and creativity, as well as knowledge, and experience</small> | ||
|- | |- | ||
|<small>'''Discriminatory UX:'''</small> <small>'''How software can gatekeep people'''</small> | |<small>'''Discriminatory UX:'''</small> <small>'''How software can gatekeep people'''</small> | ||
|<small>Many initiatives are built on powerful and usable software that we use every day. But what happens when software tools keep us from being included based on disabilities, citizenship or language skills? Participants will discuss tools they use for their work, and the issues they are facing.</small> | |<small>Many initiatives are built on powerful and usable software that we use every day. But what happens when software tools keep us from being included based on disabilities, citizenship or language skills? Participants will discuss tools they use for their work, and the issues they are facing.</small> | ||
|- | |- | ||
|<small>'''Exchanging feminist methodologies, politics and practice in capacity building and feminist technology'''</small> | |<small>'''Exchanging feminist methodologies, politics and practice in capacity building and feminist technology'''</small> | ||
|<small>This circle is for folks who identify as feminist tech trainers and feminist movement facilitators. Come learn about different approaches and methodologies to learning spaces, and why creative</small> <small>methodological approaches are so critical in shaping caring, collective and engaged training spaces.</small> <small>The internet can be, for many activists and marginal identities, a space of violence, surveillance and constantly evolving and confusing technologies. Come share and learn from a place of care, fun, creativity, awareness of the diversity of contextual realities and the knowledge of the trauma people carry.</small> <small>Learn about how to r</small><small>espon</small><small>d</small> <small>with methodologies that speak to challenging hiera</small><small>r</small><small>chies in training spaces and</small> <small>how to</small> <small>be agile and creative</small> <small>-</small> <small>cornerstones of learning spaces for feminists.</small> | |<small>This circle is for folks who identify as feminist tech trainers and feminist movement facilitators. Come learn about different approaches and methodologies to learning spaces, and why creative</small> <small>methodological approaches are so critical in shaping caring, collective and engaged training spaces.</small> <small>The internet can be, for many activists and marginal identities, a space of violence, surveillance and constantly evolving and confusing technologies. Come share and learn from a place of care, fun, creativity, awareness of the diversity of contextual realities and the knowledge of the trauma people carry.</small> <small>Learn about how to r</small><small>espon</small><small>d</small> <small>with methodologies that speak to challenging hiera</small><small>r</small><small>chies in training spaces and</small> <small>how to</small> <small>be agile and creative</small> <small>-</small> <small>cornerstones of learning spaces for feminists.</small> | ||
|- | |- | ||
|<small>'''From wristbands to smartphones:'''</small> <small>'''Designing for physical safety!'''</small> | |<small>'''From wristbands to smartphones:'''</small> <small>'''Designing for physical safety!'''</small> | ||
|<small>In this engaging hands-on workshop, Circulo and Natalia Project will share their firsthand experience designing technology and initiatives focused on physical safety. This workshop will provide a space for participants to discuss their strategies for safeguarding themselves and their networks in the field. Let's circle up and collaborate to enhance our collective knowledge about safety protocols and the features technology can embrace to boost safety. Circle Facilitators: Okthanks, Guardian Project, Civil Rights Defenders</small> | |<small>In this engaging hands-on workshop, Circulo and Natalia Project will share their firsthand experience designing technology and initiatives focused on physical safety. This workshop will provide a space for participants to discuss their strategies for safeguarding themselves and their networks in the field. Let's circle up and collaborate to enhance our collective knowledge about safety protocols and the features technology can embrace to boost safety. Circle Facilitators: Okthanks, Guardian Project, Civil Rights Defenders</small> | ||
|- | |- | ||
|<small> | |'''<small>Gaming the Far Right Anti-Human Rights Authoritarian Playbook - Big Tech Version</small>''' | ||
|<small> | |<small>Anti-democracy and anti-human rights forces are deploying authoritarian tactics to undermine institutions, silence / co-opt critics & gaslight the public. Civil society is standing up and fighting back with strategic tactics of their own. Together we are stronger with best practices to counter tactics used to threaten all of us. How is the far-right using tech to attack or influence institutional pillars to impose their vision of family, property, religion and citizenry? Approaching from lived experience working with front line defenders and whistleblowers on public sector accountability, lawfare, disinformation and propaganda, we will collectively map strategies being fought by civil society in different territories. We need to be ready to pre-empt and to respond to these attacks. </small> | ||
|- | |- | ||
|<small>'''Guardians of change: Strengthening cybersecurity in civil society'''</small> | |||
|<small>'''Guardians of | |||
|<small>Civil society organizations (CSOs) play a pivotal role in driving positive change in today's interconnected world. However, CSOs' impact can be hindered by cybersecurity threats. This circle aims to empower civil society leaders and activists with the knowledge and tools to bolster their cybersecurity defenses. Through discussions on emerging threats, best practices in digital security, and practical tips for implementation, participants will leave equipped to safeguard their organizations and advance their missions securely in the digital age. Join us in becoming the Guardians of Change in the fight to strengthen cybersecurity within civil society.</small> | |<small>Civil society organizations (CSOs) play a pivotal role in driving positive change in today's interconnected world. However, CSOs' impact can be hindered by cybersecurity threats. This circle aims to empower civil society leaders and activists with the knowledge and tools to bolster their cybersecurity defenses. Through discussions on emerging threats, best practices in digital security, and practical tips for implementation, participants will leave equipped to safeguard their organizations and advance their missions securely in the digital age. Join us in becoming the Guardians of Change in the fight to strengthen cybersecurity within civil society.</small> | ||
|- | |- | ||
|<small> | |'''<small>Hangout with the Jigsaw team</small>''' | ||
|<small> | |<small>Swing by to enjoy drinks and snacks while we get to Jigsaw team and other users!</small> | ||
|- | |- | ||
|<small>'''Identifying AI-generated content: how?'''</small> | |||
|<small>'''Identifying AI- | |||
|<small>Join us to discuss the issue of the identification of AI-Generated Content!</small> <small>How and when should we try to implement it? Whose responsibility should it be? How should it be regulated? Is it technically feasible to do it? How will it impact online content sharing, trust, privacy and the safety of civil society?</small><small>We'll talk about everything - join us!</small> | |<small>Join us to discuss the issue of the identification of AI-Generated Content!</small> <small>How and when should we try to implement it? Whose responsibility should it be? How should it be regulated? Is it technically feasible to do it? How will it impact online content sharing, trust, privacy and the safety of civil society?</small><small>We'll talk about everything - join us!</small> | ||
|- | |- | ||
|<small>'''Law and policy for IBSA'''</small> | |<small>'''Law and policy for IBSA'''</small> | ||
|<small>Participants will share their thoughts on the current state of law and policy protection against Image Based Sexual Abuse, and to identify measures that platforms and governments can take to address the concern effectively with minimal harm to encryption, freedom of speech and abuse by procedure.</small> | |<small>Participants will share their thoughts on the current state of law and policy protection against Image Based Sexual Abuse, and to identify measures that platforms and governments can take to address the concern effectively with minimal harm to encryption, freedom of speech and abuse by procedure.</small> | ||
|- | |- | ||
|<small>'''Nowhere feels safe:'''</small> <small>'''Digital transnational repression against women human rights defenders in exile'''</small> | |<small>'''Nowhere feels safe:'''</small> <small>'''Digital transnational repression against women human rights defenders in exile'''</small> | ||
Line 560: | Line 463: | ||
|<small>The Feminist Internet Research Network (FIRN) brings together feminist researchers and civic society organisations from the Global South to produce evidence and context-based analysis in issues such as access; algorithmic inequality and surveillance; online gender-based violence; and gendered labour in the digital economy. In this Circle, participants will share insights on governments’ and technology organisations’ preferences and selective attention when dealing with online and technology-facilitated violence; and the role of gender and sexual politics in this process.</small> | |<small>The Feminist Internet Research Network (FIRN) brings together feminist researchers and civic society organisations from the Global South to produce evidence and context-based analysis in issues such as access; algorithmic inequality and surveillance; online gender-based violence; and gendered labour in the digital economy. In this Circle, participants will share insights on governments’ and technology organisations’ preferences and selective attention when dealing with online and technology-facilitated violence; and the role of gender and sexual politics in this process.</small> | ||
|- | |- | ||
|'''<small> | |'''<small>Outline partner fireside chat</small>''' | ||
| | |<small>Hear from third party Outline providers about their experiences with key distribution and tell us how we can better support you.</small> | ||
|- | |||
|'''<small>Outline SDK Meetup</small>''' | |||
|<small>Learn about how you can use SDK for your app, meet other developers currently using it, Meet the Jigsaw team who built it, and ask all your questions. Outline SDK is a cross-platform library and set of tools for app developers to easily reuse Outline’s advanced networking strategies to protect apps and VPNs against network-level interference.</small> | |||
|- | |- | ||
| | |'''<small>Public Interest Technology Meet & Greet</small>''' | ||
|<small> | |<small>Are you or were you a fellow with Mozilla, Media Democracry Fund, Ford Foundation or any other public interest technology programs? Come meet some current and former members of these programs. Learn more about the work we do, and how to get involved in our activities.</small> | ||
|- | |- | ||
|<small>''' | |<small>'''Public Interest Technology Group'''</small> | ||
|<small> | |<small>Public Interest Technology (PIT Network) Alumni Network and Public Interest Technology Group PITG are two groups of technologists working inf the nexus of technology, human rights, digital rights and public interest. Joing this co-hosted session, and connect to former members the PITG and alumni from Mozilla, Media Democracry Fund, Ford Foundation fellowships, as well self-identified PITs and technologists to meet, share the work being done, and reflect on the values and the future of the field.</small> | ||
|- | |- | ||
|<small>'''Reimagination of freedom: Digital rights and kinship through "The Ground Screams to Whisper Ancestral Mapping"'''</small> | |<small>'''Reimagination of freedom: Digital rights and kinship through "The Ground Screams to Whisper Ancestral Mapping"'''</small> | ||
