Daily Shaarli

All links of one day in a single page.

October 27, 2024

Como criar uma conta no Mastodon - Canaltech
thumbnail

Se você quer descobrir como criar uma conta no Mastodon, saiba que o processo possui algumas diferenças com o login em outras redes sociais tradicionais. No Mas

Whose Knowledge? | Las tecnologías que soñamos son feministas - Whose Knowledge?
thumbnail

¿Te perdiste alguno de los recorridos sonoros que compartimos las semanas pasadas? ¿La palabra escrita es más accesible para tí? No te preocupes porque venimos con un nuevo material para acompañar los audio episodios de la serie "Tejiendo significados comunes. Tejiendo acompañadas desde la escucha profunda": ¡un fanzine!

https://www.accessnow.org/guide/africa-digital-safety-guide/
http:///home/foz/Downloads/anti-oppression%20toolkit%20v4.pdf
girlswholikeporno » fantasia21
pornoterrorismo

::::por el derecho a ponerme cachonda con lo que me dé la gana::::

Track This | A new kind of Incognito
thumbnail

Throw ad trackers off your trail with 100 tabs of pure madness.

How a hacking campaign helped shut down an award-winning news site - Amnesty International
thumbnail

Mamfakinch was an award winning news website in Morocco until it was shut down by a series of digital surveillance and computer attacks. We met with Hisham Almiraat, a digital rights activist in Morocco, to find out how this happened and why we need to start thinking about the protection of freedom of press online.

Tor Project | Training Resources

Defend yourself against tracking and surveillance. Circumvent censorship. | Training Resources

https://www.tedic.org/wp-content/uploads/2023/10/Violencia-Genero-Periodistas-TEDIC-2023-web-2.pdf
MANIFESTO | Fora do Eixo e uma reflexão das mulheres contra o patriarcalismo | Frente Feminista pela Cultura
Phishing: reconheça e evite golpes de phishing
thumbnail

Descubra o que é phishing, como ele funciona e como se proteger. Nosso guia de fácil leitura ajuda você a se manter seguro on-line com dicas práticas.

Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering
thumbnail

This blog is reserved for more serious things, and ordinarily I wouldn’t spend time on questions like the above. But much as I’d like to spend my time writing about exciting topics, som…

The Book | Classic CS Unplugged
The Book | Classic CS Unplugged

Ensinando Ciência da Computação
sem o uso do computado

LevelUp

Resources for the global digital safety training community.

Hackers Target Non-Profit Organizations: ETTE's Cybersecurity Insights
thumbnail

Learn how hackers target non-profits and protect your organization with ETTE's cybersecurity solutions. Contact ETTE today for expert cybersecurity advice!

Medicine Stories - Aurora Levins Morales
thumbnail

First published in 1998, Medicine Stories is a collection of essays on the work of building social justice. The original eighteen essays examine trauma and oppression, historical memory, language ,...

Vox Product Accessibility Guidelines
Asistir a una protesta | Surveillance Self-Defense
The Four Parts of Accountability & How To Give A Genuine Apology | Leaving Evidence
thumbnail

START HERE Apologizing well is a fundamental part of accountability. It is a skill that we should all understand and practice consistently. You cannot take accountability if you do not know how to …

What is tabletop exercise (TTX)? | Definition from TechTarget

Tabletop exercises are helpful processes to prepare for a disaster recovery scenario. Find out what they entail and how to run one here.

https://media.defense.gov/2023/Sep/12/2003298925/-1/-1/0/CSI-DEEPFAKE-THREATS.PDF
Fundraising Opportunities - TCU Wiki
https://cesie.org/media/wfbw-psr-training-manual-en.pdf
Home - Opara Tecnologia
Digital Defense

The ultimate personal security checklist to secure your digital life

Manual contra el acoso en línea - PEN America
thumbnail

Strategies and resources that writers, journalists, their allies, and their employers can use to defend against online harassment and hate.

APC guidelines on plan... | Online events guide
thumbnail
Knight Lab
thumbnail

Advancing media through exploration and experimentation.

https://www.tedic.org/wp-content/uploads/2024/07/Perpetradores-de-violencia-de-genero-online.pdf
A Confession Exposes India’s Secret Hacking Industry | The New Yorker
thumbnail

David D. Kirkpatrick writes about the complicated business of India’s secret hacking industry, where hackers are hired to carry out cyberattacks on the Internet.

Home - Localization Lab
thumbnail

Since 2012, we have made open source technology available to underrepresented communities in 220 languages, bringing equal access to information, better representation online, and growing the user base of our supported projects.

