I received this message from a colleague; they've given me permission to
ask on open forums, provided I maintain their anonymity. I can field
questions about their project, although I think the threat model here is
targetted traffic surveillance by existing centralised security
services, and the expected countermeasures will be using encrypted
services and the usual security tools.

    I'm currently working with community media in Zimbabwe, on content
    that may prove to be controversial.

    I wonder whether you might point me in the direction of information on
    the level of threat posed by internet/ mobile monitoring, surveilance,
    etc. Is there any detailed information on the capabilities of the
    Zimbabwean state? 

d.
--
Unsubscribe, change to digest, or change password at: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to