Browse Items (258 total)

That’s because control over this kind of information means power. But how can the private sphere be protected?
Dokumentation Dokumentation
Image: ZED

Many people want to control the circulation of their personal data on the Internet - but in…

NOTHING TO HIDE questions the growing, puzzling and passive public acceptance of massive corporate and governmental incursions into individual and group privacy and rights. People generally agree that mass surveillance regimes are inherently invasive…

Bookmark with the text
"Who do you think knows more about you?
Google, Facebook, Whatsapp or your family?"

Paper-bag-249.jpg

The Evidence & Action programme helps rights advocates use information strategically and creatively in their campaigning. We aim to inspire innovative campaigns and provide practical support for collecting, investigating and curating evidence for…

Screenshot 2024-02-16 at 15-06-26 Gender and Tech Resources.png
Every day, women face the consequences of online harassment and hate speech as a result of their gender identity and their environment. In this context, Tactical Tech’s Gender and Tech project has spent the last four years working toward giving…


The risks for advocates and independent journalists working on sensitive issues are not as simple to navigate as they once were. In the past, when using a telephone, individuals knew the risks they were taking and worked around them accordingly.…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2