Embodied Security

A Critical, Feminist & Decolonial Blog

  • Home
  • Blog
  • Resources
  • About us
  • Colonialism in Disguise: The Sacrifice of SĂĄpmi in the Green Transition
    February 11, 2025

    Colonialism in Disguise: The Sacrifice of SĂĄpmi in the Green Transition

    admin
  • Poverty Porn – Dirty Work or Dirty Word?
    February 10, 2025

    Poverty Porn – Dirty Work or Dirty Word?

    admin
  • The Real Cost of the Green Transition: How Lithium Extraction Affects Indigenous People in the Andean Region
    February 10, 2025

    The Real Cost of the Green Transition: How Lithium Extraction Affects Indigenous People in the Andean Region

    admin
  • Who Gets to Flee? Gender, Borders and the War in Ukraine
    February 10, 2025

    Who Gets to Flee? Gender, Borders and the War in Ukraine

    admin
  • ‘Deneutralising’ to Neutralise: Questioning the World of Nuclear Weapons
    February 10, 2025

    ‘Deneutralising’ to Neutralise: Questioning the World of Nuclear Weapons

    admin
  • Los Angeles Fires Serve as a Crucial Reminder That the West is Vulnerable Too 
    February 10, 2025

    Los Angeles Fires Serve as a Crucial Reminder That the West is Vulnerable Too 

    admin
  • Zuckerberg is ruining social media security for us, so that he can join Trump’s circle of tech bros
    February 3, 2025

    Zuckerberg is ruining social media security for us, so that he can join Trump’s circle of tech bros

    admin
  • Security vs Submission: Why Are Women Voting for Trump?
    January 31, 2025

    Security vs Submission: Why Are Women Voting for Trump?

    admin
  • Proving Sexual Orientation and Gender Identity: The Struggles of LGBTQ Migrants in Asylum Processes 
    January 31, 2025

    Proving Sexual Orientation and Gender Identity: The Struggles of LGBTQ Migrants in Asylum Processes 

    admin
  • Policing the Border: Racial Discrimination under The Tidö Agreement 
    January 31, 2025

    Policing the Border: Racial Discrimination under The Tidö Agreement 

    admin
Previous Page
1 2 3 4 5
Next Page

Embodied Security