|
|
Line 1: |
Line 1: |
|
| |
|
| We're going to be throwing a CryptoParty every third Thursday from 8-11pm. | | We're going to be throwing a CryptoParty every second Thursday from 7-11pm. |
| We have [[Detailed_Directions|detailed directions]] if you're unfamiliar with the space. | | We have [[Detailed_Directions|detailed directions]] if you're unfamiliar with the space. |
| It's free! Just bring your laptop or other devices. | | It's free! Just bring your laptop or other devices. |
Line 38: |
Line 38: |
| (tin foil hats not included) | | (tin foil hats not included) |
|
| |
|
| == Code Examples == | | == Code examples == |
| The demonstration where I pulled my own session keys to put them into the browser had a few commands associated with it. Here they are: | | The demonstration where I pulled my own session keys to put them into the browser had a few commands associated with it. Here they are: |
| https://gist.github.com/eldondev/5980868 | | https://gist.github.com/eldondev/5980868 |
|
| |
| This is the script I used to modify the .ovpn files from [http://vpngate.net| VPNGate] so that the VPN settings could be easily imported into Ubuntu:
| |
| [https://gist.github.com/emptyset/5981276| extract.sh]
| |
|
| |
| == Talks ==
| |
|
| |
| * 2013-JUL-11 [[media:2013-JUL-11.VPN.pdf|Virtual Private Networks, Expounded Casually for the Novice Computer User]]
| |
| * 2013-AUG-07 [[media:2013-AUG-08.DeadDrop.pdf|Dead Drop, or how I learned to stop worrying and love encryption]]
| |
| * 2013-SEP-12 [[media:OnionPi.Presentation.pdf|Onion Pi, Turning a Raspberry Pi into a Tor Access Point]]
| |
| * 2013-OCT-10 [[media:SilkRoad.Presentation.pdf|The Silk Road OPSEC Fail, "Whoops!"]]
| |
| * 2014-MAR-13 [[media:Censorship.Presentation.pdf|$%#^&*, Censorship, a Concise Context]]
| |
| * 2014-MAY-15 [[media:Autonomy.Presentation.pdf|Autonomy, Another one of those "heady" presentations]]
| |
| * 2014-JUN-19 [[media:Stegonography-101.Presentation.pdf|Steganography 101, How to hide information, or "You'll never look at the Internet the same way ever again"]] [[https://docs.google.com/presentation/d/13qKZOkVQvTH8tzgJYxOlhA5iCOah96n-cOqGngjdhEk/edit?usp=sharing Original]]
| |
| * 2014-AUG-21 [https://docs.google.com/presentation/d/1TmAcs_fZldhjnYxUD6faO_x9dXePfHx8rGCNdnntR70/edit?usp=sharing Protecting Sources: How to Use Technology to Keep Sources Confidential, Anonymous, and Secure]
| |
|
| |
| == HOWTOs ==
| |
|
| |
| * [[CryptoParty_HOWTO_GPG|HOWTO: GPG, Thunderbird, Engimail]]
| |
|
| |
| == Links ==
| |
| * [http://www.schneier.com/blog/archives/2013/07/privacy_protest.html Privacy Protests]
| |
| * [https://www.eff.org/deeplinks/2010/09/field-guide-copyright-trolls EFF Field Guide to Copyright Trolls]
| |
| * [https://openwireless.org Open Wireless Initiative]
| |
| * [http://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007 Review of VPN Providers]
| |
| * [http://www.vpntopten.com/security/what-is-a-dns-leak-and-how-it-affects-vpn-security DNS Leaks Explained]
| |
| * [http://learn.adafruit.com/onion-pi/overview Onion Pi Step-by-Step Instructions]
| |
| * [http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf Silk Road Criminal Complaint]
| |
| * [http://grugq.github.io/blog/archives The Grugq Blog Archives]
| |
| * [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565 I've Got Nothing To Hide and Other Misunderstandings of Privacy]
| |
| * [https://www.youtube.com/watch?v=kVhmxHmoXlk Drop It Like It’s Hot: Secure Sharing and Radical OpSec for Investigative Journalists]
| |
| * [https://diafygi.github.io/webrtc-ips/ WebRTC IP Leak Test]
| |
|
| |
| == Online Tools ==
| |
| * [https://panopticlick.eff.org Panopticlick Test for Browser Uniqueness]
| |
| * [https://www.howsmyssl.com How's my TLS?]
| |
|
| |
| == Browser Settings, Plugins ==
| |
| * [http://webdevelopmentaid.wordpress.com/2013/10/21/customize-privacy-settings-in-mozilla-firefox-part-1-aboutconfig Customize Privacy Settings in Mozilla Firefox, Part 1, about:config] - Some suggestions for modifying Firefox settings to minimize your digital footprint
| |
| * [https://addons.mozilla.org/en-US/firefox/addon/adblock-edge/ AdBlock Edge]
| |
| * [https://www.eff.org/https-everywhere HTTPS Everywhere Browser Extension]
| |
| * [https://addons.mozilla.org/en-US/firefox/addon/noscript/ NoScript]
| |
| * [https://disconnect.me/#disconnect Disconnect]
| |
| * [https://www.requestpolicy.com/ Request Policy]
| |
We're going to be throwing a CryptoParty every second Thursday from 7-11pm.
We have detailed directions if you're unfamiliar with the space.
It's free! Just bring your laptop or other devices.
You don't have to sign up to come along - but if you do, it helps us prepare. Pseudonymous sign-ups are fine!
Drop in for a few minutes to ask a question or stay all evening and chat about privacy, security, and the interwebz.
What is a CryptoParty?
It's a lot of things in a lot of places. For most, it's a practical workshop for anyone interested in keeping their digital lives private.
Bring your laptops, netbooks, tablets and phones - we'll help you learn how to secure them and your communications:
- full disk encryption for your computers and memory sticks;
- encrypted email, text messages, IM on all your devices;
- anonymous browsing and tracker-avoidance;
- censorship circumvention;
- password generation, databases and management;
- keysigning / extending the web-of-trust.
If you have knowledge and skills to contribute in these or related areas please come along and share them with us!
Plus:
- ad-hoc discussion of the laws that govern who can access your stuff and when; and, at some point in the evening,
- our regular round-up and discussion of some cryptography basics and the latest digital-rights news, opinions, and happenings.
Have more questions? Check out cryptoparty.org. And remember to party like it's 1984!
(tin foil hats not included)
Code examples
The demonstration where I pulled my own session keys to put them into the browser had a few commands associated with it. Here they are:
https://gist.github.com/eldondev/5980868