Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
cp4j [2014/04/24 14:57] – [Cryptoparty For Journalists] lambdacp4j [2014/04/24 14:59] – [Cryptoparty For Journalists] lambda
Line 2: Line 2:
 A journalist's threat model differs severly from that of a common user. If someone spies into my personal e-mail, they might get to know which movie my friends and I plan to watch tonight. If governments find out dissidents contacting an international newspaper, both journalists and dissidents are in immediate danger of being arrested or even worse. A journalist's threat model differs severly from that of a common user. If someone spies into my personal e-mail, they might get to know which movie my friends and I plan to watch tonight. If governments find out dissidents contacting an international newspaper, both journalists and dissidents are in immediate danger of being arrested or even worse.
  
-Cryptoparties for Journalists, therefore, need to go beyond the usual scope of our default cryptoparty: Its main target is to provide techniques and methods to protect oneself and one's sources.+Cryptoparties for Journalists, therefore, need to go beyond the usual scope of default cryptoparty: Its main target is to provide techniques and methods to protect oneself and one's sources.
  
-** Please note: As you can see, this site has just started yet. The content currently provided here does by far not cover the range of topics we have in mind.  Please be gentle.**+** Please note: As you can see, this site has just started yet. The content currently provided here, doesn' t cover by far the range of topics we have in mind.  Please be gentle.**
 ===== Recommended Downloads ===== ===== Recommended Downloads =====
 ==== Mail Encryption ==== ==== Mail Encryption ====