Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| cygnet [2015/11/13 11:29] – Confirm date and add details 127.0.0.1 | cygnet [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | # Cygnet Crypto Party | + | ====== |
| Everyone is invited to attend a Crypto Party! | Everyone is invited to attend a Crypto Party! | ||
| - | ## Privacy matters | + | ===== Privacy matters |
| Quote from the official **Crypto Party Handbook** | Quote from the official **Crypto Party Handbook** | ||
| Line 9: | Line 9: | ||
| " | " | ||
| - | ##When & Where | + | ===== When & Where ===== |
| - | 2 to 5pm **Sunday 20th December 2015** | + | |
| - | **Cygnet Town Hall** upstairs in the Supper Room (Open Streetmap link) | + | |
| - | ## What is it? | + | 2pm to 5pm **Sunday 20th December 2015** **Cygnet Town Hall** upstairs in the Supper Room [[https:// |
| - | [Party like it is 1984](https:// | + | |
| - | + A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security | + | ===== What is it? ===== |
| - | + If you want there will be people who will help you install and become familiar with privacy tools and techniques | + | [[https:// |
| - | ## Reasons why? | + | * A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security |
| + | * If you want there will be people who will help you install and become familiar with privacy tools and techniques | ||
| - | + I have nothing to hide! | + | ===== Reasons why? ===== |
| - | > But I have a bad feeling about my privacy and security | + | |
| - | ## What's your level of interest? | + | * I have nothing to hide! |
| + | * But I have a bad feeling about my privacy and security | ||
| + | |||
| + | ===== What's your level of interest? | ||
| In anticipation that their will be different levels of knowledge and interest there will be two sections | In anticipation that their will be different levels of knowledge and interest there will be two sections | ||
| - | ### Hungry for information | + | ==== Hungry for information |
| - | + A group for people who want background information | + | * A group for people who want background information |
| + | * Brief background talk | ||
| + | * Videos to watch | ||
| + | * Videos, documentation & software to download from local server onto USB drives if those attending wish to learn or experiment at a later date | ||
| + | * Lots of discussion (Questions & Answers, sharing stories) | ||
| - | > Brief background talk | + | ==== Ready for action? ==== |
| - | > Videos | + | * A group for those wanting |
| + | * There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. | ||
| + | * Bring your phone, laptop and a USB disk (don't forget your power supply) | ||
| + | * Detailed information on tools and links below | ||
| - | > Videos, documentation | + | ===== Tools & techniques ===== |
| - | > Lots of discussion (Questions & Answers, sharing stories) | + | //topic summary//: |
| - | ### Ready for action? | + | * Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, |
| - | + A group for those wanting to set up their devices for better privacy | + | ===== Topics details ===== |
| - | > There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. | + | ==== Passwords ==== |
| - | > Bring your phone, laptop and a USB disk (don't forget your power supply) | + | * Recommend passphrases |
| - | + | * Pasword managment | |
| - | > Detailed information on tools and links below | + | |
| - | ## Tools & techniques | + | ==== Cryptography ==== |
| - | *topic summary*: | + | |
| + | | ||
| + | * Public Key Infrastructure (PKI) = security, authentication, | ||
| + | * Encryption and Decryption = information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or // | ||
| + | * Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP | ||
| + | * Secure Sockets Layer (SSL) https | ||
| + | * GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature | ||
| + | * Verifying a file | ||
| + | * [[http:// | ||
| + | * Wireless security | ||
| + | * WAR driving risks | ||
| + | * Mac address spoofing | ||
| + | * [[https:// | ||
| + | * Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena | ||
| + | * Government surveillance +PRISM | ||
| + | * Big data | ||
| + | * Corporate risks | ||
| + | * Pay wave | ||
| + | * International Crime Syndicates +Lack of data security - Target, Sony Madison etc | ||
| + | * [[https:// | ||
| + | * Born out of the [[http:// | ||
| + | * VPN' | ||
| + | * Virtual Private Networks - encrypted communications via IP tunnels | ||
| + | * Dark Web | ||
| + | * Accessed via Tor using directories or shared links from trusted collegues rather than search engines | ||
| + | * Deep web | ||
| + | * The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network | ||
| + | * Requires login & generally accessed via a VPN (Virtual Private network) | ||
| + | * Crypto currency | ||
| + | * Bitcoin and the block chain | ||
| + | * Distributed public ledger | ||
| - | > Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, | + | ===== Live Distibutions ===== |
