Author Archives

Why the command line is not usable

A number of FLOSS tools require users to do work at the command line in order to set them up or operate them. With Linux and its applications, this is often expected. Very few Windows, Apple, or even Android applications expect anyone to do this anymore. Expecting this of end users is problematic (as I’ve […]

CTF IconLocal: Rough sketches

At the Circumvention Tech Festival in Valencia in early March, we held an IconLocal — an event to develop graphics as a community, in the style of the Noun Project. Digital security trainers (and trainers of trainers) who have worked in Africa, the Middle East, Eastern Europe, Latin America, and Russia joined forces with software […]

Ebola: What you can do to help

I am an ardent participant in NYC’s West African dance classes. They have kept me healthy in both body and mind for over ten years now, seeing me through major transitions and hard times, bringing me and hundreds of others joy every week. So an international news feed shouting about ebola spiraling out of control […]

Everyone Come to HOPE!

UPDATE: Looking for a HOPE conference schedule where you can see workshop times alongside talk times? You’re in luck, I made one: HOPE X Schedule Grid Yep, it’s time once again for the Hackers On Planet Earth conference, Friday July 18–Sunday July 20 at the Hotel Pennsylvania in New York City. And it’s time for […]

Learning From Learners: Some questions asked at security trainings

As I’ve said in previous posts, it is critical to understand learners’ mental models of a system you are teaching them about, in order to help them build accurate understandings of the technologies they are using. Questions that attendees ask in security training sessions can be useful to understanding some of the misconceptions learners come […]