We've packed two months into one edition.... read the Jan/Feb edition here!
You are here
The Back Room at Tactical Tech
Tactical Tech is looking for a talented developer to work with us in our Berlin office. Go to our jobs page for details! Application deadline is 21 August.
Take a peek into our new office (we've moved!), learn more about the three Danish posters we put up on the wall, and read about our new Women and IT project, here.
We've got three entries in the Knight Foundation's Knight News Challenge, including “Watching Data Barons Go By”, and “Gardens in the Sky - Daily Data Manifestations”. The challenge question this year is “How can we strengthen the Internet for free expression and innovation?” Our entries, and the space to give feedback, are here.
Tactical Tech is currently taking applications for the position of Deputy Director.
Go to our Jobs page for details.
In the wake of the NSA revelations, our tech team has been busy changing the way our internal email works - automatically encrypting any email that is stored on our servers with PGP encryption. Even if an unencrypted email is sent to us, it is encrypted and stored as soon as it is delivered to our server - only decryptable by the person the email was sent to.
(sketches by Julian Kueklich)
These live illustrations were created from Tactical Tech's recent digital security workshop at Media in Cooperation and Transition. https://www.tacticaltech.org/security-and-privacy-illustrated
The Evidence & Influence Micro-magazine has been launched! The magazine is a compilation of multi-media stories about and by participants who attended Tactical Tech’s Info-Activism Camp 2013. https://camp2013.tacticaltech.org/.
Building on our Security in-a-box toolkit for human rights defenders , Tactical Tech has produced a toolkit specifically for the LGBT community from Arabic-speaking countries. The guide helps to contextualise digital security threats for LGBT persons and human rights defenders in the region, and offers tools and tactics that can be used to overcome these threats.