Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Next revisionBoth sides next revision
dublin [2015/05/15 19:52] – think only 4 have happened cryptdubdublin [2016/01/17 12:38] 127.0.0.1
Line 5: Line 5:
 From [[http://parkerhiggins.net/2012/08/stanford-cryptography-and-cryptoparty/|CryptoParty article]] by Parker Higgins of the EFF From [[http://parkerhiggins.net/2012/08/stanford-cryptography-and-cryptoparty/|CryptoParty article]] by Parker Higgins of the EFF
  
-...a set of global get-togethers where more experienced users can teach beginners how to use the commonly available tools that tap into the incredibly powerful technology of cryptography. I hope that a beginner walks away from a #CryptoParty with an understanding of not just PGP, OTR, and the like, but with an idea of why threat models are important, what attack vectors she ought to consider, and — most importantly — a network of people and resources she can contact for even more knowledge.+a set of global get-togethers where more experienced users can teach beginners how to use the commonly available tools that tap into the incredibly powerful technology of cryptography. I hope that a beginner walks away from a #CryptoParty with an understanding of not just PGP, OTR, and the like, but with an idea of why threat models are important, what attack vectors she ought to consider, and — most importantly — a network of people and resources she can contact for even more knowledge.
  
-> "Privacy is the power to selectively reveal oneself to the world." +> "Privacy is the power to selectively reveal oneself to the world." > - [[http://www.activism.net/cypherpunk/manifesto.html|Cypherpunk Manifesto]], 1993.
-> - [[http://www.activism.net/cypherpunk/manifesto.html|Cypherpunk Manifesto]], 1993.+
  
-  Data retention, wiretapping, interception, stalking.. Make it really f&*^ing hard for them!+> Data retention, wiretapping, interception, stalking.. Make it really f&*^ing hard for them!
  
 ====== Upcoming Events ====== ====== Upcoming Events ======
 +
 +===== Event #6 - 2016-01-19 =====
 +
 +  * When: 2016-01-19
 +  * Time: 18:30 to 20:00
 +  * Where: ACIA Aon Ireland, Metropolitan Building, James Joyce Street, Dublin
 +  * This event is organised by Pyladies Dublin. See our [[http://www.meetup.com/PyLadiesDublin/events/227551576/|meetup.com]] page (we ask people to RSVP to get an idea of the numbers - but you can use a pseudonym, and you can still come without RSVPing)
 +  * Topic: Email encryption with PGP
 +  * This will be a short talk followed by a hands-on workshop, so if you have a laptop, please bring it.
 +  * The scope of the workshop will be to get beginners set up with basic PGP encryption.
 +  * More people to help out with mentoring are very welcome.
  
 ===== Event #5 - 2015-06-11 ===== ===== Event #5 - 2015-06-11 =====
Line 21: Line 31:
   * Time: 1900hrs to 2200hrs   * Time: 1900hrs to 2200hrs
   * Where: Tog, Warehouse Unit C, Chancery Lane, Dublin 8 Ireland ([[http://www.tog.ie/location/|map]]).   * Where: Tog, Warehouse Unit C, Chancery Lane, Dublin 8 Ireland ([[http://www.tog.ie/location/|map]]).
-  * What: +  * What: No planned talks yet, hopefully hands on work.
  
 ====== Past Events ====== ====== Past Events ======
Line 35: Line 45:
 After the workshop we continued the party in the Longstone pub with food funded by DU Pirate Party. Some very interesting conversations over pints continued well into the night. After the workshop we continued the party in the Longstone pub with food funded by DU Pirate Party. Some very interesting conversations over pints continued well into the night.
  
-The [[http://prezi.com/gbiymb9za8uc/introduction-to-cryptography-pgp-and-disk-encryption/|slides are available online]] if anyone wishes to reuse or modify them. +The [[http://prezi.com/gbiymb9za8uc/introduction-to-cryptography-pgp-and-disk-encryption/|slides are available online]] if anyone wishes to reuse or modify them. 
 + 
 +===== Event #2 - 2012-11-30 =====
  
-=====  Event #2 - 2012-11-30 ===== 
 === Warning === === Warning ===
  
-Even though Tog tend to video / photograph events, this will be a video/photo free event. There will be a wide range of people in attendance and not everyone will want their photos taken, please respect this. +Even though Tog tend to video / photograph events, this will be a video/photo free event. There will be a wide range of people in attendance and not everyone will want their photos taken, please respect this. What happens?
-What happens?+
  
 Crypto parties are free events open to all. The level of the talks will be aimed at introducing non-techies to practical, strong cryptography and privacy tools. Crypto parties are free events open to all. The level of the talks will be aimed at introducing non-techies to practical, strong cryptography and privacy tools.
Line 59: Line 69:
 Confirmed topics so far are: Confirmed topics so far are:
  
-==Cookie tracking ==+== Cookie tracking ==
  
 will consist in a ground-up basics like what a cookie is, what a user agent is, how they can be used to identify you, what a secure cookie is and what google analytics and facebook connect icons do, then tying it all together with showing how facebook can see where you are even if you're logged out of Facebook and whatnot. Kinda specific but still it will be very understandable - MITM attack demo will consist in a ground-up basics like what a cookie is, what a user agent is, how they can be used to identify you, what a secure cookie is and what google analytics and facebook connect icons do, then tying it all together with showing how facebook can see where you are even if you're logged out of Facebook and whatnot. Kinda specific but still it will be very understandable - MITM attack demo
Line 69: Line 79:
 Bring your fingerprint printed and we will do reciprocal key signing. To do this issue the following from the command line Bring your fingerprint printed and we will do reciprocal key signing. To do this issue the following from the command line
  