|<small>This Circle will explore how the ancestral mapping exercise from "The Ground Screams to Whisper" can serve as an innovative approach to addressing digital rights abuses exemplified by services like 23andMe. Participants will engage in a collaborative discussion on the intersections of digital rights personal data sovereignty and the importance of kinship and community in the digital age. Participants will delve into the potential of using arts and crafts-based ancestral mapping as a means to reimagine freedom and privacy in the context of digital rights.</small> | |<small>This Circle will explore how the ancestral mapping exercise from "The Ground Screams to Whisper" can serve as an innovative approach to addressing digital rights abuses exemplified by services like 23andMe. Participants will engage in a collaborative discussion on the intersections of digital rights personal data sovereignty and the importance of kinship and community in the digital age. Participants will delve into the potential of using arts and crafts-based ancestral mapping as a means to reimagine freedom and privacy in the context of digital rights.</small> | ||
|- | |- | ||
|<small>'''Resilient Networks:'''</small> <small>'''Hosting federated services in adversarial conditions'''</small> | |<small>'''Resilient Networks:'''</small> <small>'''Hosting federated services in adversarial conditions'''</small> | ||
|<small>A hands-on workshop addressing the deployment and sustainability of federated services in adversarial conditions. Participants will learn to navigate the complexities of maintaining decentralized networks in spaces of surveillance and restriction, drawing on real-world examples and practical techniques.</small> | |<small>A hands-on workshop addressing the deployment and sustainability of federated services in adversarial conditions. Participants will learn to navigate the complexities of maintaining decentralized networks in spaces of surveillance and restriction, drawing on real-world examples and practical techniques.</small> | ||
|- | |- | ||
|<small>'''Rising digital authoritarianism in South Asia'''</small> | |<small>'''Rising digital authoritarianism in South Asia'''</small> | ||
|<small>This session will explore the alarming rise of digital authoritarianism in South Asia. Participants will examine trends such as internet shutdowns, online censorship, increased surveillance, and the suppression of privacy rights and freedoms of speech and expression. Additionally, participants will discuss the significant challenges faced by human rights defenders, both inside and outside the courts, in their broader efforts to resist digital authoritarianism.</small> | |<small>This session will explore the alarming rise of digital authoritarianism in South Asia. Participants will examine trends such as internet shutdowns, online censorship, increased surveillance, and the suppression of privacy rights and freedoms of speech and expression. Additionally, participants will discuss the significant challenges faced by human rights defenders, both inside and outside the courts, in their broader efforts to resist digital authoritarianism.</small> | ||
|- | |- | ||
| | |'''<small>SWANA feminist imagination for digital space</small>''' | ||
|<small>The SWANA Feminist Imagination for Digital Space event aims to convene SWANA feminists, queers, and tech specialists to brainstorm and innovate in the realm of digital space through a feminist perspective</small> | |||
|<small> | |||
|- | |- | ||
|<small>'''Sustainable self-hosting?'''</small> | |<small>'''Sustainable self-hosting?'''</small> | ||
Line 614: | Line 493: | ||
|<small>Indo-Pacific is a critical region for global security and economy; yet, civil society in the region faces multiple challenges from digital authoritarianism. These challenges cannot be addressed by one group or a single expertise alone. In this circle, participants will hear from CSOs in the region and the lessons they have learned. In addition, participants will explore strategies to fill current gaps.</small> | |<small>Indo-Pacific is a critical region for global security and economy; yet, civil society in the region faces multiple challenges from digital authoritarianism. These challenges cannot be addressed by one group or a single expertise alone. In this circle, participants will hear from CSOs in the region and the lessons they have learned. In addition, participants will explore strategies to fill current gaps.</small> | ||
|- | |- | ||
|'''<small> | |'''<small>Targeted anti-phishing: building anti-phishing training resources tailored to each community’s needs and threats</small>''' | ||
|<small> | |<small>This session centers around Shira, a newly-released web app (available at https://shira.app) to help users develop their skills to identify and defeat phishing attacks on email but also on messaging apps like WhatsApp, SMS, Facebook Messenger, etc. Shira is a community-centric project, with an advisory board made of digital security educators from civil society groups from around the world. As we are planning the future of Shira, we are seeking to work with community members to understand: how can we improve Shira to make it as useful as possible to the digital rights community, to digital safety trainers, and to vulnerable communities in general? How can we ensure that Shira empowers communities to develop custom resources that match their specific needs and threats? Join us to shape the future of anti-phishing education!</small> | ||
|- | |- | ||
|<small>'''Technology, data and elections:'''</small> <small>'''The role of data and technologies in electoral processes'''</small> | |<small>'''Technology, data and elections:'''</small> <small>'''The role of data and technologies in electoral processes'''</small> | ||
Line 623: | Line 502: | ||
|<small>This circles is dedicated to testing Ouisync in simulated shutdown conditions. Ouisync is a p2p file sharing tool developed by eQualitie. Participants can test the app, providing critical feedback and insights to enhance its robustness and efficacy in real-world applications.</small> | |<small>This circles is dedicated to testing Ouisync in simulated shutdown conditions. Ouisync is a p2p file sharing tool developed by eQualitie. Participants can test the app, providing critical feedback and insights to enhance its robustness and efficacy in real-world applications.</small> | ||
|- | |- | ||
|<small> | |'''<small>The case of El Salvador:</small> <small>Strengthening civil society and media through capacity-building in a fragmented country</small>''' | ||
|<small>Participants will learn about the capacity-building program being run in El Salvador for CSO's and independent media outlets in the middle of surveillance and repression by the current government.</small> | |<small>Participants will learn about the capacity-building program being run in El Salvador for CSO's and independent media outlets in the middle of surveillance and repression by the current government.</small> | ||
|- | |- | ||
|<small>'''The future of decent work in the planetary digital capitalism:'''</small> <small>'''AI, automation and digital platforms'''</small> | |<small>'''The future of decent work in the planetary digital capitalism:'''</small> <small>'''AI, automation and digital platforms'''</small> | ||
|<small>This circle aims to generate dialogues and discussions around the future of work in the dawn of generative Artificial Intelligence, the automation of intellectual work and the increasing platformization of the economy. These developments have the potential of reshaping the planetary economy, imposing additional risks on human rights, but most importantly they challenge the work itself of digital rights defenders, policy makers and academics. This circle offers a scenario to discuss if we should adapt or resist these technologies, and both the tactics and strategies that should arise.</small> | |<small>This circle aims to generate dialogues and discussions around the future of work in the dawn of generative Artificial Intelligence, the automation of intellectual work and the increasing platformization of the economy. These developments have the potential of reshaping the planetary economy, imposing additional risks on human rights, but most importantly they challenge the work itself of digital rights defenders, policy makers and academics. This circle offers a scenario to discuss if we should adapt or resist these technologies, and both the tactics and strategies that should arise.</small> | ||
|- | |- | ||
|<small>'''The how and why of | |<small>'''The how and why of rapid response'''</small> | ||
|<small>We are often expected and incentivized to rapidly respond to censorship events and we want to. But at what cost? How can we respond in ways that are generative and beneficial? Is there a useful entropy we should introduce to rapid response?</small> | |<small>We are often expected and incentivized to rapidly respond to censorship events and we want to. But at what cost? How can we respond in ways that are generative and beneficial? Is there a useful entropy we should introduce to rapid response?</small> | ||
|- | |- | ||
Line 638: | Line 514: | ||
|<small>AI is no longer avoidable, and has crept quickly yet steadily out of mere pop phenomenon into the reality of how many of us operate as mission-driven, public interest organizations. Participants will discuss their fears, blind spots, and hopes for ethical and helpful interactions with these systems as the world moves increasingly forward with them. In addition, they will explore what could be done to address AI's impact on confidentiality, the integrity of our research (i.e. code, fuzzing, security), public communications, internal organizational security, and other aspects?</small> | |<small>AI is no longer avoidable, and has crept quickly yet steadily out of mere pop phenomenon into the reality of how many of us operate as mission-driven, public interest organizations. Participants will discuss their fears, blind spots, and hopes for ethical and helpful interactions with these systems as the world moves increasingly forward with them. In addition, they will explore what could be done to address AI's impact on confidentiality, the integrity of our research (i.e. code, fuzzing, security), public communications, internal organizational security, and other aspects?</small> | ||
|- | |- | ||
| | |'''<small>Protection of Digital Rights in Challenging Contexts: Central America against the UN Cybercrime Convention</small>''' | ||
|<small>The session will address the state of digital rights in Central America, highlighting the risks that the UN Cybercrime Convention represents for journalists and human rights defenders in repressive contexts.</small> | |||
|- | |- | ||
|<small>''' | |<small>'''Shape the future of Tella, file encryption on mobile, and human rights documentation'''</small> | ||
|<small> | |<small>In the next year, the Tella team will be focusing on improving the app's usability, accessibility, performance, and stability. We will also be adding exciting new features, including new back-end repositories to upload files and phone-to-phone and phone-to-computer file transfers. Join us to share your feedback and recommendations, so we can integrate them directly into our roadmap and improve Tella to properly address your needs!</small> | ||
|- | |- | ||
|<small>'''Updates about Tor and Tails'''</small> | |<small>'''Updates about Tor and Tails'''</small> | ||
Line 661: | Line 531: | ||
|<small>'''VPN provider transparency:'''</small> <small>'''Addressing threats that shady VPNs pose to VPN clients and providers'''</small> | |<small>'''VPN provider transparency:'''</small> <small>'''Addressing threats that shady VPNs pose to VPN clients and providers'''</small> | ||
