Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
Last revisionBoth sides next revision
newcastle-planning [2016/04/28 11:53] 127.0.0.1newcastle-planning [2016/05/13 22:08] – [Potential Current / Future Party Topics] 127.0.0.1
Line 1: Line 1:
 ===== Newcastle-upon-Tyne, United Kingdom (Planning Page) ===== ===== Newcastle-upon-Tyne, United Kingdom (Planning Page) =====
 +
 +Poster and some visuals currently hosted on Flickr at [[https://www.flickr.com/photos/137781729@N08/albums/72157667234594126]].
  
 ====Groups Contacted==== ====Groups Contacted====
Line 44: Line 46:
 |Two Factor Authentication |Google/Facebook etc. (with mention of why you might want to completely avoid goo / fb) |  | |Two Factor Authentication |Google/Facebook etc. (with mention of why you might want to completely avoid goo / fb) |  |
 |HTTPS Everywhere / Ad-Blocking Browser Extensions |[[http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/|http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/]] |  | |HTTPS Everywhere / Ad-Blocking Browser Extensions |[[http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/|http://arstechnica.com/security/2016/03/big-name-sites-hit-by-rash-of-malicious-ads-spreading-crypto-ransomware/]] |  |
-|Full Disk Encryption |How? Is there a good audited **Windows** solution? - TrueCrypt 7.1a has the privilege escalation vulnerabilities (CVE-2015-7358,7359) and the forks (VeraCrypt etc.) haven't received as much scrutiny from the security community as may be desired. \\   \\ **Linux **- use dmcrypt / LUKS, easily done as part of installation however beware the Evil Maid attack, e.g. keep your boot partition on a USB key. For removable media, use cryptsetup from the command line, or gnome-disk-utility  |  |+|Full Disk Encryption |How? Is there a good audited **Windows** solution? - TrueCrypt 7.1a has the privilege escalation vulnerabilities (CVE-2015-7358,CVE-2015-7359) and the forks (VeraCrypt etc.) haven't received as much scrutiny from the security community as may be desired. \\   \\ **Linux **- use dmcrypt / LUKS, easily done as part of installation however beware the Evil Maid attack, e.g. keep your boot partition on a USB key. For removable media, use cryptsetup from the command line, or gnome-disk-utility  |  |
 |NoScript |Advanced! - but will probably at least need touching if we're going to be covering the Tor Browser Bundle. |  | |NoScript |Advanced! - but will probably at least need touching if we're going to be covering the Tor Browser Bundle. |  |
  
Line 63: Line 65:
 |[[https://jitsi.org|Jitsi]] |Probably the most effective "drop-in Skype replacement" at the moment but I'd want to be careful not to mislead anyone into thinking that metadata analysis wasn't possible with this - it is, due to its use of centralised XMPP services. |  | |[[https://jitsi.org|Jitsi]] |Probably the most effective "drop-in Skype replacement" at the moment but I'd want to be careful not to mislead anyone into thinking that metadata analysis wasn't possible with this - it is, due to its use of centralised XMPP services. |  |
 |XMPP+OTR |This has been popular at CryptoParties for a while, but the additional security offered by Ricochet means it is effectively deprecated. Can be covered if people think it is particularly a good idea. |  | |XMPP+OTR |This has been popular at CryptoParties for a while, but the additional security offered by Ricochet means it is effectively deprecated. Can be covered if people think it is particularly a good idea. |  |
 +
 +Regarding the various different instant messengers, there's an accessible and up-to-date blog post here: https://blog.grobox.de/2016/briar-next-step-of-the-crypto-messenger-evolution/
  
 === Miscellaneous === === Miscellaneous ===