Global
Security Through Encryption and Despite Encryption: An (un)Achievable Outcome?
On 16 June 2021 we organised a roundtable to explore in greater detail how to apply the European Council’s...
The Economic Impact of Laws that Weaken Encryption
Editor’s note: The full report and the extracted executive summary are available in pdf format in English, French, Spanish,...
What the Internet Needs to Exist
This course is an introduction to the Critical Properties of the Internet Way of Networking.
Internet Governance
The Internet Governance course provides an overview of Internet governance, touching on key areas such as its history, policy...
Encryption
The Encryption course is an introduction to encryption, and is intended to serve both as an overview and as...
Fact Sheet: Understanding Encryption: The Connections to Survivor Safety
For many survivors of domestic violence, sexual violence, stalking, and trafficking, having private and secure ways to communicate and...
CDT, GPD and Internet Society Reject Time-Worn Argument for Encryption Backdoors
Fact Sheet: Quantum Physics and Computing
A paper explaining how quantum computing and encryption are related.
Info Guide: For Youth by Youth: 3 Ways to ACT
Heading to a protest or just worried about snooping siblings? You definitely don’t want to be SMSing about it....
Virtual Schooling
Take a look through our back-to-school checklist that aims to help you, as a parent or guardian, make sure...
Open Letter Against Lawful Access to Encrypted Data Act
Fact Sheet: Intermediaries and Encryption
Pressuring intermediaries to weaken security is not the answer to prevent harmful content online