|<small>Participants will learn about threats VPN clients and providers face from the myriad of VPN apps distributed on Google Play and elsewhere, and hear from current researchers looking at suspicious VPN providers and including potential links to malicious actors. Participants will</small> <small>explore current gaps in understanding VPN related threats, map out new issues and challenges, and explore opportunities and solutions to address them.</small> | |<small>Participants will learn about threats VPN clients and providers face from the myriad of VPN apps distributed on Google Play and elsewhere, and hear from current researchers looking at suspicious VPN providers and including potential links to malicious actors. Participants will</small> <small>explore current gaps in understanding VPN related threats, map out new issues and challenges, and explore opportunities and solutions to address them.</small> | ||
|} | |} | ||
<br> | <br> | ||
Line 703: | Line 554: | ||
|<small>Come by to have tea and chat with the Guardian Project team about their work on privacy-preserving measurement, internet shutdown resilience, anti-censorship and more!</small><small>https://cleaninsights.org/gg</small> | |<small>Come by to have tea and chat with the Guardian Project team about their work on privacy-preserving measurement, internet shutdown resilience, anti-censorship and more!</small><small>https://cleaninsights.org/gg</small> | ||
|- | |- | ||
|<small>'''[https:// | |<small>'''[https://splintercon.net/global-gathering-24/ SplinterCon] by eQualitie Village'''</small> | ||
|<small>[https://equalit.ie/ eQualitie]</small> | |<small>[https://equalit.ie/ eQualitie]</small> | ||
|<small>Join us at the SplinterCon booth, an initiative by eQualitie dedicated to exploring, challenging, and counteracting global internet fragmentation. Our focus is on resilient, decentralized tools, along with the developers and communities that support them.At our booth, you can:• Breakout from a simulated shutdown environment that mimics a pocket splinternet.• Participate in interactive workshops that reflect the current state of the web.• Test circumvention tools.• Share your experiences with internet fragmentation.• Learn from the expertise of advocates working in affected regions.The SplinterCon booth is a space for discussing the challenges and opportunities of a constantly fragmenting internet, offering you a hands-on experience of navigating and thriving in this evolving landscape.</small> | |<small>Join us at the SplinterCon booth, an initiative by eQualitie dedicated to exploring, challenging, and counteracting global internet fragmentation. Our focus is on resilient, decentralized tools, along with the developers and communities that support them.At our booth, you can:• Breakout from a simulated shutdown environment that mimics a pocket splinternet.• Participate in interactive workshops that reflect the current state of the web.• Test circumvention tools.• Share your experiences with internet fragmentation.• Learn from the expertise of advocates working in affected regions.The SplinterCon booth is a space for discussing the challenges and opportunities of a constantly fragmenting internet, offering you a hands-on experience of navigating and thriving in this evolving landscape.</small> | ||
Line 713: | Line 564: | ||
|'''<small>Outline Village</small>''' | |'''<small>Outline Village</small>''' | ||
|<small>[https://getoutline.org/ Outline]</small> | |<small>[https://getoutline.org/ Outline]</small> | ||
|<small>Outline is an open-source project created by Jigsaw that provides a safer way for individuals and organizations to access the open internet. Jigsaw is a unit within Google that explores threats to open societies, and builds technology that inspires scalable solutions.</small> | |<small>Join the Outline Village meet the team behind Outline Manager, Outline SDK, and other tools! Outline is an open-source project created by Jigsaw that provides a safer way for individuals and organizations to access the open internet. Jigsaw is a unit within Google that explores threats to open societies, and builds technology that inspires scalable solutions.</small> | ||
|- | |- | ||
|'''<small>WANA Café</small>''' | |'''<small>WANA Café</small>''' | ||
|<small>[https://smex.org/ SMEX]</small> | |<small>[https://smex.org/ SMEX]</small> | ||
|<small>Join our booth for dialogues on WANA’s digital future and a taste of local flavors! | |<small>Join our booth for dialogues on WANA’s digital future and a taste of local flavors!</small> | ||
|- | |- | ||
|style="background: #c0e590;"|<center><big>'''Booths'''</big></center> | |style="background: #c0e590;"|<center><big>'''Booths'''</big></center> | ||
Line 723: | Line 574: | ||
|style="background: #c0e590;"|<center>'''<big>Booth Description</big></center>''' | |style="background: #c0e590;"|<center>'''<big>Booth Description</big></center>''' | ||
|- | |- | ||
|<small> | |'''<small>Arkam</small>''' | ||
| | |[https://idaraty.tn/fr <small>Idaraty</small>] | ||
|<small> | |<small>Idaraty is a CivicTech startup launched in 2020. Idaraty develops innovative solutions to accelerate citizen-focused digital transformation and contributes to access to information to different actors in order to foster a better digital ecosystem. Idaraty have several projects but the focus for the GG is the Project Arkam (Numbers in English). Arkam is a platform that aggregates public policy-related data, statistics, and stories and presents them in an easy-to-use format for journalists, content creators, and decision-makers.</small> | ||
|- | |- | ||
|<small>'''Amnesty Tech'''</small> | |<small>'''Amnesty Tech'''</small> | ||
Line 739: | Line 586: | ||
|<small>Amnezia VPN is a simple and free app to run a self-hosted VPN with high privacy requirements. The idea for AmneziaVPN appeared in 2020 during the first Demhack hackathon, and then it was further developed with Privacy Accelerator. We desired to empower users of all technical skill levels to create their own VPN, for simple blocking circumvention and also to ensure privacy and protection of their data. It was important to us to create a free and open source application so that no user data is collected and there is no even hypothetical possibility of data leakage.</small> | |<small>Amnezia VPN is a simple and free app to run a self-hosted VPN with high privacy requirements. The idea for AmneziaVPN appeared in 2020 during the first Demhack hackathon, and then it was further developed with Privacy Accelerator. We desired to empower users of all technical skill levels to create their own VPN, for simple blocking circumvention and also to ensure privacy and protection of their data. It was important to us to create a free and open source application so that no user data is collected and there is no even hypothetical possibility of data leakage.</small> | ||
|- | |- | ||
|<small> | |'''<small>Coaching, Leadership and Fundraising Support</small>''' | ||
|<small>[https://www. | |<small>[https://www.springstrategies.org Spring]</small> | ||
|<small> | |<small>Spring is a leadership development partner that has worked with changemakers from 1,000+ organizations in 100+ countries over the past 20 years. Visit our booth to sign up for a complimentary 45-minute coaching session in English, Spanish, or Portuguese throughout the Gathering! We can support you to solve the questions keeping you up at night— donor prospecting and communicating with funders, work-life balance, stress, job transitions, delegating effectively, navigating uncertainty and more. Spots are limited so register soon for your coaching session. https://www.springstrategies.org/coaching-global-gathering</small> | ||
|- | |- | ||
|<small>'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks'''</small> | |<small>'''Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks'''</small> | ||
|<small>[https://ancestraguia.wordpress.com Ancestra] & [https://noisradio.co Nois Radio]</small> | |<small>[https://ancestraguia.wordpress.com Ancestra] & [https://noisradio.co Nois Radio]</small> | ||
|<small>This is a calm, deep listening spaces booth. Come to this booth for Colombian coffee or herbal tea straight from our mountains, to meet and talk about radio. In Colombia, radio enables populations living in remote areas to exercise their human right to communication. What is alternative radio for? Here, we will try to learn about the hopeful power of digital and analog sound content in geographical and sociopolitical contexts where democracy and rights are constantly at stake.</small> | |<small>This is a calm, deep listening spaces booth. Come to this booth for Colombian coffee or herbal tea straight from our mountains, to meet and talk about radio. In Colombia, radio enables populations living in remote areas to exercise their human right to communication. What is alternative radio for? Here, we will try to learn about the hopeful power of digital and analog sound content in geographical and sociopolitical contexts where democracy and rights are constantly at stake.</small> | ||
|- | |- | ||
|<small>'''Digital Justice House'''</small> | |<small>'''Digital Justice House'''</small> | ||
|<small>[https://www.digitaljustice.house/ Digital Justice House]</small> | |<small>[https://www.digitaljustice.house/ Digital Justice House]</small> | ||
|<small>Learn more about the [[Digital Justice House]] initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work.</small> | |<small>Learn more about the [[Digital Justice House]] initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work.</small> | ||
|- | |- | ||
|<small>'''Digital Defenders Partnership'''</small> | |<small>'''Digital Defenders Partnership'''</small> | ||
|<small>[https://www.digitaldefenders.org/ Digital Defenders Partnership]</small> | |<small>[https://www.digitaldefenders.org/ Digital Defenders Partnership]</small> | ||
|<small>Digital Defenders Partnership (DDP) is an international programme that contributes to strengthening the resilience of Human Rights Defenders (HRDs) by increasing their digital security through a holistic and sustainable approach. We envision a world in which HRDs contribute to social justice while enjoying safety, well-being, freedom, and dignity.</small> | |<small>Digital Defenders Partnership (DDP) is an international programme that contributes to strengthening the resilience of Human Rights Defenders (HRDs) by increasing their digital security through a holistic and sustainable approach. We envision a world in which HRDs contribute to social justice while enjoying safety, well-being, freedom, and dignity.</small> | ||
|- | |- | ||
|<small>'''Digital Security Lab Ukraine'''</small> | |<small>'''Digital Security Lab Ukraine'''</small> | ||
|<small>[https://dslua.org/ Digital Security Lab Ukraine]</small> | |<small>[https://dslua.org/ Digital Security Lab Ukraine]</small> | ||
|<small>Digital Security Lab Ukraine is a non-profit organisation, based in Kyiv, Ukraine, whose main objective is to support safe and free exercise of human rights online by strengthening the digital security capacity of CSOs, human rights defenders and journalists, and advocating for enabling state and corporate policies in the field of digital rights.</small> | |<small>Digital Security Lab Ukraine is a non-profit organisation, based in Kyiv, Ukraine, whose main objective is to support safe and free exercise of human rights online by strengthening the digital security capacity of CSOs, human rights defenders and journalists, and advocating for enabling state and corporate policies in the field of digital rights.</small> | ||
|- | |- | ||
|<small>'''Freedom of the Press Foundation'''</small> | |<small>'''Freedom of the Press Foundation'''</small> | ||
Line 804: | Line 610: | ||
|<small>Freedom of the Press Foundation (FPF) is a nonprofit working at the intersection of human rights, journalism, and technology. A unique organization in the security and internet freedom community, FPF has pioneered a multilayered approach to preserving and extending the privacy and security of journalists in the interest of advancing a free, adversarial press.</small> | |<small>Freedom of the Press Foundation (FPF) is a nonprofit working at the intersection of human rights, journalism, and technology. A unique organization in the security and internet freedom community, FPF has pioneered a multilayered approach to preserving and extending the privacy and security of journalists in the interest of advancing a free, adversarial press.</small> | ||
