Filters
You need anonymity online. And that's why
Anonymity on the Internet is not only a tool of hackers, but also a key...
1 month ago2025 in Review: Anyone Can Be Labeled a Spy
A review of 2025 for the human rights project Perviy Otdel (“First Department”) and for...
2 months agoTHE HYDROGEN BOMB AND THE MEMORIAL. Academician Sakharov
Academician Sakharov is loved for different things: some know him as the creator of the...
2 months agoSecret archives of the secret services
The Russian state does not like to explain why it persecutes this or that person....
2 months agoVenny Ala-Siurua, Women on Web: How Nonprofits Can Protect Themselves from Cyberattacks and Blocks
eQtalk is an original project of the eQtv channel. Special issue with Leonid Yuldashev, coordinator...
3 months agoDocumenting war crimes
Latvian investigative journalist Inga Springe talks about her passion and power to change the world...
3 months agoInvisible War: How Drones Were Used in FATA (Pakistan)
Life in Pakistan's FATA (Tribal Areas) and why US drone strikes there have gone unseen....
4 months agoThe Syrian Archive. How Photos and Videos Help Document Human Rights Violations in Syria
Why is it important to collect video and photo evidence of human rights violations? What...
5 months agoGoogle, Discord and TikTok on Protecting Users Online
Google, Discord, and TikTok employees discuss industry standards for trust and safety in the digital...
5 months agoSignal President on threats to encrypted messaging
Signal President Meredith Whittaker and former Wired Editor-in-Chief Gideon Litchfield discuss the importance of end-to-end...
5 months agoThe Universal Declaration of Human Rights and New Digital Technologies
Volker Türk, UN High Commissioner for Human Rights, and Marwa Fatafta of Access Now discuss...
5 months agoHow to Avoid Shutdown
Peggy Hicks of the Office of the UN High Commissioner for Human Rights and Berhan...
5 months agoWithout a license and a passport. Who are stateless people?
Can your Russian passport be taken away for an anti-war post on the Internet? According...
5 months ago25 Years of Fighting the FSB. Counterintelligence from the inside. Lawyer Ivan Pavlov
In the 2000s, they tried to kill him; in the 2010s, they planted bugs and...
5 months agoPolitical Repression in the Soviet Union
After the Red Revolution, Russia regularly experienced waves of extermination of enemies of the state....
5 months agoPolitical Investigation in the Russian Empire
In 1649, at the people's request, the government issued the Cathedral Code, the first Russian...
5 months agoHands off: how to withdraw consent to biometrics processing
Have you submitted your biometrics to your bank? In the near future, it will be...
5 months agoShutting down the Internet - when, how and for what? | Shakedown, Part 1
A complete shutdown of the Internet - what is it like? We are used to...
5 months agoBringing human rights standards to content moderation on social media
The problems of content moderation in social networks can be solved by creating a "social...
How to Create and Use Algorithms?
Using algorithms, you can reduce the time it takes to complete many tasks. However, you...