Technology in Hostile States: Ten Principles for User Protection
Best practices for using cryptography and privacy by design to improve security and protect user data from well-resourced attackers and oppressive regimes.
Source: blog.torproject.org
Links relevant to my work and interests: IT, agile, startups, Internet, web development, databases, programming, design patterns, work motivation... (Popular topics)