Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
newcastle-planning [2016/04/11 23:32] alexhaydocknewcastle-planning [2016/05/13 22:08] – [Potential Current / Future Party Topics] 127.0.0.1
Line 1: Line 1:
 ===== Newcastle-upon-Tyne, United Kingdom (Planning Page) ===== ===== Newcastle-upon-Tyne, United Kingdom (Planning Page) =====
 +
 +Poster and some visuals currently hosted on Flickr at [[https://www.flickr.com/photos/137781729@N08/albums/72157667234594126]].
  
 ====Groups Contacted==== ====Groups Contacted====
Line 44: Line 46:
 |Two Factor Authentication |Google/Facebook etc. (with mention of why you might want to completely avoid goo / fb) |  | |Two Factor Authentication |Google/Facebook etc. (with mention of why you might want to completely avoid goo / fb) |  |
 |HTTPS Everywhere / Ad-Blocking Browser Extensions |[[http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/|http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/]] |  | |HTTPS Everywhere / Ad-Blocking Browser Extensions |[[http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/|http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/]] |  |
-|Full Disk Encryption |How? Is there a good audited **Windows** solution? - TrueCrypt 7.1a has the privilege escalation vulnerabilities (CVE-2015-7358,7359) and the forks (VeraCrypt etc.) haven't received as much scrutiny from the security community as may be desired. \\   \\ **Linux **- use dmcrypt / LUKS, easily done as part of installation however beware the Evil Maid attack, e.g. keep your boot partition on a USB key. For removable media, use cryptsetup from the command line, or gnome-disk-utility  |  |+|Full Disk Encryption |How? Is there a good audited **Windows** solution? - TrueCrypt 7.1a has the privilege escalation vulnerabilities (CVE-2015-7358,CVE-2015-7359) and the forks (VeraCrypt etc.) haven't received as much scrutiny from the security community as may be desired. \\   \\ **Linux **- use dmcrypt / LUKS, easily done as part of installation however beware the Evil Maid attack, e.g. keep your boot partition on a USB key. For removable media, use cryptsetup from the command line, or gnome-disk-utility  |  |
 |NoScript |Advanced! - but will probably at least need touching if we're going to be covering the Tor Browser Bundle. |  | |NoScript |Advanced! - but will probably at least need touching if we're going to be covering the Tor Browser Bundle. |  |
  
Line 59: Line 61:
 ^Topic ^Notes ^Person | ^Topic ^Notes ^Person |
 |PGP |Encrypting and signing email. |  | |PGP |Encrypting and signing email. |  |
-|[[https://whispersystems.org/|Signal]] |Focusing on mobile application (Android/iOS)Desktop client is sadly still in early development. |  |+|[[https://whispersystems.org/|Signal]]  |OpenWhisperSystems' Signal will be focused on at the party, but LibreSignal may be mentioned for users who are already using third-party app repositories and have already enabled running third-party APKs on their phones(It's not appropriate to recommend this to everyone, since they'd probably also need to know how to set up a gradle build environment on the basis that LibreSignal isn't available in F-Droid and will need to be built from source) |  |
 |[[https://ricochet.im/|Ricochet]] |Most secure - No metadata analysis possible, but IM only. |  | |[[https://ricochet.im/|Ricochet]] |Most secure - No metadata analysis possible, but IM only. |  |
 |[[https://jitsi.org|Jitsi]] |Probably the most effective "drop-in Skype replacement" at the moment but I'd want to be careful not to mislead anyone into thinking that metadata analysis wasn't possible with this - it is, due to its use of centralised XMPP services. |  | |[[https://jitsi.org|Jitsi]] |Probably the most effective "drop-in Skype replacement" at the moment but I'd want to be careful not to mislead anyone into thinking that metadata analysis wasn't possible with this - it is, due to its use of centralised XMPP services. |  |
 |XMPP+OTR |This has been popular at CryptoParties for a while, but the additional security offered by Ricochet means it is effectively deprecated. Can be covered if people think it is particularly a good idea. |  | |XMPP+OTR |This has been popular at CryptoParties for a while, but the additional security offered by Ricochet means it is effectively deprecated. Can be covered if people think it is particularly a good idea. |  |
 +
 +Regarding the various different instant messengers, there's an accessible and up-to-date blog post here: https://blog.grobox.de/2016/briar-next-step-of-the-crypto-messenger-evolution/
  
 === Miscellaneous === === Miscellaneous ===