DemTech: Our Blog

Getting Started in Internet Repression

Photo

Greetings, fellow Autocrats and Internet Oppressors!

The rapid pace in which information can spread in this internet era makes activities by some hard to hide. This is bad…

Read More


Creating a Secure, Inexpensive, Personal Sync Solution

Photo
BitTorrent Sync

As technology has evolved it has become increasingly commonplace for us as users of technology to expect our files to be where we are. With solutions like Dropbox.com, Google Drive, Box.com, OneDrive by Microsoft we are often allocated a…
Read More


We're Hiring! NDItech Summer Internship

Photo

Are you a tech junkie? Do you believe that politics matters? Do you want to make the world a (ever-so-slightly) better place? Nothing particular going on this summer?

You're in luck. We're hiring.

This paid internship, available…

Read More


Afghanistan Elections 2014: Where will observers be?

Photo
City map of Kabul, with blue points of interest (description not provided in map key). Map key states there are 3 polling stations for men, and 1 polling station for women.

The upcoming Afghanistan election (5…

Read More


The Cyber Losers: The Weaponization of Cyberspace and Its Affect on Human and Democracy Rights

Photo
An illustration of the global cyber arms race from 1985 to 2013

I just returned from the International Studies Association conference in Toronto, Canada where thousands of scholars from around the world gathered to discuss virtually…

Read More


A Bill of Rights for the Internet: Brazil Leads the Way

Photo

Late yesterday, Brazil’s House of Representatives passed the Marco Civil, a bill aimed at guaranteeing civil rights in the use of the Internet in…

Read More


Circumventing Twitter Restrictions

Photo
Screenshot

Turkey blocked Twitter. If you…

Read More


Crowdsourcing & Community Mapping for Better Governance

Photo

Over the past few years, numerous examples in our everyday life have surfaced on how crowdsourcing & mapping data have helped improve delivery of public services. From,

Read More


Will Mobile Phone Security Always Be An Oxymoron?

Photo

Is true mobile phone security a lost cause? With the increasing popularity of mobile messaging applications with weak security practices, the escalation of sim card registration requirements, and the nearly antiquated legal definitions…

Read More


Data Centric for Low (No) Cost

photo

Recent news out of Malawi has focused on the President dissolving her cabinet in the wake of arrests of several officials on suspicion of stealing state funds. The “cashgate”…

Read More