Media that Glencora Borradaile has been quoted in or contributed to:

Encryption, Cell Phones, and Threats from the Surveillance State: A Presentation from the Civil Liberties Defense Center podcast with Its Going Down.  August 2021.

Defend Dissent with Tor guest post on the Tor Project Blog.  April 2021.
The anonymity that the Tor technology enables turns the internet into what it should be: a place to communicate without everyone knowing your business.

Digital Security Tools for Organizing with the CLDC interview with the Final Straw Radio. May 2020.
When we started doing this, it predated Signal, it predated Keybase, it predated anything that was easy to use at all. But now we actually can thing about easy tools to use, tools that really fit was a group of people need, so tailoring to the specific needs of a group.

Tracking Technology in Pandemic interview with the Final Straw Radio. May 2020.
If you can do something with less data, then you should do something with less data […] if you can do contact tracing in a privacy preserving way […] then you have to do contact tracing in a privacy preserving way.

Protecting Protest with Privacy for Social Movements by Glencora Borradaile, Terra Magazine. Fall 2019.
In 1976, the Senate Select Committee on Intelligence reprimanded the United States government for adopting “tactics of totalitarian regimes” through the FBI’s COINTELPRO program — tactics that resemble kindergarten versions of modern-day global surveillance and interference methods. 

Cellphones: Friend or Foe? by Kenna Warsinske, The Recompiler. 2017.
You can do end to end encryption like Signal, but your endpoint security is usually your weak spot.

When Algorithms Are Sexist by Victoria Turk, Motherboard. March 2015.
Algorithms are designed by humans and humans, whether male or female, can be sexist, whether consciously or subconsciously.

Print Friendly, PDF & Email