Difference between revisions of "CryptoParty"
(→Talks) |
|||
Line 1: | Line 1: | ||
We're going to be throwing a CryptoParty every | We're going to be throwing a CryptoParty every third Thursday from 8-11pm. | ||
We have [[Detailed_Directions|detailed directions]] if you're unfamiliar with the space. | We have [[Detailed_Directions|detailed directions]] if you're unfamiliar with the space. | ||
It's free! Just bring your laptop or other devices. | It's free! Just bring your laptop or other devices. | ||
Line 53: | Line 53: | ||
* 2014-MAR-13 [[media:Censorship.Presentation.pdf|$%#^&*, Censorship, a Concise Context]] | * 2014-MAR-13 [[media:Censorship.Presentation.pdf|$%#^&*, Censorship, a Concise Context]] | ||
* 2014-MAY-15 [[media:Autonomy.Presentation.pdf|Autonomy, Another one of those "heady" presentations]] | * 2014-MAY-15 [[media:Autonomy.Presentation.pdf|Autonomy, Another one of those "heady" presentations]] | ||
* 2014-JUN-19 [[media:Stegonography-101.Presentation.pdf|Steganography 101, How to hide information, or "You'll never look at the Internet the same way ever again"]] | * 2014-JUN-19 [[media:Stegonography-101.Presentation.pdf|Steganography 101, How to hide information, or "You'll never look at the Internet the same way ever again"]] [[https://docs.google.com/presentation/d/13qKZOkVQvTH8tzgJYxOlhA5iCOah96n-cOqGngjdhEk/edit?usp=sharing Original]] | ||
* 2014-AUG-21 [https://docs.google.com/presentation/d/1TmAcs_fZldhjnYxUD6faO_x9dXePfHx8rGCNdnntR70/edit?usp=sharing Protecting Sources: How to Use Technology to Keep Sources Confidential, Anonymous, and Secure] | |||
== HOWTOs == | == HOWTOs == | ||
Line 69: | Line 70: | ||
* [http://grugq.github.io/blog/archives The Grugq Blog Archives] | * [http://grugq.github.io/blog/archives The Grugq Blog Archives] | ||
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 I've Got Nothing To Hide and Other Misunderstandings of Privacy] | * [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 I've Got Nothing To Hide and Other Misunderstandings of Privacy] | ||
* [https://www.youtube.com/watch?v=kVhmxHmoXlk Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists] | |||
* [https://diafygi.github.io/webrtc-ips/ WebRTC IP Leak Test] | |||
== Online Tools == | == Online Tools == |
Latest revision as of 02:10, 17 March 2017
We're going to be throwing a CryptoParty every third Thursday from 8-11pm. We have detailed directions if you're unfamiliar with the space. It's free! Just bring your laptop or other devices.
You don't have to sign up to come along - but if you do, it helps us prepare. Pseudonymous sign-ups are fine!
Drop in for a few minutes to ask a question or stay all evening and chat about privacy, security, and the interwebz.
What is a CryptoParty?
It's a lot of things in a lot of places. For most, it's a practical workshop for anyone interested in keeping their digital lives private.
Bring your laptops, netbooks, tablets and phones - we'll help you learn how to secure them and your communications:
- full disk encryption for your computers and memory sticks;
- encrypted email, text messages, IM on all your devices;
- anonymous browsing and tracker-avoidance;
- censorship circumvention;
- password generation, databases and management;
- keysigning / extending the web-of-trust.
If you have knowledge and skills to contribute in these or related areas please come along and share them with us!
Plus:
- ad-hoc discussion of the laws that govern who can access your stuff and when; and, at some point in the evening,
- our regular round-up and discussion of some cryptography basics and the latest digital-rights news, opinions, and happenings.
Have more questions? Check out cryptoparty.org. And remember to party like it's 1984!
(tin foil hats not included)
Code Examples
The demonstration where I pulled my own session keys to put them into the browser had a few commands associated with it. Here they are: https://gist.github.com/eldondev/5980868
This is the script I used to modify the .ovpn files from VPNGate so that the VPN settings could be easily imported into Ubuntu: extract.sh
Talks
- 2013-JUL-11 Virtual Private Networks, Expounded Casually for the Novice Computer User
- 2013-AUG-07 Dead Drop, or how I learned to stop worrying and love encryption
- 2013-SEP-12 Onion Pi, Turning a Raspberry Pi into a Tor Access Point
- 2013-OCT-10 The Silk Road OPSEC Fail, "Whoops!"
- 2014-MAR-13 $%#^&*, Censorship, a Concise Context
- 2014-MAY-15 Autonomy, Another one of those "heady" presentations
- 2014-JUN-19 Steganography 101, How to hide information, or "You'll never look at the Internet the same way ever again" [Original]
- 2014-AUG-21 Protecting Sources: How to Use Technology to Keep Sources Confidential, Anonymous, and Secure
HOWTOs
Links
- Privacy Protests
- EFF Field Guide to Copyright Trolls
- Open Wireless Initiative
- Review of VPN Providers
- DNS Leaks Explained
- Onion Pi Step-by-Step Instructions
- Silk Road Criminal Complaint
- The Grugq Blog Archives
- I've Got Nothing To Hide and Other Misunderstandings of Privacy
- Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists
- WebRTC IP Leak Test
Online Tools
Browser Settings, Plugins
- Customize Privacy Settings in Mozilla Firefox, Part 1, about:config - Some suggestions for modifying Firefox settings to minimize your digital footprint
- AdBlock Edge
- HTTPS Everywhere Browser Extension
- NoScript
- Disconnect
- Request Policy