Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Next revisionBoth sides next revision
documentation [2013/06/26 07:44] – created svalearn [2020/08/12 02:05] – old revision restored (2020/08/08 18:33) 127.0.0.1
Line 1: Line 1:
-You might worry, how much details you need to understand about the crypto tools you're using. It depends on your intentions. For example, if you don't like the idea of being watched completely and easily, then every little use of cryptography will help bit. However, if you want to be completely protected, you'll have to learn a lot of details.+====== Learn ====== 
 + 
 +  * [[:learn:tools|Tools]] 
 +  * [[:learn:links|Links: Videos, Articles, Books, etc]] 
 +  * [[brief|Brief How-tos]] 
 +  * [[resource|Resources]] 
 +  * [[documentation:handbook|CryptoParty Handbook]] 
 +  * [[spread:slides|Slides]] 
 +  * [[spread:handouts|Handouts]] 
 + 
 +You might worry, "how much detail do I need to understand about the crypto tools I will use?" 
 +Well, it depends on your intentions. For example, if you don't like the idea of being watched completely and easily, then every little use of cryptography will be help. However, if you want to be completely protected, you'll have to learn a lot of details.
  
 So first of all you have to think about yourself: Why do I want to use crypto? So first of all you have to think about yourself: Why do I want to use crypto?
  
-  * I just don't want to be spied by the NSA and all the others, just wanna feel more private when being online: [[:brief | Go on here]] +  * I just don't want to be spied on by the NSA and all the others, just want to feel more private while being online: [[:brief | Go on here]] 
-  * I wanna be complety protected and I wanna learn everything! [[:resource | Go on here]] + 
-  * Also if you are e.g. a journalist, a lawyer or you have something else important to do in mind: You might need to protect yourself as well as your clients/sources/colleagues? You might wanna start with the [[:brief| brief introduction]] to get started, but for your purpose it is important that you really [[:resource| understand]] what the crypto you are using is all about. Also have a look at the [[:handbook|handbook]], and please do not hesitate to [[communication | contact us]]!+  * I want to be complety protected and I want to learn everything! [[documentation:handbook | Go on here]]
  
 +  * Also if you are e.g. a journalist, a lawyer or you have something else important to do in mind: You might need to protect yourself as well as your clients, sources, and colleagues? You might want to start with the [[:brief| brief introduction]] to get started, but for your purposes it is important that you really understand what the crypto you are using is all about. Also have a look at the [[documentation:handbook|handbook]], and please do not hesitate to [[communication | contact us]]!
  
-Both ways are easy and with some motivation do-able, but the [[:brief| brief one]] will not take that much time for starting to use cryptoand having less more protected enviroment online. +Either way, it is easy and (with the right amount of motivation) certainly do-able, but the [[:brief| brief one]] will not take that much time for those just starting to use crypto and opting for a more protected online enviroment
  
-There is one important thing for both of you: Never trust the technology. Never think that you are totally safe. Think twice everytime you are doing something special online!+There is one important thing to remember regardless: Never trust the technology. Never think that you are totally safe. Think twice everytime you are doing something special online!
  
-Also keep in mind: If you secure your windows or android with some softwareit is still windows and android.+Also keep in mind: Security is only as strong as the weakest part in the system. It is impossible to know how secure proprietaryclosed source software is. Much of it even has backdoors (for example, Microsoft Windows, Skype and Outlook). So don't use it.
  
 +If your operating system is backdoored, your cryptosoftware is backdoored, too.