Cygnet Crypto Party

Everyone is invited to attend a Crypto Party!

Privacy matters

Quote from the official Crypto Party Handbook

“Privacy is a fundamental human right. It is recognised in many countries to be as central to individual human dignity and social values as Freedom of Association and Freedom of Speech. Simply put, privacy is the border where we draw a line between how far a society can intrude into our personal lives.”

When & Where

2pm to 5pm Sunday 20th December 2015 Cygnet Town Hall upstairs in the Supper Room Open Streetmap

What is it?

Party like it is 1984

  • A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security
  • If you want there will be people who will help you install and become familiar with privacy tools and techniques

Reasons why?

  • I have nothing to hide!
    • But I have a bad feeling about my privacy and security

What's your level of interest?

In anticipation that their will be different levels of knowledge and interest there will be two sections

Hungry for information

  • A group for people who want background information
    • Brief background talk
    • Videos to watch
    • Videos, documentation & software to download from local server onto USB drives if those attending wish to learn or experiment at a later date
    • Lots of discussion (Questions & Answers, sharing stories)

Ready for action?

  • A group for those wanting to set up their devices for better privacy
    • There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required.
    • Bring your phone, laptop and a USB disk (don't forget your power supply)
    • Detailed information on tools and links below

Tools & techniques

topic summary:

  • Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, Security: not as a panacea but a process recognising that compromises or trade-offs prevent total security, Dark Web, Deep Web, Crypto Currencies

Topics details


  • Recommend passphrases
    • Pasword managment and further recommendations


  • Basic Concept summary
    • Public key cryptography = public Key (encrypts) & private key (decrypts) versus conventiaonal secret-key = one key is used both for encryption and decryption = Asymmetric versus Symmetric
    • Public Key Infrastructure (PKI) = security, authentication, confidentiality, integrity, non-repudiation and access control +Certification Authorities = Cryptographic certificates: trust is built into your browser
    • Encryption and Decryption = information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or anything that can be codified
    • Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP
    • Secure Sockets Layer (SSL) https
    • GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature
  • Verifying a file
  • Wireless security
    • WAR driving risks
    • Mac address spoofing
    • Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena
  • Government surveillance +PRISM
  • Big data
    • Corporate risks
    • Pay wave
  • International Crime Syndicates +Lack of data security - Target, Sony Madison etc
  • VPN's
    • Virtual Private Networks - encrypted communications via IP tunnels
  • Dark Web
    • Accessed via Tor using directories or shared links from trusted collegues rather than search engines
  • Deep web
    • The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network
    • Requires login & generally accessed via a VPN (Virtual Private network)
  • Crypto currency
    • Bitcoin and the block chain
    • Distributed public ledger

Live Distibutions

List of known certification allowing booting from Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS

  • Ubuntu and it's derivitaves (Mint)
  • Debian
  • Arch


Do your part to resist Government surveillance and take back your privacy:

Computer Software

Android Smart Phone

Resourses & Information


“You're making some herd immunity for the people who really do need it, for the people doing that work, because their traffic blends in with yours.” Tom Sulston

“Security is complicated, it's more about operational security.”

“Surveillance and freedom are compatible = not”

“Privacy is a matter of individual choice as to what to reveal about one’s behaviour to others, whereas anonymity, in the modern commercialised celebrity-driven world, is assumed to represent a harsh societal dismissal of individual worth.”

“The public’s willingness to voluntarily—nay, enthusiastically—sacrifice privacy is fuelled by a very modern fear of being ignored in a culture where the most observed are the most valued.”

The main price paid by turning the war on terror into a war on the public’s right to know, a bipartisan crusade, is that it destroys the foundation of democracy—an informed public.“

“If you're not the customer you are the product” is an older saying “Now you are the customer and the product”

“Secret orders based on secret interpretation of secret law”

“Data is the pollution of the information age”

Cygnet CryptoParty Poster