Acecho en internet, ¡hablemos de esto! | ¡Dominemos la tecnología!
O que é Phishing? Tipos, exemplos e como se proteger
thumbnail

Entenda o que é phishing, de onde vem esse termo, quais são os exemplos mais comuns e como se proteger desse tipo de ataque.

9º Festival Agrocuir da Ulloa
thumbnail
Material
Candid Learning | Trainings in nonprofit fundraising, proposal writing, grants
thumbnail

Candid Learning offers information and resources that are specifically designed to meet the needs of grantseekers.

Gamifying Digital Resilience | National Democratic Institute
thumbnail

Digital attacks are on the rise globally. These attacks threaten the continuity and effectiveness of democratic actors’ daily operations and, on a larger scale, threaten to undermine the public’s trust in the democratic systems in which these actors operate.

Encrypted services Apple, Proton and Wire helped Spanish police identify activist | TechCrunch
thumbnail

Spanish police requested information from Apple, and encrypted services Proton and Wire, about a pro-Catalan independence activist.

Field Guide to incident response for civil society and media
‘Am I the monster?’ with trans activist Kai Cheng Thom - A Braver Way - Omny.fm
thumbnail

How do you talk across the political divide with someone who might exclude you, fear you, or even believe you shouldn’t exist? And what if it’s your beliefs that seem to paint someone else out of the picture? Award-winning writer, performer, and trans activist Kai Cheng Thom has wrestled with these questions in a more visceral way than most… and in a more universal way than you might expect. Kai shares the groundbreaking ways she manages the tension between advocating and understanding, then April joins Mónica to explore contrasting views on gender and sexuality from the left and the right, and together they face the quagmire at the heart of so many of our toughest clashes: How do you love people well while holding strong to your convictions? 

Condições Crescer: Compreendendo o ecossistema para o poder narrativo | by Abi Knipe | Global Hive | Medium

Em 2021, um grupo de ativistas, militantes, especialistas em comunicação, pesquisadores, artistas, jornalistas, cineastas, organizadores e criativos de todo o mundo, e de diferentes movimentos…

Work - Horizontal
Home - Integrated security manual
thumbnail

In the integrated security manual, you'll find the concept of integrated security, facilitation method, exercises and detailed sessions.

Rutas de Aprendizaje de Seguridad Digital para Puntos de Contacto | Protege.LA

Contenidos para personas que apoyan a activistas, periodistas y personas defensoras de derechos humanos en temas de seguridad digital.

Google promised a better search experience — now it’s telling us to put glue on our pizza - The Verge
thumbnail

Google’s new AI Overviews feature is delivering a litany of mistakes for its billions of users, citing Reddit jokes as serious sources for some and hallucinating others.

Genially, a ferramenta para criar conteúdos interativos
thumbnail

A ferramenta online mais completa para criar conteúdos interativos e animados. Suas criações ficarão ainda mais incríveis.

https://www.reuters.com/investigates/special-report/usa-hackers-litigation/
Dark Basin: Uncovering a Massive Hack-For-Hire Operation - The Citizen Lab
thumbnail

Over the course of our multi-year investigation, we found that Dark Basin likely conducted commercial espionage on behalf of their clients against opponents involved in high profile public events, criminal cases, financial transactions, news stories, and advocacy. This report highlights several clusters of targets. In future reports, we will provide more details about specific clusters of targets and Dark Basin’s activities.

Faça o Teste sobre phishing da Jigsaw
thumbnail

Será que você percebe quando é alvo de phishing?

Fermento – coletivo de formações para movimentos sociais
metamorfosis - queer ecology & degrowth
thumbnail

Come join us at Can Masdeu, Barcelona from the 4th to the 6th of October 2024 to explore queer ecology and degrowth!

CryptoLyrics
thumbnail

Enfrente os desafios do CryptoLyrics e pratique um idioma estrangeiro jogando e curtindo músicas.

DIF Manual | DIF Manual

The Digital Integrity Fellowship Manual

| Institute for War and Peace Reporting
thumbnail
Reflorestar a internet – BaixaCultura
thumbnail

Li nas últimas semanas um artigo instigante, chamado “We Need to Rewild the Internet”, publicado pela também interessante Revista Noemag, feita pelo Instituto Berggruen, sediado nos Estados Unidos[...]

Glossary – Rehearsing Freedoms
CAST: About Universal Design for Learning
thumbnail

Learn more about the UDL framework and the UDL Guidelines, developed and maintained by CAST.

https://lainterseccion.net/crecer-en-redes/preguntas-y-respuestas-frecuentes-sobre-las-instancias-de-mastodon/?mc_cid=1122c8fb43
Stalkerware and targeted digital surveillance: what it is and what strategies can we use to look out for one another collectively | Take Back The Tech