t in some cases
> > recovery may not be practical, so migrating to a new account and using
> > that as an opportunity to activate two-step login, use a password
> > manager, etc. would be good. best, Joe
> >
> >> On Fri, Oct 14, 2016 at 1:26 PM, Katy Pearce <katyca...@g
Hi all.
In recent days a number of high profile activists in Azerbaijan report
their Gmail, Facebook, and Twitter accounts either fully hacked or multiple
logins that were not the owner's were attempted. Additionally, beyond the
daily troll army, a few fake profiles with doxxing information have
I wrote this piece a few years back, may be of interest...
http://www.rferl.mobi/a/why-technology-penetration-rates/24805097.html
On Tue, Aug 16, 2016, 9:27 PM Katy Pearce <katyca...@gmail.com> wrote:
> Also for what it's worth, surveying in much of Africa is incredibly
>
Also for what it's worth, surveying in much of Africa is incredibly
challenging for a variety of reasons. I'd be cautious in trusting it.
On Tue, Aug 16, 2016, 9:23 PM Chris Csikszentmihalyi
wrote:
> Hi Arjuna,
>
> Just a quick note that usage can be quite different across
Actually, there is a lot of excellent theoretically driven work on
self-censorship generally, in authoritarian regimes, and in
post-Soviet countries. Look first toward the political science
literature.
This piece of mine focuses on women in Azerbaijan with regard to
self-censorship:
Great points Nick.
This is challenging. Up-to-date recommendations are hard to give as
services change. And, generally, these guides don't know their target --
are they trying to help a clueless novice user or an advanced user? Both
need help!
And what about translation?
I have yet to see a good
http://www.rferl.mobi/a/why-technology-penetration-rates/24805097.html
On Mon, Jan 5, 2015, 4:34 PM Myself falcoco...@gmail.com wrote:
You are using the Internet now. Are you a slave? Are you more equal than
others to deserve it better and decide for them?
On Jan 5, 2015 7:16 PM, J.M. Porup
I don't see why this is news. Many people and organizations on this list
are working on similar projects, funded by AID. The framing of the article
with Cuban Spring and all that was problematic.
On Apr 3, 2014 6:09 AM, Andrés Leopoldo Pacheco Sanfuentes
alps6...@gmail.com wrote:
FYI
Yeah, it was Teliasonara. I refer to this in a recent article
https://www.academia.edu/5833149/Two_Can_Play_at_that_Game_Social_Media_Opportunities_in_Azerbaijan_for_Government_and_Opposition
On Sat, Feb 8, 2014 at 10:26 AM, Bernard Tyers - ei8fdb
ei8...@ei8fdb.org wrote:
Hi,
I have been
Not to be a downer here, but until this is addressed:
- security is incredibly easy to use
- security does not slow down the internet or the computing power
- security does not attract the attention of security services
then all the training in the world isn't going to make people take these
My point is that, to my understanding, there already exists a lot of very
digestible trainings. But until other issues are addressed, adoption is not
likely. Decades of research tells us this. :)
On Mon, Jan 20, 2014 at 11:17 AM, Nathan of Guardian
nat...@guardianproject.info wrote:
Katy
sites (and is the MIT key
server broken?) that come up first in searches.
Thanks for reading and commenting,
Katie
On Mon, Jan 20, 2014 at 2:19 PM, Katy Pearce katyca...@gmail.com wrote:
My point is that, to my understanding, there already exists a lot of very
digestible trainings
12 matches
Mail list logo