<small>Our digital security training team provides support to journalists and media-makers working in the public interest through trainings, consulting, and security assessments; run ongoing digital security programs, and participate in conferences and events around the world throughout the year. We also write security guides that address common digital security concerns and conduct research on the latest digital security developments.</small> | <small>Our digital security training team provides support to journalists and media-makers working in the public interest through trainings, consulting, and security assessments; run ongoing digital security programs, and participate in conferences and events around the world throughout the year. We also write security guides that address common digital security concerns and conduct research on the latest digital security developments.</small> | ||
|- | |||
|'''<small>From Palestine to Lebanon: Reflecting on global digital rights</small>''' | |||
|<small>Palestine Coalition</small> | |||
|<small>Israel’s most recent attack on Lebanon – booby trapping thousands of pagers and walkie talkies – left almost 40 martyrs and over 3,500 serious injuries. This attack has significantly blurred our mental model of digital security and our understanding of risk assessments. This attack follows 12 months of Israel’s genocide of Gaza which has left over 40,000 martyrs. In Gaza and the rest of Palestine, Israeli occupation forces have employed a suite of technologies to kill, surveil, and occupy: from artificial intelligence, digital surveillance, and information control mechanisms.</small> | |||
<small>We want to invite researchers, technologists, academics, and trainers to reflect on how tech-enabled genocide and warfare affects the lens through which we think about our works in digital rights and internet freedom. Moreover, we seek to exit our siloes and work more in intersection with our geopolitical realities.</small> | |||
|- | |- | ||
|<small>'''GlobaLeaks'''</small> | |<small>'''GlobaLeaks'''</small> | ||
Line 817: | Line 629: | ||
|<small>[https://greenhost.net Greenhost]</small> | |<small>[https://greenhost.net Greenhost]</small> | ||
|<small>Greenhost is a digital infrastructure provider in the community. We help organizations to have a safe and trusted place on the internet. The booth will be a place to connect with our users and potential new users.</small> | |<small>Greenhost is a digital infrastructure provider in the community. We help organizations to have a safe and trusted place on the internet. The booth will be a place to connect with our users and potential new users.</small> | ||
|- | |- | ||
|<small>'''How local Pakistani apps puts vulnerable citizens at risk of surveillance and targeted attacks'''</small> | |<small>'''How local Pakistani apps puts vulnerable citizens at risk of surveillance and targeted attacks'''</small> | ||
|<small>[https://www.opentech.fund/fellows/sana-habib/ Arizona State University, OTF ICFP Fellow]</small> | |<small>[https://www.opentech.fund/fellows/sana-habib/ Arizona State University, OTF ICFP Fellow]</small> | ||
|<small>Understand how vulnerabilities and development shortcomings in Pakistani apps risk exposing vulnerable citizens to surveillance and targeted attacks.</small> | |<small>Understand how vulnerabilities and development shortcomings in Pakistani apps risk exposing vulnerable citizens to surveillance and targeted attacks.</small> | ||
|- | |- | ||
|<small>'''[https://humanrights.fb.com/ Human Rights @ Meta]'''</small> | |<small>'''[https://humanrights.fb.com/ Human Rights @ Meta]'''</small> | ||
|<small>[https://about.meta.com/ Meta]</small> | |<small>[https://about.meta.com/ Meta]</small> | ||
|<small>Meta's Human Rights Team will be present to answer your questions and hear your feedback about our policies and work to protect human rights defenders across Facebook, Instagram, and WhatsApp. We'll also be hosting two interactive sessions: a tabletop exercise simulating how we respond to conflict and crisis situations, and a structured consultation and update on our Trusted Partner and HRD escalation channels.</small> | |<small>Meta's Human Rights Team will be present to answer your questions and hear your feedback about our policies and work to protect human rights defenders across Facebook, Instagram, and WhatsApp. We'll also be hosting two interactive sessions: a tabletop exercise simulating how we respond to conflict and crisis situations, and a structured consultation and update on our Trusted Partner and HRD escalation channels.</small> | ||
|- | |- | ||
|<small>'''International and regional projects looking at the intersection of digital rights and freedom of expression'''</small> | |<small>'''International and regional projects looking at the intersection of digital rights and freedom of expression'''</small> | ||
Line 871: | Line 657: | ||
|<small>[https://josa.ngo/ Jordan Open Source Association]</small> | |<small>[https://josa.ngo/ Jordan Open Source Association]</small> | ||
|<small>The JOSA booth will be open for discussions on various regional topics, including digital inclusion incident response, help desk services, open source philosophy, open governance, and open data. We will also showcase our work and portal, highlighting our contributions and initiatives in these areas and to engage with visitors on these subjects.</small> | |<small>The JOSA booth will be open for discussions on various regional topics, including digital inclusion incident response, help desk services, open source philosophy, open governance, and open data. We will also showcase our work and portal, highlighting our contributions and initiatives in these areas and to engage with visitors on these subjects.</small> | ||
|- | |- | ||
| <small>Datávoros: ¿Qué tanto se alimentan de ti tus aplicaciones favoritas? |<small>'''Kaleidoscope: Reliable and convenient censorship circumvention mirroring solution'''</small> | | <small>Datávoros: ¿Qué tanto se alimentan de ti tus aplicaciones favoritas? |<small>'''Kaleidoscope: Reliable and convenient censorship circumvention mirroring solution'''</small> | ||
|<small>[https://doxa.team/ DOXA]</small> | |<small>[https://doxa.team/ DOXA]</small> | ||
|<small>We - a media in exile called DOXA ([https://doxa.team/ doxa.team]) - have created a solution that automatically creates unblocked mirrors of websites blocked in regions with harsh censorship (such as Belarus, russia Uzbekistan etc). It allows us to always stay one step ahead of censorship agencies and assure readers have access to independent information!</small> <small>We are eager to provide our tool to other media outlets and human rights organisations and are already doing it for 10+ organisations in russia, and we believe this number will most likely triple by the moment our Booth takes place!</small> | |<small>We - a media in exile called DOXA ([https://doxa.team/ doxa.team]) - have created a solution that automatically creates unblocked mirrors of websites blocked in regions with harsh censorship (such as Belarus, russia Uzbekistan etc). It allows us to always stay one step ahead of censorship agencies and assure readers have access to independent information!</small> <small>We are eager to provide our tool to other media outlets and human rights organisations and are already doing it for 10+ organisations in russia, and we believe this number will most likely triple by the moment our Booth takes place!</small> | ||
|- | |- | ||
|<small>'''LibResilient'''</small> | |<small>'''LibResilient'''</small> | ||
Line 892: | Line 669: | ||
|<small>[https://maadix.net MaadiX]</small> | |<small>[https://maadix.net MaadiX]</small> | ||
|<small>MaadiX is a privacy-oriented, affordable and easy-to-use solution that puts users back in control of their data and communications without the need for technical expertise or large investments.It provides one-click installation and maintenance of free and open source online tools on own servers through an easy and intuitive graphical interface.</small> | |<small>MaadiX is a privacy-oriented, affordable and easy-to-use solution that puts users back in control of their data and communications without the need for technical expertise or large investments.It provides one-click installation and maintenance of free and open source online tools on own servers through an easy and intuitive graphical interface.</small> | ||
|- | |- | ||
|<small>'''Numun Fund'''</small> | |<small>'''Numun Fund'''</small> | ||
Line 904: | Line 677: | ||
|<small>[https://omidyar.com/ Omidyar Network]</small> | |<small>[https://omidyar.com/ Omidyar Network]</small> | ||
|<small>Come learn more about Omidyar Network, our approach to grantmaking, and our strategy as it relates to Digital Trust and Safety.</small> | |<small>Come learn more about Omidyar Network, our approach to grantmaking, and our strategy as it relates to Digital Trust and Safety.</small> | ||
|- | |- | ||
|<small>'''0xche'''</small> | |<small>'''0xche'''</small> | ||
|<small>[https://www.0xche.org 0xche]</small> | |<small>[https://www.0xche.org 0xche]</small> | ||
|<small>We want to showcase our current lines of work and ongoing programs to explore potential partnerships with other organizations, and invite organizations to apply to our Rapid Response and Security Lab programs.</small> | |<small>We want to showcase our current lines of work and ongoing programs to explore potential partnerships with other organizations, and invite organizations to apply to our Rapid Response and Security Lab programs.</small> | ||
|- | |- | ||
| <small>Ve Sin Filtro's PiProbe and project dashboards |<small>'''Open Technology Fund'''</small> | | <small>Ve Sin Filtro's PiProbe and project dashboards |<small>'''Open Technology Fund'''</small> | ||
|<small>[http://opentech.fund Open Technology Fund]</small> | |<small>[http://opentech.fund Open Technology Fund]</small> | ||
|<small>OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs.</small> | |<small>OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs.</small> | ||
|- | |||
|<small>'''Tech-facilitated abuse within the context of domestic abuse'''</small> | |||
|<small>[https://www.frauenhauskoordinierung.de/ Frauenhauskoordinierung]</small> | |||
|<small>I am working in a project which is assisting front-line workers of women shelters and councelling centers to better assist survivors of tech-facilitated abuse. Tech-facilitated abuse is rising and a growing threat for the safety of survivors and women shelters. I would like to engage and raise awareness about: what is tech-facilitated abuse in intimate (ex)relationships? How can digital security trainings for frontline workers improve counseling? Important of holistic approaches, and lobbying for IT helplines for frontline workers and survivors</small> | |||
|- | |- | ||
|'''<small>The Palestine Booth</small>''' | |'''<small>The Palestine Booth</small>''' | ||
|<small> | |<small>Collective</small> | ||
|<small>The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza.</small> | |<small>The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza.</small> | ||
|- | |- | ||
|<small>'''Preserve truth to power with Save by OpenArchive'''</small> | |<small>'''Preserve truth to power with Save by OpenArchive'''</small> | ||
|<small>[https://open-archive.org/save OpenArchive]</small> | |<small>[https://open-archive.org/save OpenArchive]</small> | ||
|<small>People armed with mobile devices are becoming history’s first responders, amassing evidentiary records of injustice. Save helps them Share, Archive, Verify, Encrypt this crucial evidence. This will be a participatory demo where we’ll do a demo and foster strategic partnerships with those interested in deploying Save or setting up archives in their communities.</small> | |<small>People armed with mobile devices are becoming history’s first responders, amassing evidentiary records of injustice. Save helps them Share, Archive, Verify, Encrypt this crucial evidence. This will be a participatory demo where we’ll do a demo and foster strategic partnerships with those interested in deploying Save or setting up archives in their communities.</small> | ||