| - | ## Topics details | + | List of known certification allowing booting from Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS |
| - | ### Passwords | + | * Ubuntu and it's derivitaves (Mint) |
| + | * Debian | ||
| + | * Arch | ||
| - | + Recommend passphrases | + | ===== Demonstrations ===== |
| - | + Pasword managment and further recommendations | + | * [[http:// |
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| - | ### Cryptography | + | ===== Tools & resource links ===== |
| - | + Basic Concept | + | **Do your part to resist Government surveillance and take back your privacy:** |
| - | >Public key cryptography | + | ==== Computer Software ==== |
| + | * Browser Privacy: [[https:// | ||
| + | * VPNs: [[https:// | ||
| + | * Internet Anonymity: [[https:// | ||
| + | * Disk Encryption: [[http:// | ||
| + | * File/Email Encryption: [[https:// | ||
| + | * IM/Voice Encryption: [[http:// | ||
| + | * Phone/SMS Encryption: [[http:// | ||
| + | * Google Alternative: | ||
| + | * Digital P2P Currency: [[http:// | ||
| + | * Live Anonymous/ | ||
| - | >Public Key Infrastructure (PKI) = security, authentication, | + | ==== Android Smart Phone ==== |
| - | > | + | * [[https:// |
| - | > | + | ==== Resourses & Information ==== |
| - | >Common software | + | * General: [[https:// |
| + | * For Journalists: | ||
| + | * Coders: | ||
| + | * Passwords: [[http:// | ||
| + | * [[https:// | ||
| + | * Activists: [[https:// | ||
| - | >Secure Sockets Layer (SSL) https | + | ===== Quotes ===== |
| - | >GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature | + | " |
| - | + | ||
| - | + Verifying a file | + | |
| - | >[File checksum](http:// | + | |
| - | + | ||
| - | + Wireless security | + | |
| - | > WAR driving risks | + | |
| - | + | ||
| - | >Mac address spoofing | + | |
| - | + | ||
| - | + [Canary watch](https:// | + | |
| - | > Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena | + | |
| - | + | ||
| - | + Government surveillance | + | |
| - | >PRISM | + | |
| - | + | ||
| - | + Big data | + | |
| - | > | + | |
| - | + | ||
| - | >Pay wave | + | |
| - | + | ||
| - | + International Crime Syndicates | + | |
| - | >Lack of data security - Target, Sony Madison etc | + | |
| - | + [Tor](https:// | + | |
| - | > Born out of the [onion routing project](http:// | + | |
| - | + | ||
| - | + VPN' | + | |
| - | > | + | |
| - | + | ||
| - | + Dark Web | + | |
| - | > Accessed via Tor using directories or shared links from trusted collegues rather than search engines | + | |
| - | + | ||
| - | + Deep web | + | |
| - | > The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network | + | |
| - | + | ||
| - | > Requires login & generally accessed via a VPN (Virtual Private network) | + | |
| - | + | ||
| - | + Crypto currency | + | |
| - | > Bitcoin and the block chain | + | |
| - | + | ||
| - | > Distributed public ledger | + | |
| - | + | ||
| - | ## Live Distros | + | |
| - | + | ||
| - | Only listing these because they are known to have certification for modern Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS | + | |
| - | + | ||
| - | + Ubuntu and it's derivitaves (Mint) | + | |
| - | + | ||
| - | + Debian | + | |
| - | + | ||
| - | * Arch | + | |
| - | + | ||
| - | ## Demonstrations | + | |
| - | + | ||
| - | > | + | |
| - | + | ||
| - | > | + | |
| - | + | ||
| - | > | + | |
| - | + | ||
| - | > | + | |
| - | + | ||
| - | ## Tools & resource links | + | |
| - | + | ||
| - | **Do your part to resist Government surveillance and take back your privacy: | + | |
| - | ### Computer Software | + | |
| - | * Browser Privacy: [HTTPS Everywhere](https:// | + | |
| - | * VPNs: [Risup.net](https:// | + | |
| - | * Internet Anonymity: [Tor](https:// | + | |
| - | * Disk Encryption: [TrueCrypt](http:// | + | |
| - | * File/Email Encryption: [GPGTools](https:// | + | |
| - | * Instant Messaging (IM) Encryption: [Pidgin](http:// | + | |
| - | * IM/Voice Encryption: [Mumble](http:// | + | |
| - | * Phone/SMS Encryption: [WhisperSystems](http:// | + | |
| - | * Google Alternative: | + | |
| - | * Digital P2P Currency: [BitCoin](http:// | + | |
| - | * Live Anonymous/ | + | |
| - | + | ||
| - | ### Android Smart Phone | + | |
| - | + [F-Droid](https:// | + | |
| - | + | ||
| - | ### Resourses & Information | + | |
| - | + General: [EFF's Surveillance Self-Defense Project](https:// | + | |
| - | + For Journalists: | + | |
| - | + Coders: | + | |
| - | + Passwords: [xkcd: Password Strength](http:// | + | |
| - | + [Nineteen Eighty-Four](https:// | + | |
| - | + Activists: [Workbook on security: practical steps for human rights defenders at risk](www.frontlinedefenders.org) | + | |
| - | ##Quotes | + | |
| - | + | ||
| - | " | + | |
| " | " | ||
| - | |||
| " | " | ||
| Line 189: | Line 154: | ||
| "Data is the pollution of the information age" | "Data is the pollution of the information age" | ||
| + | ====== Cygnet CryptoParty Poster ====== | ||
| + | |||
| + | {{: | ||
| + | |||
| + | {{: | ||