Security Policy Generator

Security Policy Generator

Security policies are crucial in mitigation of the digital security threats faced by civil society organizations (CSOs) every day, but the time and expertise required to create and implement them can be prohibitive to all but the biggest and wealthiest CSOs. The...
Security Policy Generator

Suspicious Email Submitter

The Suspicious Email Submitter is an extension for common web browsers and email clients that enables the user in one-click to submit a suspicious email with all the information necessary to a pre-configured destination for further analysis. Malware delivery and...
Open Integrity Index

Open Integrity Index

Open Integrity is a platform allowing the collaborative fact-checking of software security and privacy claims. With a lack of accessible information about complex technology issues underlying privacy and security, users have few resources to be discerning about their...
Security Policy Generator

Arabic Circumvention User support

This project aims to enable those in the MENA region to bypass Internet censorship by providing dedicated Arabic language user support for widely used circumvention tools. At present, dedicated user support for circumvention tools is limited in Arabic, leaving...
Security Policy Generator

Emergency Response to CyberAttacks in the Tibetan Community

The Tibetan community has been under siege from malware and other targeted online attacks for years; the Tibetan exile capital of Dharamsala, India is perhaps the global epicenter of malware attacks. This project aims to enable three Tibetan civil society...