-    gpg --fingerprint <your key id>+<code> 
 +  gpg --fingerprint <your key id
 +</code>
  
 eg eg
  
-    gpg gpg --fingerprint DEADBEEF+<code> 
 +  gpg gpg --fingerprint DEADBEEF 
 +</code>
  
 This should give you the following outupt which you should print and bring along to the cryptoparty This should give you the following outupt which you should print and bring along to the cryptoparty
  
-    pub   4096R/DEADBEEF 2010-01-01 [expires: 2015-01-01] +<code> 
-           Key fingerprint = DECA FBAD 52AC DADA BABA 000F 45632 CCDB 22C0 8600 +  pub   4096R/DEADBEEF 2010-01-01 [expires: 2015-01-01] 
-     uid                  Alice <alice@example.com> +         Key fingerprint = DECA FBAD 52AC DADA BABA 000F 45632 CCDB 22C0 8600 
-     sub   4096R/DECAFBAD 2010-01-01 [expires: 2015-01-01]+   uid                  Alice <alice@example.com> 
 +   sub   4096R/DECAFBAD 2010-01-01 [expires: 2015-01-01] 
 +</code>
  
 == Summary == == Summary ==
  
 ===== Event #3 - 2013-03-08 ===== ===== Event #3 - 2013-03-08 =====
 +
 === Warning === === Warning ===
  
-Even though Tog tend to video / photograph events, this will be a video/photo free event. There will be a wide range of people in attendance and not everyone will want their photos taken, please respect this. +Even though Tog tend to video / photograph events, this will be a video/photo free event. There will be a wide range of people in attendance and not everyone will want their photos taken, please respect this. What happens?
-What happens?+
  
 Crypto parties are free events open to all. The level of the talks will be aimed at introducing non-techies to practical, strong cryptography and privacy tools. Crypto parties are free events open to all. The level of the talks will be aimed at introducing non-techies to practical, strong cryptography and privacy tools.
Line 135: Line 151:
  
 === Where? === === Where? ===
 +
 [[https://dublin.sciencegallery.com/|The Science Gallery]] in Trinity College [[https://dublin.sciencegallery.com/|The Science Gallery]] in Trinity College
  
Line 140: Line 157:
  
 == Tor == == Tor ==
 +
   * Speaker: [[https://twitter.com/DonnchaC|Donnacha]]   * Speaker: [[https://twitter.com/DonnchaC|Donnacha]]
   * Overview:   * Overview:
   * Slides:   * Slides:
- +
 == Security on the internet == == Security on the internet ==
 +
   * Speaker: [[https://twitter.com/nosmo|Nosmo]]   * Speaker: [[https://twitter.com/nosmo|Nosmo]]
   * Overview:   * Overview:
Line 150: Line 169:
  
 == Bitcoin == == Bitcoin ==
 +
   * Speaker: JP Buntinx   * Speaker: JP Buntinx
   * Overview: Basics of Bitcoin   * Overview: Basics of Bitcoin
Line 156: Line 176:
 === Summary === === Summary ===
  
-======  Mailing List ======+====== Mailing List ======
  
 Wikis are not the best place for collaborative event organisation. It is difficult to get people interacting and it is difficult to get in contact with people again once an event is decided upon. A mailing list has now been set up for Dublin cryptoparties to help get people connected. To send a message to the list please email <cryptoparty-dublin@autistici.org>. I would like to thank the guys at Autistici.org for hosting the mailing list. Wikis are not the best place for collaborative event organisation. It is difficult to get people interacting and it is difficult to get in contact with people again once an event is decided upon. A mailing list has now been set up for Dublin cryptoparties to help get people connected. To send a message to the list please email <cryptoparty-dublin@autistici.org>. I would like to thank the guys at Autistici.org for hosting the mailing list.
Line 164: Line 184:
 Autistici run their own Certificate Authority, unfortunately for those new to the cryptoparty movement it is a bit of a chicken and egg situation. Until you get the Autistici certs and CRL and can verify them, you should treat all connections to Autistici as potentially being man in the middled. Autistici run their own Certificate Authority, unfortunately for those new to the cryptoparty movement it is a bit of a chicken and egg situation. Until you get the Autistici certs and CRL and can verify them, you should treat all connections to Autistici as potentially being man in the middled.
  
-The required files are available here: http://ca.autistici.org/  +The required files are available here: [[http://ca.autistici.org/|http://ca.autistici.org/]]
  
-======  Discussion Topics ======+====== Discussion Topics ======
  
 I would like this section to be used for proposing discussions, talks and workshops. We all have great ideas for stuff we want to see at a CryptoParty. We also may want to contribute and may not think what we want to talk about will interest attendees. Please list things you would like to see at a CryptoParty and then we can attempt to fill the requests. I would like this section to be used for proposing discussions, talks and workshops. We all have great ideas for stuff we want to see at a CryptoParty. We also may want to contribute and may not think what we want to talk about will interest attendees. Please list things you would like to see at a CryptoParty and then we can attempt to fill the requests.
  
- +====== Resources ======
-     +
- ====== Resources ======+
  
 [[https://twitter.com/CryptoPartyDub|CryptoPartyDub]] on Twitter [[https://twitter.com/CryptoPartyDub|CryptoPartyDub]] on Twitter
 +