Below is a quick reference, distilled list of six easy tips for any news organization employee at risk of being targeted by malicious adversaries. These tips come the Safe Travels Online campaign that the Tibet Action Institute has been developing over the last two years, to assist Tibetan exile human rights organizations, and it has proven […]Read more "Six Easy Tips: Essentials of Digital Security for Targeted News Organizations"
Dear friends, family and colleagues… when I get annoyed by you for using the label “hacker” in a negative, nonconstructive, anti-productive manner or to refer to malicious adversaries, it is because there are people like Aaron out there who are true examples of what a hacker is… who use their basic, unstoppable curiosity of deeply […]Read more "An extraordinary hacker and activist"
While there are definitely many security-related holes and privacy concerns to be had about the free (but not open-source) Dropbox file sharing service, it has taken the world by storm, including many activist and human rights groups, mostly due to the simplicity and effectiveness of its user experience. As we have seen many times before, […]Read more "My Quick Guide to a Less Risky Dropbox"
Here is the slide deck and audio recording of a recent lecture I gave to my NYU ITP2800 students. The topic was “Building an Effective User Experience for Mobile Smartphone Applications Used Under Duress”, with the ideas and content coming from an earlier blog post / crowd-sourced effort on this topic. I still consider this […]Read more "ITP2800: Designing Mobile Apps for Crisis Situations"
Below is my rough statement for the US Helsinki Commission “Twitter v. Tyrants” hearing this Thursday. I would greatly appreciate any of your comments and feedback, as I will be polishing this up a bit before the hearing Thursday and before I formally submit it into record. I mostly wonder whether I have made to […]Read more "My (rough) statement for the US Helsinki Commission hearing (Feedback Please!)"