Criteria for Protection of Digital Communication

In general, to protect digital communication the following features are important: Verification: The addresses of the sender and receiver can be verified to be owned by the expected persons. Anonymity: The sender and/or the receiver of a message cannot be associated with an identifier by a third party. If identifiers are available, the identifiers cannot…

Poster for cycling mass action

Introduction The poster below can be used for cycling mass actions by attaching it to a bike trailer, makes most sense if you are the last in the cycling action, so following cars can read it. Tutorial Basic idea: Design an A4 format poster, split it over several A4 sheets, print it, cut and glue…

The Future of Africa – A series on African activists

“African climate activists represent the best of Africa by being often in difficult situations themselves and still finding the strength and empathy to stand up for themselves and others. The least the Global North can do is to open their hearts and minds for the messages of these activists, and take gradual steps towards reducing…

Mobile phones and the cloud – How to protect your privacy

Protection of private information is a fundamental prerequisite in democratic, non-totalitarian systems to avoid excessive control by any government or other powerful group to the point, where no change of the system is possible by individual citizens. Mobile phones play a crucial role across the globe now. While the range of hardware  is more diverse,…

en_USEnglish