|- | |- | ||
|<small>'''Qubes OS Booth'''</small> | |<small>'''Qubes OS Booth'''</small> | ||
|<small>[https://www.qubes-os.org/ Qubes OS]</small> | |<small>[https://www.qubes-os.org/ Qubes OS]</small> | ||
|<small>Qubes OS is a free and open-source security-focused operating system that strives to provide exceptional security, flexibility, and control over your computer. It is also increasingly accessible to users of various level of technical skills. In this booth, I want to showcase Qubes OS capabilities and gather feedback from existing and prospective users.</small> | |<small>Qubes OS is a free and open-source security-focused operating system that strives to provide exceptional security, flexibility, and control over your computer. It is also increasingly accessible to users of various level of technical skills. In this booth, I want to showcase Qubes OS capabilities and gather feedback from existing and prospective users.</small> | ||
|- | |- | ||
|<small>'''SafeCommNet: Decentralized, secure, and private communication system for crisis and disaster management'''</small> | |<small>'''SafeCommNet: Decentralized, secure, and private communication system for crisis and disaster management'''</small> | ||
|<small>[https://asorcom.net/ Alternative Solutions for Rural Communities (ASORCOM)]</small> | |<small>[https://asorcom.net/ Alternative Solutions for Rural Communities (ASORCOM)]</small> | ||
|<small>Visit our booth to learn about SafeCommNet, an innovative decentralized communication system designed for use during political unrest, crises, and disasters. Our platform ensures secure and private communication, enabling communities to maintain connectivity and coordination even in the most challenging situations. Discover how SafeCommNet can support resilience and safety through cutting-edge technology.</small> | |<small>Visit our booth to learn about SafeCommNet, an innovative decentralized communication system designed for use during political unrest, crises, and disasters. Our platform ensures secure and private communication, enabling communities to maintain connectivity and coordination even in the most challenging situations. Discover how SafeCommNet can support resilience and safety through cutting-edge technology.</small> | ||
|- | |- | ||
|<small>'''Safety in exile: Practical guide to avoiding transnational harassment'''</small> | |<small>'''Safety in exile: Practical guide to avoiding transnational harassment'''</small> | ||
|<small>Radio Free Asia</small> | |<small>Radio Free Asia</small> | ||
|<small>Transnational repression is a tactic used by governments such as China, Iran, and Russia, to reach across borders to harass and intimidate diaspora communities, journalists and human rights defenders living in exile. Out of myriad potential responses, we will showcase best practices and advise on the real world applicability of digital and physical security guidance in the face of such threats.</small> | |<small>Transnational repression is a tactic used by governments such as China, Iran, and Russia, to reach across borders to harass and intimidate diaspora communities, journalists and human rights defenders living in exile. Out of myriad potential responses, we will showcase best practices and advise on the real world applicability of digital and physical security guidance in the face of such threats.</small> | ||
|- | |- | ||
|<small>'''The current status of a new privacy-preserving and decentralized messenger'''</small> | |<small>'''The current status of a new privacy-preserving and decentralized messenger'''</small> | ||
|<small>[https://phnx.im Phoenix R&D / Messaging Layer Security (MLS)]</small> | |<small>[https://phnx.im Phoenix R&D / Messaging Layer Security (MLS)]</small> | ||
|<small>We’re building a new generation of open-source messenger combining privacy, security, and decentralization. This is based on the Messaging Layer Security protocol (https://blog.phnx.im/rfc-9420-mls/) -a new standard for end-to-end encryption we co-authored-, and a tech stack we have been developing. In this booth, we want to showcase the current status of our project to develop a generation of new privacy-preserving and decentralized messenger with a beta coming soon. We will also have a circle session on the same day at 16:30 where we want to discuss with you what the future of secure messaging might look like and what your needs are for messaging applications.</small> | |<small>We’re building a new generation of open-source messenger combining privacy, security, and decentralization. This is based on the Messaging Layer Security protocol (https://blog.phnx.im/rfc-9420-mls/) -a new standard for end-to-end encryption we co-authored-, and a tech stack we have been developing. In this booth, we want to showcase the current status of our project to develop a generation of new privacy-preserving and decentralized messenger with a beta coming soon. We will also have a circle session on the same day at 16:30 where we want to discuss with you what the future of secure messaging might look like and what your needs are for messaging applications.</small> | ||
|- | |||
|'''<small>The Powered by the People Activist Help Desk</small>''' | |||
|<small>[https://www.partnersglobal.org/ PartnerGlobal]</small> | |||
|<small>The team will discuss the need for a 24/7 rapid response support channel for activists and movements. They will feature the Powered by the People (PxP) Help Desk, discussing the successes, gaps, and mechanisms behind providing support in the form of: legal, rapid response, and psychosocial support for activists around the world.</small> | |||
|- | |- | ||
|<small>'''The work of the Internetbolivia.org Foundation'''</small> | |<small>'''The work of the Internetbolivia.org Foundation'''</small> | ||
Line 979: | Line 722: | ||
|<small>The InternetBolivia.org Foundation has been working for more than 6 years in the areas of Digital Economy, Internet Regulation, Digital Inclusion, Fight against Digital Violence, Innovation and Digitalization, Technology and Digital Security.</small><small>We will show all our achievements, our publications, workshops and projects that we have been doing in Bolivia.</small> | |<small>The InternetBolivia.org Foundation has been working for more than 6 years in the areas of Digital Economy, Internet Regulation, Digital Inclusion, Fight against Digital Violence, Innovation and Digitalization, Technology and Digital Security.</small><small>We will show all our achievements, our publications, workshops and projects that we have been doing in Bolivia.</small> | ||
|- | |- | ||
|<small>'''Usability and | |<small>'''Usability and Accessibility Clinic'''</small> | ||
|<small>[https://www.a11ylab.com/ Accessibility Lab]</small><small>[https://www.opentech.fund/labs/uxd-lab/ UXD Lab]<br>[https://ura.design/ Ura Design]<br>[https://www.decentdesign.org/ Decent Design]</small> | |<small>[https://www.a11ylab.com/ Accessibility Lab],</small><br><small>[https://www.opentech.fund/labs/uxd-lab/ UXD Lab],</small><br><small>[https://ura.design/ Ura Design],</small><br><small>[https://www.decentdesign.org/ Decent Design],</small><br><small>[https://superbloom.design/ Superbloom]</small> | ||
|<small>Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist.</small> | |<small>Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist.</small> | ||
|} | |} |
Latest revision as of 11:33, 28 September 2024
Plenary
11:30 to 13:00 Job Fair & Networking Hour
The Job Fair is a great place to check out organizations that are hiring now, or just wanting to meet talent. This is a great option for folks that are new to the digital rights field to also learn what skills employers are looking for. Checking out the list of participating organizations in the 2024 Job Fair!.
Not interested? Well, you can still bring your own lunch, or purchase a lunch at one of the many food vendors, or just network with folk!.
Self-Organized Socials | |
Check out the list of self-organized Socials taking place at off-site (but close by) locations, ranging from meetups to numerous activities. https://pad.riseup.net/p/GG-Socials-2024 | |
A Sample of Today's Socials: Sunrise @ the Beach Meetup |
BoothsEach booth has a number, which can be found on top, center above a booth's "window". You can find detailed Booths & Villages descriptions at the bottom of this page... | |||||
September 28 | |||||
---|---|---|---|---|---|
13:00 - 15:00 | 15:30 - 17:30 | ||||
Location | |||||
Booth 1 | |||||
Booth 2 | Introducing the DigiSec.Wiki: Come Collaborate with Us! | EngageMedia | Global Voices | Global Voices | |
Booth 3 | SplinterCon by eQualitie Village | eQualitie | SplinterCon by eQualitie Village | eQualitie | |
Booth 4a | Tech-facilitated abuse within the context of domestic abuse | Frauenhauskoordinierung | Numun Fund | Numun Fund | |
Booth 4b | Qubes OS Booth | Qubes OS | Arkam | Idaraty | |
Booth 5 | Join the Localization Lab Community! | Localization Lab | Digital Security Lab Ukraine | Digital Security Lab Ukraine | |
Booth 6 | The current status of a new privacy-preserving and decentralized messenger | Phoenix R&D / Messaging Layer Security (MLS) | Kaleidoscope: Reliable and convenient censorship circumvention mirroring solution | DOXA | |
Booth 7 | Usability and Accessibility Clinic | Accessibility Lab, UXD Lab, Ura Design, Decent Design, Superbloom |
Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks | Ancestra | |
Booth 8 | The Powered by the People Activist Help Desk | PartnersGlobal | SafeCommNet: Decentralized, Secure, and Private Communication System for Crisis and Disaster Management | Alternative Solutions for Rural Communities (ASORCOM) | |
Booth 9 | Tor Project and Tails Village | The Tor Project and Tails | Tor Project and Tails Village | The Tor Project and Tails | |
Booth 10 | Open Technology Fund | Open Technology Fund | Human Rights @ Meta | Meta | |
Booth 11 | The Work of the Internetbolivia.org Foundation | Fundación Internetbolivia.org | Preserve Truth to Power with Save by OpenArchive | OpenArchive | |
Booth 12 | The Calyx Institute Village | The Calyx Institute | The Calyx Institute Village | The Calyx Institute | |
Booth 13 | AmneziaVPN | AmneziaVPN | LibResilient | LibResilient | |
Booth 14 | GlobaLeaks | GlobaLeaks | Digital Defenders Partnership | Digital Defenders Partnership | |
Booth 15 | The Work of the Internetbolivia.org Foundation | Fundación Internetbolivia.org | JAAKLAC Community | JAAKLAC | |
Booth 16 | How Local Pakistani Apps Puts Vulnerable Citizens at Risk of Surveillance and Targeted Attacks | Arizona State University | Safety in exile: Practical guide to avoiding transnational harassment | Radio Free Asia | |
Booth 17 | Omidyar Network’s Digital Trust and Safety Strategy | Omidyar Network | Amnesty Tech | Amnesty International (Tech Programme) | |
Booth 18 | MaadiX | MaadiX | 0xche | 0xche | |
Booth 19 | Clean Insights Tea House | Guardian Project | Clean Insights Tea House | Guardian Project | |
Booth 21 | APC Village | Association for Progressive Communications | APC Village | Association for Progressive Communications | |
Booth 22 | International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | |
Booth 79 | Outline Village | Outline | Outline Village | Outline | |
Booth 80 | Greenhost | Greenhost | Freedom of the Press Foundation | Freedom of the Press Foundation | |
Booth 81 | WANA Café | SMEX | WANA Café | SMEX | |
Booth 82 | The Palestine Booth | Collective | JOSA - Jordan Open Source Association | Jordan Open Source Association | |
Booth 83a | Digital Justice House | Team CommUNITY | |||
Booth 83b | Coaching, Leadership and Fundraising Support | Spring Strategies |
Evening Celebration | |
Calyx Institute Karaoke Party!
