Differences

This shows you the differences between two versions of the page.

Link to this comparison view

resource [2013/06/21 23:16] – [Kerckhoffs's principle] svaconnect:resources [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
-“In order to make sure the mobile phone frequencies are not being tracked, I would fill up a washbasin with water and put the lid of a rice cooker over my head while I made a phone call. I don’t know if it worked or not, but I was never caught.” -- [[http://www.bbc.co.uk/news/technology-20445632|North Korean user]] +{{  :cp-logo-100x33.png?nolink&}}
  
 +====== Resources ======
 +
 +We are working on multi language [[http://github.com/cryptoparty|resources]] like Slides, Guides and Flyers in order to make Cryptoparty more accessible to people that are not native English speakers or would prefer the resources in their own language.
 +
 +Here are some links to the resources made by our community which can be used below:
 +
 +^ Link                                                       ^ Comment                                                                                                                                                                   ^
 +| [[https://github.com/cryptoparty/slides|Slides]]           | attempt to create a universal basic set of presentation slides to help teach basic concepts at CryptoParties                                                              |
 +| [[https://github.com/cryptoparty/artwork|Artwork]]         | collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, handouts and flyers for CryptoParties  |
 +| [[https://github.com/cryptoparty/handouts|Handouts]]       | collection of handouts and, where possible, their source files to help others make new CryptoParty handouts                                                               |
 +| [[https://github.com/cryptoparty/flyers|Flyers]]           | flyers and, where possible, their source files to help others make new CryptoParty flyers                                                                                 |
 +| [[https://github.com/cryptoparty/stickers|Stickers]]       | a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers                                                               |
 +| [[https://peter.tono.li/en/peters-blog/cryptoparty|Tips]]  | Tips on hosting a CryptoParty                                                                                                                                             |
 +
 +\\
 +
 +
 +==== old stuff below ====
 +
 +“In order to make sure the mobile phone frequencies are not being tracked, I would fill up a washbasin with water and put the lid of a rice cooker over my head while I made a phone call. I don’t know if it worked or not, but I was never caught.” – [[http://www.bbc.co.uk/news/technology-20445632|North Korean]]
  
 ====== A Note of Caution ====== ====== A Note of Caution ======
  
-Please only add resources and tools to this page or it subpages. As anyone can edit this wiki, some skepticism is warranted —crowd-sourcing has the defects of its virtues! For good, concrete, peer-reviewed advice, we recommend the Electronic Frontier Foundation's tutorials at https://ssd.eff.org/ +Please only add resources and tools to this page or it subpages. Remember that as anyone can edit this wiki, some skepticism is warranted (trust but verify!) —crowd-sourcing has the defects of its virtues! 
 + 
 +====== External Resources ====== 
 + 
 +For good, concrete, peer-reviewed advice, we recommend the following resources: 
 + 
 +  * [[https://ssd.eff.org/|Surveillance Self-Defense]] by the Electronic Frontier Foundation 
 +  * [[https://freedom.press/encryption-works|"Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance"]] by Freedom of the Press Foundation 
 +  * [[https://securityinabox.org/en|Security in-a-box]] by Front Line Defenders and Tactical Technology Collective 
 +  * [[https://cpj.org/reports/2012/04/technology-security.php|https://cpj.org/reports/2012/04/technology-security.php]]
  
-That said, your privacy is already more configurable than you might think...+That said, your privacy is already more configurable than you might think
  
 === Cryptography is Powerful, but not your only line of defense === === Cryptography is Powerful, but not your only line of defense ===
  
 The theory behind cryptography is solid and proven, but solid crypto will fail if: The theory behind cryptography is solid and proven, but solid crypto will fail if:
 +
   * Implemented incorrectly – if the tool claims to have certain crypto implemented, they may be truthful but the implementation may be unsound. Try to use the tools that have a large user base and large communities, as they are generally safer (but not always).   * Implemented incorrectly – if the tool claims to have certain crypto implemented, they may be truthful but the implementation may be unsound. Try to use the tools that have a large user base and large communities, as they are generally safer (but not always).
   * Misused – encrypted a file but didn't secure-delete the plain-text? Initiated an SSL tunnel but didn't verify the remote certificate? Use top notch crypto rumah dijual software but didn't protect the OS or the physical computer? It is so easy to make mistakes, doing it right requires consistency, vigilance, and a modicum of paranoia. Assume that you do not know anything about a tool, learn everything you can about it, then use it. Carefully. Mistakes may render your state-of-the-art crypto useless against a knowledgeable adversary.   * Misused – encrypted a file but didn't secure-delete the plain-text? Initiated an SSL tunnel but didn't verify the remote certificate? Use top notch crypto rumah dijual software but didn't protect the OS or the physical computer? It is so easy to make mistakes, doing it right requires consistency, vigilance, and a modicum of paranoia. Assume that you do not know anything about a tool, learn everything you can about it, then use it. Carefully. Mistakes may render your state-of-the-art crypto useless against a knowledgeable adversary.
Line 18: Line 48:
 Come to a crypto-party and talk to experts, learn from each other, and continue to learn over time. Take responsibility for your communication, privacy, and security. Don't let anyone scare you out of experimenting and implementing crypto, but please be aware it takes time and effort to learn that crypto is necessary, but not sufficent; it is not a panacea. Come to a crypto-party and talk to experts, learn from each other, and continue to learn over time. Take responsibility for your communication, privacy, and security. Don't let anyone scare you out of experimenting and implementing crypto, but please be aware it takes time and effort to learn that crypto is necessary, but not sufficent; it is not a panacea.
  
