April 21, 2006 · Posted in: Media

Technical workshops

tech jeremiah.jpg tech andrew.jpg ethannart.jpg

Technical matters were discussed on each of the three days of Free Expression in Asian Cyberspace. (Roby Alampay, executive director of SEAPA, defined “technical” as anything that he can’t understand.)

The following speakers addressed the participants:

  • Andrew Lih (slides, audio: 1 and 2)
    Wikis and online collaboration tools, paving way for continuing collaboration and discussions, and the building of an Asian network for the defense of free expression in cyberspace

For additional information, please visit the conference blog at Free Expression in Asian Cyberspace, or see the latest posts by blogger-participants through Technorati and Google Blog Search.

6 Responses to Technical workshops

Avatar

Roger

April 22nd, 2006 at 12:40 pm

Great work Alecks and all. But, some of the links don’t seem to work which is frustrating as Im sure its great stuff too!

Avatar

…My heart’s in Accra » Our talk in Manila

April 22nd, 2006 at 4:42 pm

[…] We’ve released the vast slide deck we put together under Creative Commons 2.5 – Attribution and it’s already available on the web. There’s also three (long!) audio files of our talk, which allowed friends like Janet to participate vicariously in the conference without coming to Manila. We’ll be revising and re-releasing the slides in a few weeks (I hope to work on some revisions on the flight home) and writing a few short, practical articles on some aspects of the talk: basic steps towards securing email, an easy (easier?) guide to anonymous blogging, basic circumvention strategies, quick and dirty VPNs through ssh… The fact that some of the conference attendees have offered to translate these pieces into Thai, Vietnamese and other languages is a huge incentive to get the work done. […]

Avatar

INSIDE PCIJ: Stories behind our stories » Asian conference on free expression ends

April 23rd, 2006 at 5:19 am

[…] Technical workshops […]

Avatar

Alecks Pabico

April 24th, 2006 at 3:19 pm

Roger, please tell us which links are not working so we can fix them.

Avatar

…My heart’s in Accra » “We’ve got to adjust some of our threat models”

October 7th, 2006 at 8:13 am

[…] The session was a real education for both of us. I’ve given three of these workshops in the past year, but this was the first with attendees all focused on the same nation, facing the same constellation of problems. We outlined many of the topics covered in the Secure NGO in a Box CD-ROM (which we may need to translate into the native language of this country), covering disk wiping (Eraser), encrypted storage (BestCrypt), password management (Password Safe), as well as topics I covered in a training with Nart Villeneuve earlier this year: web filtering, filter circumvention using open and anonymized proxies, and secure publishing. Roger gave a great overview of the state of the art in cryptography, a detailed introduction to Tor and future directions for development, and an introduction to secure messaging through Off the Record Messaging. […]

Avatar

ironcove.net - Security Awareness for .orgs. » Blog Archive » Using Technology to Protect Free Speech in Dangerous Places

October 13th, 2006 at 8:58 am

[…] The session was a real education for both of us. I’ve given three of these workshops in the past year, but this was the first with attendees all focused on the same nation, facing the same constellation of problems. We outlined many of the topics covered in the Secure NGO in a Box CD-ROM (which we may need to translate into the native language of this country – more on NGO in a Box here), covering disk wiping (Eraser), encrypted storage (BestCrypt), password management (Password Safe), as well as topics I covered in a training with Nart Villeneuve earlier this year: web filtering, filter circumvention using open and anonymized proxies, and secure publishing. Roger gave a great overview of the state of the art in cryptography, a detailed introduction to Tor and future directions for development, and an introduction to secure messaging through Off the Record Messaging. […]

Comment Form