Time: 18:00 Get your song list ready and come prepared for the return of karaoke at the Global Gathering!!!! This is the time to unleash your inner entertainer, and let us see your moves! |
Partners
Equity Fund Sponsors
Circle Descriptions
Amplifying research on digital rights through popular culture | How can research and digital rights organizations do more to democratize access to information about the future of digital rights? Researchers, technologists, journalists, activists, and creatives are invited to explore together the creative use of media to amplify information about privacy, safety, and the threats of the future. This includes discussing how we can cut through cynicism and apathy about digital autonomy, and how to use popular culture, including film, music, and social media, to put key safety and access information in front of more people. |
Building a new privacy-preserving and decentralized messenger | Join the Phoenix R&D team to discuss what the future of secure messaging might look like and what your needs are for messaging applications.Phoenix R&D is currently building a new generation of open-source messenger combining privacy, security, and decentralization. It is based on a new standard for end-to-end encryption they co-authored (Messaging Layer Security protocol https://blog.phnx.im/rfc-9420-mls/) and a tech stack they have been developing. |
Building the future of escalation channels with social media platforms | What would an efficient escalation channel look like if NGOs had a clear, organized system of communication with social media platforms to support targets of digital attacks? Built on our (un)common lived experiences of escalation channels with social media platforms and previous research, this session will introduce the outcome of a workshop we will have in Estoril, ahead of this Circle. Together with the Global Gathering community, we will discuss indicators for success for effective localized systems and workflows between CSOs and social media platforms when a crisis occurs. |
Challenges in data-driven journalism | Engage in a collaborative session that delves into the challenges and opportunities in data-driven journalism. Share experiences, tools, and techniques that aid journalists in uncovering and narrating impactful stories through data. |
Clean Insights Tea Time | Join the Guardian Project team twice a day to delight in delicious ethical and organic Insightful Tea while chatting about ways in which your work can detox from harmful tracking and data collection practices. |
Co-leadership for sustainable organizations | Co-leadership is an innovative model to enable sustainability, allowing for alternatives to single-leadership, distributing power and decision making within organizations. Learn about how this approach helps center trust, mutual care, and collaboration, while uplifting the differences in lived experiences. In addition, why its critical to fostering organizational resilience and wellbeing. The Engine Room will also share their experience implementing this co-leadership model, and the experience of other participant's reflections on their journey towards co-leadership models. Participants will also discuss how this model can impact equity, collaboration, wellbeing, funder relations, remote work, decision-making, and strategy setting. Space will also be provided to surface skills, knowledge, practices to be cultivated, and how we can collectively support each other. |
Community networks circle | This circle brings together people working on building community internet infrastructure, and folks interested in learning and discussing the synergies between digital rights and community networks. It focuses on mapping out points of collaboration while addressing contextual digital rights needs towards advancing technology rights with local communities. |
Countering digital authoritarianism and online repression in Central Asia | In Central Asia, digital rights are facing a significant decline as governments introduce restrictive laws targeting independent media, journalists, bloggers and anti-corruption reporters. Online freedom is increasingly being curtailed by surveillance and privacy crackdowns. The circle brings together leading media lawyers and human rights activists from the region to address these pressing issues. |
Cybersecurity Assessment Tool from Ford Foundation | Learn how to build up and level up organizational cybersecurity |
Design sprint for everyone: Simple steps in building bite-size digital security tip cards | If you wonder how to create engaging and clear digital security tips and how-tos that you can share easily with people online? The Human Rights Centered Design community invites you to this hands-on workshop to take simple steps and tools to build visually appealing info cards, infographics, and presentations to spice up your conversations with diverse communities and add fun to knowledge sharing. You will take away some design tricks and pros and cons for aiding tools, as well as a new communication toolkit by Superbloom to streamline your creative process. Organizers: The Human Rights Centered Design Community, The Calyx Institute, SuperBloom |
Developing robust signalling channel | Participants will explore strategies around new signalling channels that might be able to help censored users get essential information to make anti-censorship connections. Users in highly censored regions face difficulty gaining access to anti-censorship tools given that they are prime targets of blocking by censors. A signalling channel is a highly available (i.e., difficult for censors to block), method of communication, typically low-bandwidth, that aims to provide users access to more robust anti-censorship tools. In most cases, a user makes a request to a signalling channel and gets a response that includes secret keys and/or addresses of proxies or bridges for users to make a censorship-resistant connection. Despite the existence of many censorship-resistant tools, options for signalling channels are limited. With many cloud providers opting to discontinue support for domain fronting. |
Digital rights after the fall: What should we do with the digital heritage of a dictatorship | When modern digital dictatorships fall, they will leave behind an all-inclusive digital police state system, as well as the possibility of the next political system to repeat the same mistakes using inherited tools. In this collaborative discussion, participants will talk about the use of digital tools by the Russian government, and their future. What data should be deleted forever? What systems will require strong policies governing their usage? What should we not be afraid to use for the good of the people? This is our call for help for participant’s collective imagination, hope, and creativity, as well as knowledge, and experience |
Discriminatory UX: How software can gatekeep people | Many initiatives are built on powerful and usable software that we use every day. But what happens when software tools keep us from being included based on disabilities, citizenship or language skills? Participants will discuss tools they use for their work, and the issues they are facing. |
Exchanging feminist methodologies, politics and practice in capacity building and feminist technology | This circle is for folks who identify as feminist tech trainers and feminist movement facilitators. Come learn about different approaches and methodologies to learning spaces, and why creative methodological approaches are so critical in shaping caring, collective and engaged training spaces. The internet can be, for many activists and marginal identities, a space of violence, surveillance and constantly evolving and confusing technologies. Come share and learn from a place of care, fun, creativity, awareness of the diversity of contextual realities and the knowledge of the trauma people carry. Learn about how to respond with methodologies that speak to challenging hierarchies in training spaces and how to be agile and creative - cornerstones of learning spaces for feminists. |
From wristbands to smartphones: Designing for physical safety! | In this engaging hands-on workshop, Circulo and Natalia Project will share their firsthand experience designing technology and initiatives focused on physical safety. This workshop will provide a space for participants to discuss their strategies for safeguarding themselves and their networks in the field. Let's circle up and collaborate to enhance our collective knowledge about safety protocols and the features technology can embrace to boost safety. Circle Facilitators: Okthanks, Guardian Project, Civil Rights Defenders |
Gaming the Far Right Anti-Human Rights Authoritarian Playbook - Big Tech Version | Anti-democracy and anti-human rights forces are deploying authoritarian tactics to undermine institutions, silence / co-opt critics & gaslight the public. Civil society is standing up and fighting back with strategic tactics of their own. Together we are stronger with best practices to counter tactics used to threaten all of us. How is the far-right using tech to attack or influence institutional pillars to impose their vision of family, property, religion and citizenry? Approaching from lived experience working with front line defenders and whistleblowers on public sector accountability, lawfare, disinformation and propaganda, we will collectively map strategies being fought by civil society in different territories. We need to be ready to pre-empt and to respond to these attacks. |
Guardians of change: Strengthening cybersecurity in civil society | Civil society organizations (CSOs) play a pivotal role in driving positive change in today's interconnected world. However, CSOs' impact can be hindered by cybersecurity threats. This circle aims to empower civil society leaders and activists with the knowledge and tools to bolster their cybersecurity defenses. Through discussions on emerging threats, best practices in digital security, and practical tips for implementation, participants will leave equipped to safeguard their organizations and advance their missions securely in the digital age. Join us in becoming the Guardians of Change in the fight to strengthen cybersecurity within civil society. |
Hangout with the Jigsaw team | Swing by to enjoy drinks and snacks while we get to Jigsaw team and other users! |
Identifying AI-generated content: how? | Join us to discuss the issue of the identification of AI-Generated Content! How and when should we try to implement it? Whose responsibility should it be? How should it be regulated? Is it technically feasible to do it? How will it impact online content sharing, trust, privacy and the safety of civil society?We'll talk about everything - join us! |
Law and policy for IBSA | Participants will share their thoughts on the current state of law and policy protection against Image Based Sexual Abuse, and to identify measures that platforms and governments can take to address the concern effectively with minimal harm to encryption, freedom of speech and abuse by procedure. |
Nowhere feels safe: Digital transnational repression against women human rights defenders in exile | Repressive governments use invasive surveillance, online harassment and defamation campaigns to reach across borders and threaten women activists in exile and diaspora communities. What are the methods and silencing effects of gender-based digital transnational repression? How can we defend and empower the individuals and communities at risk? This circle discusses the findings of the Citizen Lab’s research into digital threats against women human rights defenders living in exile or in the diaspora and seeks input on recommendations for measures of protection and risk mitigation for targets of digital transnational repression. |
On selective protection and regulations: TFGBV and hate speech against gender and sexual rights defenders | The Feminist Internet Research Network (FIRN) brings together feminist researchers and civic society organisations from the Global South to produce evidence and context-based analysis in issues such as access; algorithmic inequality and surveillance; online gender-based violence; and gendered labour in the digital economy. In this Circle, participants will share insights on governments’ and technology organisations’ preferences and selective attention when dealing with online and technology-facilitated violence; and the role of gender and sexual politics in this process. |
Outline partner fireside chat | Hear from third party Outline providers about their experiences with key distribution and tell us how we can better support you. |
Outline SDK Meetup | Learn about how you can use SDK for your app, meet other developers currently using it, Meet the Jigsaw team who built it, and ask all your questions. Outline SDK is a cross-platform library and set of tools for app developers to easily reuse Outline’s advanced networking strategies to protect apps and VPNs against network-level interference. |
Public Interest Technology Meet & Greet | Are you or were you a fellow with Mozilla, Media Democracry Fund, Ford Foundation or any other public interest technology programs? Come meet some current and former members of these programs. Learn more about the work we do, and how to get involved in our activities. |
Public Interest Technology Group | Public Interest Technology (PIT Network) Alumni Network and Public Interest Technology Group PITG are two groups of technologists working inf the nexus of technology, human rights, digital rights and public interest. Joing this co-hosted session, and connect to former members the PITG and alumni from Mozilla, Media Democracry Fund, Ford Foundation fellowships, as well self-identified PITs and technologists to meet, share the work being done, and reflect on the values and the future of the field. |
Reimagination of freedom: Digital rights and kinship through "The Ground Screams to Whisper Ancestral Mapping" | This Circle will explore how the ancestral mapping exercise from "The Ground Screams to Whisper" can serve as an innovative approach to addressing digital rights abuses exemplified by services like 23andMe. Participants will engage in a collaborative discussion on the intersections of digital rights personal data sovereignty and the importance of kinship and community in the digital age. Participants will delve into the potential of using arts and crafts-based ancestral mapping as a means to reimagine freedom and privacy in the context of digital rights. |
Resilient Networks: Hosting federated services in adversarial conditions | A hands-on workshop addressing the deployment and sustainability of federated services in adversarial conditions. Participants will learn to navigate the complexities of maintaining decentralized networks in spaces of surveillance and restriction, drawing on real-world examples and practical techniques. |
Rising digital authoritarianism in South Asia | This session will explore the alarming rise of digital authoritarianism in South Asia. Participants will examine trends such as internet shutdowns, online censorship, increased surveillance, and the suppression of privacy rights and freedoms of speech and expression. Additionally, participants will discuss the significant challenges faced by human rights defenders, both inside and outside the courts, in their broader efforts to resist digital authoritarianism. |
