Not to be a downer here, but until this is addressed:
- security is incredibly easy to use
- security does not slow down the internet or the computing power
- security does not attract the attention of security services
then all the training in the world isn't going to make people take these
prec
wrote:
>
>
> Katy Pearce wrote:
> >Not to be a downer here, but until this is addressed:
>
> Your post specifically discussed building a training wizard and I was
> simply showing you what we had done here to make a simple, friendly
> experience using plain language.
>
>
nt. I do see a lot of obsolete sites (and is the MIT key
> server broken?) that come up first in searches.
>
> Thanks for reading and commenting,
>
> Katie
>
>
> On Mon, Jan 20, 2014 at 2:19 PM, Katy Pearce wrote:
>
>> My point is that, to my understanding, there al
Yeah, it was Teliasonara. I refer to this in a recent article
https://www.academia.edu/5833149/Two_Can_Play_at_that_Game_Social_Media_Opportunities_in_Azerbaijan_for_Government_and_Opposition
On Sat, Feb 8, 2014 at 10:26 AM, Bernard Tyers - ei8fdb
wrote:
> Hi,
>
> I have been looking for a link f
I don't see why this is news. Many people and organizations on this list
are working on similar projects, funded by AID. The framing of the article
with Cuban Spring and all that was problematic.
On Apr 3, 2014 6:09 AM, "Andrés Leopoldo Pacheco Sanfuentes" <
alps6...@gmail.com> wrote:
> FYI
>
>
>
http://www.rferl.mobi/a/why-technology-penetration-rates/24805097.html
On Mon, Jan 5, 2015, 4:34 PM Myself wrote:
> You are using the Internet now. Are you a slave? Are you more equal than
> others to deserve it better and decide for them?
> On Jan 5, 2015 7:16 PM, "J.M. Porup" wrote:
>
>> The
Great points Nick.
This is challenging. Up-to-date recommendations are hard to give as
services change. And, generally, these guides don't know their target --
are they trying to help a clueless novice user or an advanced user? Both
need help!
And what about translation?
I have yet to see a good
Actually, there is a lot of excellent theoretically driven work on
self-censorship generally, in authoritarian regimes, and in
post-Soviet countries. Look first toward the political science
literature.
This piece of mine focuses on women in Azerbaijan with regard to
self-censorship:
http://nms.sage
Also for what it's worth, surveying in much of Africa is incredibly
challenging for a variety of reasons. I'd be cautious in trusting it.
On Tue, Aug 16, 2016, 9:23 PM Chris Csikszentmihalyi
wrote:
> Hi Arjuna,
>
> Just a quick note that usage can be quite different across Africa: it's a
> big c
I wrote this piece a few years back, may be of interest...
http://www.rferl.mobi/a/why-technology-penetration-rates/24805097.html
On Tue, Aug 16, 2016, 9:27 PM Katy Pearce wrote:
> Also for what it's worth, surveying in much of Africa is incredibly
> challenging for a variety of reas
Hi all.
In recent days a number of high profile activists in Azerbaijan report
their Gmail, Facebook, and Twitter accounts either fully hacked or multiple
logins that were not the owner's were attempted. Additionally, beyond the
daily troll army, a few fake profiles with doxxing information have be
ery may not be practical, so migrating to a new account and using
> > that as an opportunity to activate two-step login, use a password
> > manager, etc. would be good. best, Joe
> >
> >> On Fri, Oct 14, 2016 at 1:26 PM, Katy Pearce
> wrote:
> >> Hi all.
> &
Can we please not use the phrase first world?
Thanks.
On Fri, Jun 15, 2012 at 12:44 PM, Doug Schuler <
doug...@publicsphereproject.org> wrote:
>
> FUN FACT!
>
> British school lunches were the origin of the "yellow matter custard
> dripping from a dead dog's eye" line in the "I am the Walrus" s
fety/Food-and-drink-manufacturers-braced-for-critical-BBC-TV-obesity-series
>
> Frank
>
> - Original message -
> From: Katy Pearce ucsb
> To: Doug Schuler
> Cc: Liberation Technologies
> liberationtech@lists">liberationtech@lists">
> liberationtech@lists.st
14 matches
Mail list logo