Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
learn [2015/07/08 23:41] – anonymous | learn [2016/11/19 19:50] – cryptoparty handbook is outdated 127.0.0.1 | ||
---|---|---|---|
Line 5: | Line 5: | ||
* [[: | * [[: | ||
* [[: | * [[: | ||
- | * [[documentation: | ||
You might worry, "how much detail do I need to understand about the crypto tools I will use?" | You might worry, "how much detail do I need to understand about the crypto tools I will use?" | ||
Line 14: | Line 13: | ||
* I just don't want to be spied on by the NSA and all the others, just want to feel more private while being online: [[: | * I just don't want to be spied on by the NSA and all the others, just want to feel more private while being online: [[: | ||
- | | + | * Also if you are e.g. a journalist, a lawyer or you have something else important to do in mind: You might need to protect yourself as well as your clients, sources, and colleagues? You might want to start with the [[: |
- | + | ||
- | | + | |
Either way, it is easy and (with the right amount of motivation) certainly do-able, but the [[: | Either way, it is easy and (with the right amount of motivation) certainly do-able, but the [[: | ||
Line 25: | Line 22: | ||
If your operating system is backdoored, your cryptosoftware is backdoored, too. | If your operating system is backdoored, your cryptosoftware is backdoored, too. | ||
- |