SWANA feminist imagination for digital space | The SWANA Feminist Imagination for Digital Space event aims to convene SWANA feminists, queers, and tech specialists to brainstorm and innovate in the realm of digital space through a feminist perspective |
Sustainable self-hosting? | As Big Tech services continue to be enshittified, made costly, or become untrustworthy, self-hosting is an increasingly attractive option. But sustainable, long-term self-hosting can be difficult. It can be expensive, require lots of effort, come with numerous risks and burnout. Participants will share their experiences self-hosting, and explore available tools, best practices, and support networks. They will also map out what is missing. |
Tactics for engaging tech stakeholders in digital rights advocacy. The experiences and future opportunities across Indo-Pacific region. | Indo-Pacific is a critical region for global security and economy; yet, civil society in the region faces multiple challenges from digital authoritarianism. These challenges cannot be addressed by one group or a single expertise alone. In this circle, participants will hear from CSOs in the region and the lessons they have learned. In addition, participants will explore strategies to fill current gaps. |
Targeted anti-phishing: building anti-phishing training resources tailored to each community’s needs and threats | This session centers around Shira, a newly-released web app (available at https://shira.app) to help users develop their skills to identify and defeat phishing attacks on email but also on messaging apps like WhatsApp, SMS, Facebook Messenger, etc. Shira is a community-centric project, with an advisory board made of digital security educators from civil society groups from around the world. As we are planning the future of Shira, we are seeking to work with community members to understand: how can we improve Shira to make it as useful as possible to the digital rights community, to digital safety trainers, and to vulnerable communities in general? How can we ensure that Shira empowers communities to develop custom resources that match their specific needs and threats? Join us to shape the future of anti-phishing education! |
Technology, data and elections: The role of data and technologies in electoral processes | There is an unprecedented number of elections happening in 2024. In this circle, participants will discuss government usage of data-intensive technologies - which goes hand-in-hand with the involvement of private companies - during election cycles. Participants will discuss risks involved, and what can be done to avoid the abuse of technologies during the election cycle? This includes biometric voter registration and e-voting and verification technologies, which often result in the development of nationwide databases containing masses of personal data and technologies that put privacy and electoral integrity at risk; and technologies that are redefining political campaigning and advertising practices. What can be done to prevent the manipulation of opinion through these measures, which also many times exclude voters. Collaborators: Privacy International, The Digital Rights Foundation (Pakistan), Fundacion Karisma (Colombia), Derechos Digitales (Chile), R3D (Mexico) |
Testing OuiSync for shutdown scenarios | This circles is dedicated to testing Ouisync in simulated shutdown conditions. Ouisync is a p2p file sharing tool developed by eQualitie. Participants can test the app, providing critical feedback and insights to enhance its robustness and efficacy in real-world applications. |
The case of El Salvador: Strengthening civil society and media through capacity-building in a fragmented country | Participants will learn about the capacity-building program being run in El Salvador for CSO's and independent media outlets in the middle of surveillance and repression by the current government. |
The future of decent work in the planetary digital capitalism: AI, automation and digital platforms | This circle aims to generate dialogues and discussions around the future of work in the dawn of generative Artificial Intelligence, the automation of intellectual work and the increasing platformization of the economy. These developments have the potential of reshaping the planetary economy, imposing additional risks on human rights, but most importantly they challenge the work itself of digital rights defenders, policy makers and academics. This circle offers a scenario to discuss if we should adapt or resist these technologies, and both the tactics and strategies that should arise. |
The how and why of rapid response | We are often expected and incentivized to rapidly respond to censorship events and we want to. But at what cost? How can we respond in ways that are generative and beneficial? Is there a useful entropy we should introduce to rapid response? |
The LLephant in the RooM: What are we doing about AI? | AI is no longer avoidable, and has crept quickly yet steadily out of mere pop phenomenon into the reality of how many of us operate as mission-driven, public interest organizations. Participants will discuss their fears, blind spots, and hopes for ethical and helpful interactions with these systems as the world moves increasingly forward with them. In addition, they will explore what could be done to address AI's impact on confidentiality, the integrity of our research (i.e. code, fuzzing, security), public communications, internal organizational security, and other aspects? |
Protection of Digital Rights in Challenging Contexts: Central America against the UN Cybercrime Convention | The session will address the state of digital rights in Central America, highlighting the risks that the UN Cybercrime Convention represents for journalists and human rights defenders in repressive contexts. |
Shape the future of Tella, file encryption on mobile, and human rights documentation | In the next year, the Tella team will be focusing on improving the app's usability, accessibility, performance, and stability. We will also be adding exciting new features, including new back-end repositories to upload files and phone-to-phone and phone-to-computer file transfers. Join us to share your feedback and recommendations, so we can integrate them directly into our roadmap and improve Tella to properly address your needs! |
Updates about Tor and Tails | Come and hear updates regarding the future of Tor and Tails. |
VPN Community Initiative | This meetup brings together diverse experts working on VPNs, or in the VPN ecosystem. This includes commercial and non-commercial VPN providers, developers of circumvention and VPN-adjacent technologies, researchers, policy advocates, and others. The VPN Community Initiative is a year-long community-building program, run by Team CommUNITY, focused on building solidarity and knowledge-share between different actors working in/with the VPN ecosystem with the goal of advancing standards and ensuring the needs of the most at-risk are made known to VPN companies so they can improve their offerings for these users. |
VPN infrastructure: challenges & needs | Share working experiences, missing links, and other ideas to better accommodate infrastructure for VPN providers. |
VPN provider transparency: Addressing threats that shady VPNs pose to VPN clients and providers | Participants will learn about threats VPN clients and providers face from the myriad of VPN apps distributed on Google Play and elsewhere, and hear from current researchers looking at suspicious VPN providers and including potential links to malicious actors. Participants will explore current gaps in understanding VPN related threats, map out new issues and challenges, and explore opportunities and solutions to address them. |
Booth & Village Descriptions
Villages | ||
Tor Project and Tails Village | The Tor Project & Tails | At the Tor and Tails booth you can learn more about tools that can help you be anonymous on the internet. Come to chat with us about how to use the Tor Browser or the Tails OS to protect your privacy online and bypass censorship. Learn more about our community and how to volunteer. And if you would like to partner with us for digital security training in your area. |
Calyx Institute Village | Calyx Institute | The Calyx Institute's mission is to educate the public about privacy in digital communications and to develop tools that anyone can use. One of our featured tools is CalyxOS, an Android mobile operating system that puts privacy and security into the hands of everyday users. |
Clean Insights Tea House | Guardian Project | Come by to have tea and chat with the Guardian Project team about their work on privacy-preserving measurement, internet shutdown resilience, anti-censorship and more!https://cleaninsights.org/gg |
SplinterCon by eQualitie Village | eQualitie | Join us at the SplinterCon booth, an initiative by eQualitie dedicated to exploring, challenging, and counteracting global internet fragmentation. Our focus is on resilient, decentralized tools, along with the developers and communities that support them.At our booth, you can:• Breakout from a simulated shutdown environment that mimics a pocket splinternet.• Participate in interactive workshops that reflect the current state of the web.• Test circumvention tools.• Share your experiences with internet fragmentation.• Learn from the expertise of advocates working in affected regions.The SplinterCon booth is a space for discussing the challenges and opportunities of a constantly fragmenting internet, offering you a hands-on experience of navigating and thriving in this evolving landscape. |
APC Village | Association for Progressive Communications | The Association for Progressive Communications (APC) is a membership-based network of organisations and activists. It was founded in 1990 to empower individuals, organisations and social movements to use information and communications technologies (ICTs) to build strategic communities to contribute to equitable human development, social justice, participatory political processes and environmental sustainability. |
Outline Village | Outline | Join the Outline Village meet the team behind Outline Manager, Outline SDK, and other tools! Outline is an open-source project created by Jigsaw that provides a safer way for individuals and organizations to access the open internet. Jigsaw is a unit within Google that explores threats to open societies, and builds technology that inspires scalable solutions. |
WANA Café | SMEX | Join our booth for dialogues on WANA’s digital future and a taste of local flavors! |
Arkam | Idaraty | Idaraty is a CivicTech startup launched in 2020. Idaraty develops innovative solutions to accelerate citizen-focused digital transformation and contributes to access to information to different actors in order to foster a better digital ecosystem. Idaraty have several projects but the focus for the GG is the Project Arkam (Numbers in English). Arkam is a platform that aggregates public policy-related data, statistics, and stories and presents them in an easy-to-use format for journalists, content creators, and decision-makers. |
Amnesty Tech | Amnesty International (Tech Programme) | Members of Amnesty International’s Tech Programme will engage with attendees on the programme’s work, which includes countering the digital surveillance of activists, banning facial recognition technology for mass surveillance, and working to ensure reproductive rights activists can share accurate abortion information online. We will use the booth as an opportunity to interactively demo our tools for activists, such as verification kits to scan devices for spyware infections, as well as our surveillance camera map in New York City. The proposed activities will share information on different technological threats to activists, as well as providing them with the knowledge and tools to protect themselves and educate others. |
AmneziaVPN | AmneziaVPN | Amnezia VPN is a simple and free app to run a self-hosted VPN with high privacy requirements. The idea for AmneziaVPN appeared in 2020 during the first Demhack hackathon, and then it was further developed with Privacy Accelerator. We desired to empower users of all technical skill levels to create their own VPN, for simple blocking circumvention and also to ensure privacy and protection of their data. It was important to us to create a free and open source application so that no user data is collected and there is no even hypothetical possibility of data leakage. |
Coaching, Leadership and Fundraising Support | Spring | Spring is a leadership development partner that has worked with changemakers from 1,000+ organizations in 100+ countries over the past 20 years. Visit our booth to sign up for a complimentary 45-minute coaching session in English, Spanish, or Portuguese throughout the Gathering! We can support you to solve the questions keeping you up at night— donor prospecting and communicating with funders, work-life balance, stress, job transitions, delegating effectively, navigating uncertainty and more. Spots are limited so register soon for your coaching session. https://www.springstrategies.org/coaching-global-gathering |
Coffee and radio clinic: Sounds that liberate and awaken hope in times of rights cutbacks | Ancestra & Nois Radio | This is a calm, deep listening spaces booth. Come to this booth for Colombian coffee or herbal tea straight from our mountains, to meet and talk about radio. In Colombia, radio enables populations living in remote areas to exercise their human right to communication. What is alternative radio for? Here, we will try to learn about the hopeful power of digital and analog sound content in geographical and sociopolitical contexts where democracy and rights are constantly at stake. |
Digital Justice House | Digital Justice House | Learn more about the Digital Justice House initiative and toolkit which focuses on three organizational policies to improve the health of the digital rights teams: the right to disconnect, the four-day work week, and the unlimited vacations. Get advice and have your questions answered on why this matters and how to best implement these policies to improve health of your team and impact of your work. |
Digital Defenders Partnership | Digital Defenders Partnership | Digital Defenders Partnership (DDP) is an international programme that contributes to strengthening the resilience of Human Rights Defenders (HRDs) by increasing their digital security through a holistic and sustainable approach. We envision a world in which HRDs contribute to social justice while enjoying safety, well-being, freedom, and dignity. |
Digital Security Lab Ukraine | Digital Security Lab Ukraine | Digital Security Lab Ukraine is a non-profit organisation, based in Kyiv, Ukraine, whose main objective is to support safe and free exercise of human rights online by strengthening the digital security capacity of CSOs, human rights defenders and journalists, and advocating for enabling state and corporate policies in the field of digital rights. |
Freedom of the Press Foundation | Freedom of the Press Foundation | Freedom of the Press Foundation (FPF) is a nonprofit working at the intersection of human rights, journalism, and technology. A unique organization in the security and internet freedom community, FPF has pioneered a multilayered approach to preserving and extending the privacy and security of journalists in the interest of advancing a free, adversarial press.
