Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
cygnet [2015/11/04 03:16] – created cygnet_tas | cygnet [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | Date and time to be confirmed. | + | ====== Cygnet Crypto Party ====== |
- | Tentatively scheduled for the 20th December 2015 @ Cygnet Town Hall Supper Room | + | Everyone is invited to attend a Crypto Party! |
- | All Welcome! | + | ===== Privacy matters ===== |
+ | |||
+ | Quote from the official **Crypto Party Handbook** | ||
+ | |||
+ | " | ||
+ | |||
+ | ===== When & Where ===== | ||
+ | |||
+ | 2pm to 5pm **Sunday 20th December 2015** **Cygnet Town Hall** upstairs in the Supper Room [[https:// | ||
+ | |||
+ | ===== What is it? ===== | ||
+ | |||
+ | [[https:// | ||
+ | |||
+ | * A Crypto Party is a chance for people to learn about the digital landscape in relation to privacy and security | ||
+ | * If you want there will be people who will help you install and become familiar with privacy tools and techniques | ||
+ | |||
+ | ===== Reasons why? ===== | ||
+ | |||
+ | * I have nothing to hide! | ||
+ | * But I have a bad feeling about my privacy and security | ||
+ | |||
+ | ===== What's your level of interest? ===== | ||
+ | |||
+ | In anticipation that their will be different levels of knowledge and interest there will be two sections | ||
+ | |||
+ | ==== Hungry for information ==== | ||
+ | |||
+ | * A group for people who want background information | ||
+ | * Brief background talk | ||
+ | * Videos to watch | ||
+ | * Videos, documentation & software to download from local server onto USB drives if those attending wish to learn or experiment at a later date | ||
+ | * Lots of discussion (Questions & Answers, sharing stories) | ||
+ | |||
+ | ==== Ready for action? ==== | ||
+ | |||
+ | * A group for those wanting to set up their devices for better privacy | ||
+ | * There will be a local server with authenticated software packages for you to install onto your devices with guided assistance if required. | ||
+ | * Bring your phone, laptop and a USB disk (don't forget your power supply) | ||
+ | * Detailed information on tools and links below | ||
+ | |||
+ | ===== Tools & techniques ===== | ||
+ | |||
+ | //topic summary//: | ||
+ | |||
+ | * Privacy & Identity authorisation (OpenPGP), Virus & mal-ware, Password management, Tracking & Meta-data, Anonymity & pseudo-anonymity, | ||
+ | |||
+ | ===== Topics details ===== | ||
+ | |||
+ | ==== Passwords ==== | ||
+ | |||
+ | * Recommend passphrases | ||
+ | * Pasword managment and further recommendations | ||
+ | |||
+ | ==== Cryptography ==== | ||
+ | |||
+ | * Basic Concept // | ||
+ | * Public key cryptography = public Key (encrypts) & private key (decrypts) versus conventiaonal secret-key = one key is used both for encryption and decryption = Asymmetric versus Symmetric | ||
+ | * Public Key Infrastructure (PKI) = security, authentication, | ||
+ | * Encryption and Decryption = information is obfuscated by encryption. Can be a message, a file, a disk (storage medium) or // | ||
+ | * Common software tools are PGP (Pretty Good Privacy) & the open source GnuPG (or GPG = Gnu Privacy Guard) is a complete and free implementation of OpenPGP | ||
+ | * Secure Sockets Layer (SSL) https | ||
+ | * GnuPG or OpenPGP signatures - use a private key to sign a file. Anyone who has the corresponding public key can check whether the file was signed by the private key. Anyone who doesn’t have the private key cannot forge such a signature | ||
+ | * Verifying a file | ||
+ | * [[http:// | ||
+ | * Wireless security | ||
+ | * WAR driving risks | ||
+ | * Mac address spoofing | ||
+ | * [[https:// | ||
+ | * Method by which a communications service provider informs its users that the provider has not been served with a secret United States government subpoena | ||
+ | * Government surveillance +PRISM | ||
+ | * Big data | ||
+ | * Corporate risks | ||
+ | * Pay wave | ||
+ | * International Crime Syndicates +Lack of data security - Target, Sony Madison etc | ||
+ | * [[https:// | ||
+ | * Born out of the [[http:// | ||
+ | * VPN' | ||
+ | * Virtual Private Networks - encrypted communications via IP tunnels | ||
+ | * Dark Web | ||
+ | * Accessed via Tor using directories or shared links from trusted collegues rather than search engines | ||
+ | * Deep web | ||
+ | * The large protion of the Internet behind firewalls or part of a secure Wide Area restricted network | ||
+ | * Requires login & generally accessed via a VPN (Virtual Private network) | ||
+ | * Crypto currency | ||
+ | * Bitcoin and the block chain | ||
+ | * Distributed public ledger | ||
+ | |||
+ | ===== Live Distibutions ===== | ||
+ | |||
+ | List of known certification allowing booting from Secure Boot (UEFI = Unified Extensible Firmware Interface) BIOS | ||
+ | |||
+ | * Ubuntu and it's derivitaves (Mint) | ||
+ | * Debian | ||
+ | * Arch | ||
+ | |||
+ | ===== Demonstrations ===== | ||
+ | |||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | ===== Tools & resource links ===== | ||
+ | |||
+ | **Do your part to resist Government surveillance and take back your privacy: | ||
+ | ==== Computer Software ==== | ||
+ | * Browser Privacy: [[https:// | ||
+ | * VPNs: [[https:// | ||
+ | * Internet Anonymity: [[https:// | ||
+ | * Disk Encryption: [[http:// | ||
+ | * File/Email Encryption: [[https:// | ||
+ | * IM/Voice Encryption: [[http:// | ||
+ | * Phone/SMS Encryption: [[http:// | ||
+ | * Google Alternative: | ||
+ | * Digital P2P Currency: [[http:// | ||
+ | * Live Anonymous/ | ||
+ | |||
+ | ==== Android Smart Phone ==== | ||
+ | |||
+ | * [[https:// | ||
+ | |||
+ | ==== Resourses & Information ==== | ||
+ | |||
+ | * General: [[https:// | ||
+ | * For Journalists: | ||
+ | * Coders: | ||
+ | * Passwords: [[http:// | ||
+ | * [[https:// | ||
+ | * Activists: [[https:// | ||
+ | |||
+ | ===== Quotes ===== | ||
+ | |||
+ | " | ||
+ | |||
+ | " | ||
+ | |||
+ | " | ||
+ | |||
+ | " | ||
+ | |||
+ | "The public’s willingness to voluntarily—nay, | ||
+ | |||
+ | The main price paid by turning the war on terror into a war on the public’s right to know, a bipartisan crusade, is that it destroys the foundation of democracy—an informed public." | ||
+ | |||
+ | "If you're not the customer you are the product" | ||
+ | |||
+ | " | ||
+ | |||
+ | "Data is the pollution of the information age" | ||
+ | |||
+ | ====== Cygnet CryptoParty Poster ====== | ||
+ | |||
+ | {{: | ||
+ | |||
+ | {{: |