Differences

This shows you the differences between two versions of the page.

Link to this comparison view

connect:resources [2016/02/02 15:58] – convert resources list into a table 127.0.0.1connect:resources [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 3: Line 3:
 ====== Resources ====== ====== Resources ======
  
-We are working on multi language resources like Slides, Guides and Flyers in order to make Cryptoparty more accessible to people that are not native English speakers or would prefer the resources in their own language.+We are working on multi language [[http://github.com/cryptoparty|resources]] like Slides, Guides and Flyers in order to make Cryptoparty more accessible to people that are not native English speakers or would prefer the resources in their own language.
  
 Here are some links to the resources made by our community which can be used below: Here are some links to the resources made by our community which can be used below:
  
-^ Link ^ Comment ^ +^ Link                                                       ^ Comment                                                                                                                                                                   
-| [[https://github.com/cryptoparty/slides|Slides]] | attempt to create a universal basic set of presentation slides to help teach basic concepts at CryptoParties | +| [[https://github.com/cryptoparty/slides|Slides]]           | attempt to create a universal basic set of presentation slides to help teach basic concepts at CryptoParties                                                              
-| [[https://github.com/cryptoparty/artwork|Artwork]] | collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, handouts and flyers for CryptoParties | +| [[https://github.com/cryptoparty/artwork|Artwork]]         | collection of public domain artwork and graphics, where possible, with source files to help others remix and reuse to make slides, handouts and flyers for CryptoParties  
-| [[https://github.com/cryptoparty/handouts|Handouts]] | collection of handouts and, where possible, their source files to help others make new CryptoParty handouts | +| [[https://github.com/cryptoparty/handouts|Handouts]]       | collection of handouts and, where possible, their source files to help others make new CryptoParty handouts                                                               
-| [[https://github.com/cryptoparty/flyers|Flyers]] | flyers and, where possible, their source files to help others make new CryptoParty flyers |+| [[https://github.com/cryptoparty/flyers|Flyers]]           | flyers and, where possible, their source files to help others make new CryptoParty flyers                                                                                 | 
 +| [[https://github.com/cryptoparty/stickers|Stickers]]       | a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers                                                               | 
 +| [[https://peter.tono.li/en/peters-blog/cryptoparty|Tips]]  | Tips on hosting a CryptoParty                                                                                                                                             | 
 + 
 +\\ 
  
 ==== old stuff below ==== ==== old stuff below ====
Line 53: Line 58:
 Committee to Protect Journalists [[http://cpj.org/reports/2012/04/information-security.php#1|Journalists Security Guide - Information Security]] by [[https://en.wikipedia.org/wiki/Danny_O'Brien|Danny O’Brien]] - hopefully a CryptoParty will clearly explain most of the software and techniques mentioned in this guide. Committee to Protect Journalists [[http://cpj.org/reports/2012/04/information-security.php#1|Journalists Security Guide - Information Security]] by [[https://en.wikipedia.org/wiki/Danny_O'Brien|Danny O’Brien]] - hopefully a CryptoParty will clearly explain most of the software and techniques mentioned in this guide.
  
-//Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. +//Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, and that they have nothing to hide. But think about the dangers to sources if the information they have provided to you was more widely known. What may seem innocuous personal information to you might be incriminatory to others.//
- +
-Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, and that they have nothing to hide. But think about the dangers to sources if the information they have provided to you was more widely known. What may seem innocuous personal information to you might be incriminatory to others.//+
  
 ===== Kerckhoffs's principle ===== ===== Kerckhoffs's principle =====
Line 77: Line 80:
 ===== Why there is no 100% anonymity ===== ===== Why there is no 100% anonymity =====
  
-  * **People make mistakes**  and even the slightest mistake will break the "completeness" of anonymity. (e.g. simply forgetting to turn a proxy on or meantioning the weather)+  * **People make mistakes**  and even the slightest mistake will break the "completeness" of anonymity. (e.g. simply forgetting to turn a proxy on or mentioning the weather)
   * **Behavior can be analyzed**  (e.g. slang and idioms may locate you).   * **Behavior can be analyzed**  (e.g. slang and idioms may locate you).
   * **Behavior can be correlated**  (e.g when you are home vs online)   * **Behavior can be correlated**  (e.g when you are home vs online)
   * You have to connect somehow. Everything between your body and **your means of anonymity is exposed**. (e.g if you're using tor, //what//  you do while using tor may be hidden - that you are //using//  tor not, however)   * You have to connect somehow. Everything between your body and **your means of anonymity is exposed**. (e.g if you're using tor, //what//  you do while using tor may be hidden - that you are //using//  tor not, however)
   * Some **offline threat**  may out you. (e.g. [[https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis|Rubber-hose cryptanalysis]])   * Some **offline threat**  may out you. (e.g. [[https://en.wikipedia.org/wiki/Rubber-hose_cryptanalysis|Rubber-hose cryptanalysis]])
 +
 +\\