Our digital security training team provides support to journalists and media-makers working in the public interest through trainings, consulting, and security assessments; run ongoing digital security programs, and participate in conferences and events around the world throughout the year. We also write security guides that address common digital security concerns and conduct research on the latest digital security developments. |
From Palestine to Lebanon: Reflecting on global digital rights | Palestine Coalition | Israel’s most recent attack on Lebanon – booby trapping thousands of pagers and walkie talkies – left almost 40 martyrs and over 3,500 serious injuries. This attack has significantly blurred our mental model of digital security and our understanding of risk assessments. This attack follows 12 months of Israel’s genocide of Gaza which has left over 40,000 martyrs. In Gaza and the rest of Palestine, Israeli occupation forces have employed a suite of technologies to kill, surveil, and occupy: from artificial intelligence, digital surveillance, and information control mechanisms.
We want to invite researchers, technologists, academics, and trainers to reflect on how tech-enabled genocide and warfare affects the lens through which we think about our works in digital rights and internet freedom. Moreover, we seek to exit our siloes and work more in intersection with our geopolitical realities. |
GlobaLeaks | GlobaLeaks | GlobaLeaks is free, open-source software enabling anyone to easily set up and maintain a secure whistleblowing platform. Thanks to GlobaLeaks. everybody can easily set up a secure and anonymous whistleblowing initiative. Designed to be user-friendly, the software is customisable to your needs and protects the whistleblower’s privacy and submissions by default. |
Global Voices | Global Voices | Global Voices is celebrating its 20th anniversary in 2024. Over the past two decades, our network of writers, translators, researchers, and digital rights activists has made significant contributions to the digital rights ecosystem. We create diverse and multilingual content with a special emphasis on underrepresented stories, produce in-depth participatory research about digital rights by those who are affected by the issues at hand, and support Indigenous and historically marginalized communities to exercise their rights to free expression and access to information in Indigenous languages. We also connect and coordinate a diverse network of partners, many of whom do not operate in English, giving their work a wider platform both with translation and republishing, and creating a forum for them to connect with one another. GV strives to foster more inclusive and representative participation around digital rights, ensuring that voices from all parts of the globe are heard. |
Greenhost | Greenhost | Greenhost is a digital infrastructure provider in the community. We help organizations to have a safe and trusted place on the internet. The booth will be a place to connect with our users and potential new users. |
How local Pakistani apps puts vulnerable citizens at risk of surveillance and targeted attacks | Arizona State University, OTF ICFP Fellow | Understand how vulnerabilities and development shortcomings in Pakistani apps risk exposing vulnerable citizens to surveillance and targeted attacks. |
Human Rights @ Meta | Meta | Meta's Human Rights Team will be present to answer your questions and hear your feedback about our policies and work to protect human rights defenders across Facebook, Instagram, and WhatsApp. We'll also be hosting two interactive sessions: a tabletop exercise simulating how we respond to conflict and crisis situations, and a structured consultation and update on our Trusted Partner and HRD escalation channels. |
International and regional projects looking at the intersection of digital rights and freedom of expression | Article19 | During the Global Gathering regional and thematic specialists will be facilitating sessions, working with human rights defenders, and providing training. Our booth will be staffed throughout the Gathering and we are looking forward to meeting you and to learning more about your projects too. Our booth will be part of the Job Fair, so feel free to stop by and meet our colleagues to learn more about our work with partners around the world. |
Introducing the DigiSec.Wiki: Come collaborate with us! | EngageMedia | This booth will be introducing the work EngageMedia has done under the Digital Security Wiki, a Wiki focusing on providing accessible alternative resources for digital safety, particularly on those active in the Asia Pacific (APAC) region. we're inviting people to review, add, translate and contribute to our Wiki, and spread the resources to their community. |
JAAKLAC Community | JAAKLAC | *Share* your visions around a quality education in the digital age; *Learn* about efforts in Critical Digital Education manifested through our diverse Latin American Community;*Do!* collaborative projects with us to broaden the participation for better digital futures with your knowledge, creativity and drive.This booth will be in Spanish, English and Portuguese |
Join the Localization Lab community! | Localization Lab | We have localized nearly 200 internet freedom tools and resources into 220 languages, and we need your help to do more! Drop by our booth to learn about our work and how we can fight tech bias together through co-design, collaboration, and research. Sign up to join our global network of contributors, explore other collaboration opportunities, or help us build our Unified Glossary on-site by translating into your local language, one word at a time. |
JOSA - Jordan Open Source Association | Jordan Open Source Association | The JOSA booth will be open for discussions on various regional topics, including digital inclusion incident response, help desk services, open source philosophy, open governance, and open data. We will also showcase our work and portal, highlighting our contributions and initiatives in these areas and to engage with visitors on these subjects. |
Kaleidoscope: Reliable and convenient censorship circumvention mirroring solution | DOXA | We - a media in exile called DOXA (doxa.team) - have created a solution that automatically creates unblocked mirrors of websites blocked in regions with harsh censorship (such as Belarus, russia Uzbekistan etc). It allows us to always stay one step ahead of censorship agencies and assure readers have access to independent information! We are eager to provide our tool to other media outlets and human rights organisations and are already doing it for 10+ organisations in russia, and we believe this number will most likely triple by the moment our Booth takes place! |
LibResilient | LibResilient | LibResilient is a browser-based decentralized content delivery tool, implemented as a JavaScript library to be deployed easily on any website. It uses ServiceWorkers and a suite of unconventional in-browser delivery mechanisms, with a strong focus on decentralized delivery methods, and does not require website visitors to change any settings or install any extensions to work. The project grew from experience of running infrastructure for (and blocking censorship of) investigative journalism media sites. |
MaadiX | MaadiX | MaadiX is a privacy-oriented, affordable and easy-to-use solution that puts users back in control of their data and communications without the need for technical expertise or large investments.It provides one-click installation and maintenance of free and open source online tools on own servers through an easy and intuitive graphical interface. |
Numun Fund | Numun Fund | The first dedicated fund for feminist tech in, and for the Larger World. Our aim is to seed and sustain feminist technology infrastructure for movement organising, and we understand digital technologies to be an important part of movement infrastructure. |
Omidyar Network’s digital trust and safety strategy | Omidyar Network | Come learn more about Omidyar Network, our approach to grantmaking, and our strategy as it relates to Digital Trust and Safety. |
0xche | 0xche | We want to showcase our current lines of work and ongoing programs to explore potential partnerships with other organizations, and invite organizations to apply to our Rapid Response and Security Lab programs. |
Open Technology Fund | Open Technology Fund | OTF would like to host a booth at Global Gathering to showcase our organization’s funding and service options for participants. The booth will include informational brochures, an outline of support services to the community, and a highlight of our key funding mechanisms. OTF looks forward to the opportunity to meet with community members in the Internet freedom space and offer support for their programs. |
Tech-facilitated abuse within the context of domestic abuse | Frauenhauskoordinierung | I am working in a project which is assisting front-line workers of women shelters and councelling centers to better assist survivors of tech-facilitated abuse. Tech-facilitated abuse is rising and a growing threat for the safety of survivors and women shelters. I would like to engage and raise awareness about: what is tech-facilitated abuse in intimate (ex)relationships? How can digital security trainings for frontline workers improve counseling? Important of holistic approaches, and lobbying for IT helplines for frontline workers and survivors |
The Palestine Booth | Collective | The battles we fight share the same roots no matter where we are in the world. As we approach one year into the US-Israeli genocide of Palestinians in Gaza and across Palestine, and as we witness Western powers’ unconditional material support for it, we want to make use of the space we have to hold conversations on how to understand this genocide, and 76 years of occupation, how it intersects deeply with our spaces, and how we – as digital rights activists, academics, researchers, technologists, and journalists – can and should shape our work to engage meaningfully. We would also use the space to honor the lives of our martyrs, share art, and raise funds for our contacts in Gaza. |
Preserve truth to power with Save by OpenArchive | OpenArchive | People armed with mobile devices are becoming history’s first responders, amassing evidentiary records of injustice. Save helps them Share, Archive, Verify, Encrypt this crucial evidence. This will be a participatory demo where we’ll do a demo and foster strategic partnerships with those interested in deploying Save or setting up archives in their communities. |
Qubes OS Booth | Qubes OS | Qubes OS is a free and open-source security-focused operating system that strives to provide exceptional security, flexibility, and control over your computer. It is also increasingly accessible to users of various level of technical skills. In this booth, I want to showcase Qubes OS capabilities and gather feedback from existing and prospective users. |
SafeCommNet: Decentralized, secure, and private communication system for crisis and disaster management | Alternative Solutions for Rural Communities (ASORCOM) | Visit our booth to learn about SafeCommNet, an innovative decentralized communication system designed for use during political unrest, crises, and disasters. Our platform ensures secure and private communication, enabling communities to maintain connectivity and coordination even in the most challenging situations. Discover how SafeCommNet can support resilience and safety through cutting-edge technology. |
Safety in exile: Practical guide to avoiding transnational harassment | Radio Free Asia | Transnational repression is a tactic used by governments such as China, Iran, and Russia, to reach across borders to harass and intimidate diaspora communities, journalists and human rights defenders living in exile. Out of myriad potential responses, we will showcase best practices and advise on the real world applicability of digital and physical security guidance in the face of such threats. |
The current status of a new privacy-preserving and decentralized messenger | Phoenix R&D / Messaging Layer Security (MLS) | We’re building a new generation of open-source messenger combining privacy, security, and decentralization. This is based on the Messaging Layer Security protocol (https://blog.phnx.im/rfc-9420-mls/) -a new standard for end-to-end encryption we co-authored-, and a tech stack we have been developing. In this booth, we want to showcase the current status of our project to develop a generation of new privacy-preserving and decentralized messenger with a beta coming soon. We will also have a circle session on the same day at 16:30 where we want to discuss with you what the future of secure messaging might look like and what your needs are for messaging applications. |
The Powered by the People Activist Help Desk | PartnerGlobal | The team will discuss the need for a 24/7 rapid response support channel for activists and movements. They will feature the Powered by the People (PxP) Help Desk, discussing the successes, gaps, and mechanisms behind providing support in the form of: legal, rapid response, and psychosocial support for activists around the world. |
The work of the Internetbolivia.org Foundation | Fundación Internetbolivia.org | The InternetBolivia.org Foundation has been working for more than 6 years in the areas of Digital Economy, Internet Regulation, Digital Inclusion, Fight against Digital Violence, Innovation and Digitalization, Technology and Digital Security.We will show all our achievements, our publications, workshops and projects that we have been doing in Bolivia. |
Usability and Accessibility Clinic | Accessibility Lab, UXD Lab, Ura Design, Decent Design, Superbloom |
Join us at our Usability and Accessibility Clinic, where you can connect directly with seasoned design, accessibility, and usability experts ready to assist you with your specific needs.This clinic invites tool teams, designers, developers, decision-makers, and project managers to engage in focused discussions about their usability and accessibility challenges. Whether you're seeking a second opinion on design features, struggling with user engagement strategies, or looking to enhance accessibility features, we are here to assist. |