Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
boston_past_events [2017/06/25 03:16] bittereggplantboston_past_events [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
 +[[https://www.cryptoparty.in/boston#upcoming_events|Upcoming events]]
 +
 ===== Past Events in Boston Massachusetts ===== ===== Past Events in Boston Massachusetts =====
 +
 +^ Date        ^ Details                                                                                                                             ^
 +| 2019-6-26   | How to setup and use a 2FA token device, such as Yubikey at Sprout                                                                  |
 +| 2018-07-25  | Monthly Digital Security 101 at Sprout                                                                                              |
 +| 2018-06-27  | Monthly Digital Security 101 at Sprout                                                                                              |
 +| 2018-05-30  | Monthly Digital Security 101 at Sprout                                                                                              |
 +| 2018-05-09  | [[https://mos.org/public-events/cryptoparty|A Crash Course in Digital Hygiene]], at the [[https://www.mos.org/|Museum of Science]]  |
 +| 2018-04-25  | Monthly Digital Security 101 at Sprout                                                                                              |
 +| 2018-03-28  | Monthly Digital Security 101 at Sprout                                                                                              |
 +| 2018-02-10  | Creating a (greater) Boston Meshnet at Somerville public library                                                                    |
 +
 +  * [[https://www.reddit.com/r/BostonMeshnet/|r/bostonmeshnet]]
 +  * Mass Pirates [[https://masspirates.org/blog/2018/02/05/saturday-community-meshnet-workshop/|blog post]]
  
 ^Date^Details| ^Date^Details|
 +|2018-01-31|Chatting about meshnets at Sprout|
 +|2017-12-27|Monthly Digital Security 101 at Blue Shirt Cafe|
 +|2017-11-29|Monthly Digital Security 101 at Sprout|
 +
 +  * There was interest in a discussion about mesh networking, so demo-ing an Enigmabox would be worthwhile. PirateBox, too? During the discussion, we talked about whether a cryptocurrency would be useful to incentivize hosting nodes / file sharing on the network. Someone specifically mentioned an Initial Coin Offering to build equity. Am not an expert in this area so I don't know whether it's at all feasible. Made for good discussion at the time!
 +
 +  * We also discussed two apps that are trying to address the injustices of people sitting in jail because they are too poor to pay cash bail (something like 700,000 people at any given moment in America). Apps like [[https://thenewinquiry.com/bail-bloc/|BailBloc]] and [[https://appolition.us/|Appolition]] are trying to generate money for community bail funds.
 +
 +^Date^Details|
 +|2017-11-11|Boston Anarchist Bookfair|
 +|2017-11-04|South Boston BPL|
 +|2017-10-25|Monthly Digital Security 101 at Sprout|
 +
 +Talked about:
 +
 +  * [[https://send.firefox.com/|https://send.firefox.com/]] for private file sharing
 +  * [[https://www.privacytools.io/|https://www.privacytools.io/]] if shopping for VPNs
 +  * [[https://keybase.io/|https://keybase.io/]] as a new and interesting way of advertising your pgp public key
 +  * [[https://f-droid.org/|https://f-droid.org/]] as a way of finding open source android apps, which are not in the Play Store
 +  * [[https://authy.com|https://authy.com]] using a true two factor authentication system, instead of SMS
 +  * [[http://www.thesomervilletimes.com/archives/79600|Article]] in The Somerville Times
 +
 +^Date^Details|
 +|2017-09-27|Monthly Digital Security 101 at Sprout|
 +
 +Talked about:
 +
 +  * How to complete the set up for Signal, to ensure no man-in-the-middle exposure.
 +  * How DropBox is known to be p0wed by the NSA.
 +  * The down sides to keeping all your passwords in a Google docs, document, unencrypted.
 +  * Who uses which password manager.
 +  * Services which allow you to generate one time credit card numbers.
 +
 +^Date^Details|
 +|2017-08-30|Monthly Digital Security 101 at Sprout|
 +|2017-07-26|Monthly Digital Security 101 at Sprout|
 +
 +Thanks again to Troy for hosting us! Small turnout this week, but good discussion about semiconductors, trusting trust and thinking about security for lawyers.
 +
 +^Date^Details|
 +|2017-07-20|In association with [[http://encuentro5.org|E5]] & Boston Socialist School|
 |2017-06-20|BPL Fields Corner branch| |2017-06-20|BPL Fields Corner branch|
 +
 +I went to the Fields Corner cryptoparty last week and had a lot of fun. Had about 10 attendees. Talked about using general operational security, threat models, strong passwords, password managers, mobile security, and anonymous browsing. Seemed like our info was well-received. We're getting pretty good at the Digital Security 101 training, if I do say so myself!
 +
 +^Date^Details|
 |2017-06-24|BPL South Boston branch| |2017-06-24|BPL South Boston branch|
 |2017-05-30|Monthy Digital Security 101 at Sprout| |2017-05-30|Monthy Digital Security 101 at Sprout|
Line 54: Line 114:
 A couple things from last night: Mailvelope seems to be a pretty cool tool. There's a demand for a Linux "install fest". Let's set aside some time to do that in the future. Speaking of which, seems we're developing a workflow to on-board new members into the crypto community. Something like this: Install Linux –> Generate key pair –> Exchange keys –> Start messaging. The more concrete we can be about this process on the website and during cryptoparties, the easier it'll be for others to join. Talked a little about botnets and DDOS attacks. V v interesting. Would love to learn more about systems administration and protecting home routers against botnets. So turns out the models I've been using to describe encrypted messaging (Alice, Bob, public key, private key) barely scratch the surface of the problem of secret messaging. It'd be great to have more information about what, exactly, models like the Diffie-Hellman diagram are trying to describe. From what I gather, the problem is how to make a handshake when you're being watched the entire time. If you can, please shed some light about this problem! A couple things from last night: Mailvelope seems to be a pretty cool tool. There's a demand for a Linux "install fest". Let's set aside some time to do that in the future. Speaking of which, seems we're developing a workflow to on-board new members into the crypto community. Something like this: Install Linux –> Generate key pair –> Exchange keys –> Start messaging. The more concrete we can be about this process on the website and during cryptoparties, the easier it'll be for others to join. Talked a little about botnets and DDOS attacks. V v interesting. Would love to learn more about systems administration and protecting home routers against botnets. So turns out the models I've been using to describe encrypted messaging (Alice, Bob, public key, private key) barely scratch the surface of the problem of secret messaging. It'd be great to have more information about what, exactly, models like the Diffie-Hellman diagram are trying to describe. From what I gather, the problem is how to make a handshake when you're being watched the entire time. If you can, please shed some light about this problem!
  
-^Date ^Location ^Address ^Additional Information ^+^Date^Location^Address^Additional Information|
  
 |2016-10-22|BPL, Grove Hall Branch|41 Geneva Avenue, Dorchester, MA| | |2016-10-22|BPL, Grove Hall Branch|41 Geneva Avenue, Dorchester, MA| |