-== Learn and Use ==+=== Learn and Use ===
  
 Video: [[https://media.torproject.org/video/2012-10-21-cryptoparty/EncryptToLiveByAndrew.mov|Encrypt to Live]] from Cryptoparty Boston (Andrew) via @torproject Video: [[https://media.torproject.org/video/2012-10-21-cryptoparty/EncryptToLiveByAndrew.mov|Encrypt to Live]] from Cryptoparty Boston (Andrew) via @torproject
Line 26: Line 56:
 ===== Risk Analysis ===== ===== Risk Analysis =====
  
-Committee to Protect Journalists [[http://cpj.org/reports/2012/04/information-security.php#1|Journalists Security Guide - Information Security]] by [[https://en.wikipedia.org/wiki/Danny_O%27Brien|Danny O’Brien]] - hopefully a CryptoParty will clearly explain most of the software and techniques mentioned in this guide. +Committee to Protect Journalists [[http://cpj.org/reports/2012/04/information-security.php#1|Journalists Security Guide - Information Security]] by [[https://en.wikipedia.org/wiki/Danny_O'Brien|Danny O’Brien]] - hopefully a CryptoParty will clearly explain most of the software and techniques mentioned in this guide.
- +
-//Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. +
- +
-Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, and that they have nothing to hide. But think about the dangers to sources if the information they have provided to you was more widely known. What may seem innocuous personal information to you might be incriminatory to others.//+
  
 +//Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, and that they have nothing to hide. But think about the dangers to sources if the information they have provided to you was more widely known. What may seem innocuous personal information to you might be incriminatory to others.//
  
 ===== Kerckhoffs's principle ===== ===== Kerckhoffs's principle =====
  
-A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. ([[https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle|Kerckhoffs's principle]])+A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. ([[https://en.wikipedia.org/wiki/Kerckhoffs's_principle|Kerckhoffs's principle]])
  
 This principle should apply to all of the tools and resources mentioned on this page. This principle should apply to all of the tools and resources mentioned on this page.
- 
  
 ===== Public Key Cryptography ===== ===== Public Key Cryptography =====
  
-[[https://en.wikipedia.org/wiki/Public-key_cryptography|Public Key Cryptography]] has only become practical with the use of computers. It offers a mathematically secure way of sending encrypted messages or files between computers and their users, without necessarily having to set up a separate [[https://en.wikipedia.org/wiki/Secure_channel | Secure Channel]] e.g. a face to face meeting, to agree upon or exchange the secret key to the cryptographic algorithm they are using to protect the privacy of the message or data from snoopers.+[[https://en.wikipedia.org/wiki/Public-key_cryptography|Public Key Cryptography]] has only become practical with the use of computers. It offers a mathematically secure way of sending encrypted messages or files between computers and their users, without necessarily having to set up a separate [[https://en.wikipedia.org/wiki/Secure_channel| Secure Channel]] e.g. a face to face meeting, to agree upon or exchange the secret key to the cryptographic algorithm they are using to protect the privacy of the message or data from snoopers.
  
 Public Key Cryptography also offers a method of detecting attempts at forgery through the use of [[https://en.wikipedia.org/wiki/Digital_Signature|Digital Signatures]]. Public Key Cryptography also offers a method of detecting attempts at forgery through the use of [[https://en.wikipedia.org/wiki/Digital_Signature|Digital Signatures]].
  
-== Learn and Use ==+=== Learn and Use ===
  
   * BBC science presenter Dr Yan Wong explains (without mathematics) the principle of how Alice and Bob can use "digital padlocks" to protect their messages from being read by Ed the eavesdropper - [[http://www.bbc.co.uk/blogs/webwise/2012/04/secrets-of-online-security.shtml|Public Key Encryption video clip]] (3 minutes)   * BBC science presenter Dr Yan Wong explains (without mathematics) the principle of how Alice and Bob can use "digital padlocks" to protect their messages from being read by Ed the eavesdropper - [[http://www.bbc.co.uk/blogs/webwise/2012/04/secrets-of-online-security.shtml|Public Key Encryption video clip]] (3 minutes)
   * There is an excellent visual explanation of [[http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange|Diffie-Hellman key exchange]] on [[https://www.youtube.com/watch?feature=player_detailpage&v=YEBfamv-_do#t=126s|YouTube]].   * There is an excellent visual explanation of [[http://en.wikipedia.org/wiki/Diffie-Hellman_key_exchange|Diffie-Hellman key exchange]] on [[https://www.youtube.com/watch?feature=player_detailpage&v=YEBfamv-_do#t=126s|YouTube]].
   * Slides: [[https://github.com/micahflee/slides/blob/master/2012/10/oakland_cryptoparty_intro_to_public_key_crypto.pdf?raw=true|Introduction to Public Key Cryptography]] from CryptoParty Oakland (U.S.) via @micahflee   * Slides: [[https://github.com/micahflee/slides/blob/master/2012/10/oakland_cryptoparty_intro_to_public_key_crypto.pdf?raw=true|Introduction to Public Key Cryptography]] from CryptoParty Oakland (U.S.) via @micahflee
 +
 +===== Why there is no 100% anonymity =====
 +
 +  * **People make mistakes**  and even the slightest mistake will break the "completeness" of anonymity. (e.g. simply forgetting to turn a proxy on or mentioning the weather)
 +  * **Behavior can be analyzed**  (e.g. slang and idioms may locate you).
 +  * **Behavior can be correlated**  (e.g when you are home vs online)
 +  * You have to connect somehow. Everything between your body and **your means of anonymity is exposed**. (e.g if you're using tor, //what//  you do while using tor may be hidden - that you are //using//  tor not, however)
 +  * Some **offline threat**  may out you. (e.g. [[https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis|Rubber-hose cryptanalysis]])
 +
 +\\
 +