Home
About
Phase 0: Introduction
Intro
How to Use
Phase 1: Centering Human Rights
Overview
Chapter 1 – Figuring Out the Problem
Chapter 2 — Working With a Community
Chapter 3 – Understanding Harm (Threat Modeling)
Phase 2: Conducting Research
Overview
Chapter 4 – Research
Chapter 5 – Designing for Everyone
Chapter 6 – Personas
Chapter 7 – Ideation / Validating Research Findings
Phase 3: Prototyping
Overview
Chapter 8 – Community Feedback and Testing
Chapter 9 – Revising the Prototype
Phase 4: Launching
Overview
Chapter 10 – Integrating Feedback and Launching
Chapter 11 – Iteration
Phase 5: Looking to Future
Overview
Chapter 12 – Sustainability
Chapter 13 – Importance of This Work
Resources
Glossary
Twitter
Email
HRCD
Security
Resources
HOW TO USE
UN’s 1948 Universal Declaration on Human Rights
Design Justice
EFF Surveillance Self-Defense Guide
The Manila Principles
Tactical Tech Guide
INTRODUCTION
Secure UX Checklist
Silicon Values by Jillian C. York
Reddit Thread by ACLU and Edward Snowden about Mass Surveillance
Human-centered Design
Facial Recognition Is Accurate, if You’re a White Guy - by Steve Lohr
Politics & Method - Design Thinking Arrives in Pakistan
Universal Declaration of Human Rights
International Bill of Rights
What is GDPR, the EU’s new data protection law?
California Consumer Privacy Act (CCPA)
Universal Declaration of Human Rights - Translations
Clearview AI created a non-consensual database of people and their information using facial recognition technology
Rohingya sue Facebook for £150bn over Myanmar genocide - by Dan Milmo
What Is Privacy?
Pretty Good Privacy
GPG Suite
OpenPGP
The 6 Principles of Human Rights Centered Design for AI
Mastodon
Technology to Combat Authoritarianism - by Dragana Kaurin
CHAPTER 1 - Figuring out the Problem and Whether You Are The Person to Help Solve it
Ecosystem Map
Principles of Co-Design
What is Co-Design?
Ecosystem Mapping
NDI’s Co/Act guide for ecosystem mapping
Design thinking’s most popular strategy is BS - by Tricia Wang
Project Inkblot
How to begin designing for diversity
Design Justice, Chapter 2 Design Practices: “Nothing about Us without Us”
Better security design
CHAPTER 2 - Working with a community
Wikimedia Foundation
Signal
Telegram
Linux's Creator Is Sorry. But Will He Change? - Wired
When to Use Which User-Experience Research Methods
CHAPTER 3 - Understanding Harm: Threat Modeling
Tactical Tech’s Holistic Security Guide: A Strategy Manual for Human Rights Defenders
Threat Modeling
Everything Old is New Part 2: Why Online Anonymity Matters - by Jillian C. York
Facebook relaxes 'real name' policy in face of protest - by Alex Hern
Facebook's 'Real Name' Policy Can Cause Real-World Harm for the LGBTQ Community - by Jillian C. York and Dia Kayyali
Book Review: Sara Wachter-Boettcher’s Technically Wrong - By Kiran Bhardwaj
2011 in Review: Nymwars - by Eva Galperin
Chapter 2.8 Identifying and Analyzing Threats - The Holistic Security Manual by Tactical Tech
The Holistic Security Manual by Tactical Tech
Tactical Tech’s brainstorm exercise
Chapter 3.1 Responding to Threats - The Holistic Security Manual by Tactical Tech
What Is Doxxing? 5 Examples of Doxxing and How to Prevent It
Do You Suddenly Need To Stop Using WhatsApp? - by Zak Doffman
Yes, Telegram Really Is ‘Dangerous’ For You - by Zak Doffman
Best Secure Email Services For Privacy Concerned People - Foss’ 2021 guide
CryptPad: Collaboration suite, encrypted and open-source
Electronic Frontier Foundation’s Surveillance Self Defense guide
Contributor’s Covenant
Are Apple’s Tools Against Child Abuse Bad for Your Privacy?
Apple and Google bend to Russian government pressure on voting app - by Adi Robertson
Google and Apple, Under Pressure From Russia, Remove Voting App
CHAPTER 4 - Research Methods
Types of Research within Qualitative and Quantitative
Key Elements of a Research Proposal Quantitative Design
Quantitative Research Design Methods for Writing Dissertations
Bellingcat
Mnemonic’s Syrian Archive
UC Berkeley’s Human Rights Center
Moderated vs. unmoderated usability testing: the pros and cons
Guerrilla or Hallway Testing
Design Justice approach
CHAPTER 5 - Designing for Everyone
Inclusive Design
What is Accessibility?
Karen Reilly: Leading Team CommUNITY’s Accessibility Efforts
Why I Wrote the Americans with Disability Act
Americans with Disabilities Act
Websites need to be more accessible for disabled people
Got access for people with disabilities covered? Don't forget your website
Website Accessibility & the Law: Why Your Website Must Be Compliant
Your website is not accessible - Example: Screen reader
Microsoft’s Inclusive Design Kit
Web Accessibility Evaluation Tools List
CKEditor - Accessibility Checker
Asana
Asana - Accessibility Features
Pretty Good Privacy (PGP)
Heard DC
Thisten
Mozilla on Accessibility
W3 on Accessibility
The Interaction Design Foundation’s Work on Accessibility
18F’s Guide to Accessibility
CHAPTER 6 - Personas
Putting Personas to Work in UX Design: What They Are and Why They’re Important
Design Justice by Sasha Costanza-Chock
Human Rights Watch (HRW)
Irth
Persona Template
Evidence + Empathy: How Personas Can Help Universities Design Better Student Experiences During COVID-19
CHAPTER 7 - Ideation & Validating Research Findings
Design Kit by Ideo.org
Circle of 6
CHAPTER 8 - Remote User Testing for Communities
The New Design Congress
Don’t Make Me Think, Revisited - A Common Sense Approach to Web (and Mobile) Usability
The Limits to Digital Consent - Understanding the Risks of Ethical Consent and Data Collection for Underrepresented Communities
CHAPTER 9 - Building a Secure, Ethical Prototype and Preparing for Alpha Release
Freedom of the Press Foundation
SecureDrop
Admin Guide - SecureDrop stable documentation
Qubes OS