Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
university_of_pennsylvania [2016/10/11 18:35] – 127.0.0.1 | university_of_pennsylvania [2016/11/24 06:35] – [CryptoParty @ University of Philadelphia] 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== CryptoParty @ University of Philadelphia | + | ====== CryptoParty @ University of Pennsylvania====== |
+ | |||
+ | <- [[: | ||
Penn for Privacy proudly hosts it's very first CryptoParty! | Penn for Privacy proudly hosts it's very first CryptoParty! | ||
Line 6: | Line 8: | ||
===== The Gist ===== | ===== The Gist ===== | ||
- | A free event open to the public! Practical | + | A free event open to the public! Practical |
+ | All technical skill levels welcome, ranging from "I only know how to use an abacus" | ||
+ | |||
+ | **Free food, drink, and raffle prizes! Simply fantastic!** | ||
==== When ==== | ==== When ==== | ||
* Saturday, December 3, 2016 | * Saturday, December 3, 2016 | ||
- | * starting at 4PM (tentative, check back for updates) | + | * starting at 4PM and expected to run approximately 4 hours. |
==== Where ==== | ==== Where ==== | ||
Line 21: | Line 26: | ||
===== Rules ===== | ===== Rules ===== | ||
- | * Bring your laptops & USB keys: this is a hands-on experience. | + | * Bring your laptops & Phones & Tablets |
* Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age. | * Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age. | ||
- | * Have tinfoil ready. | + | * Have a tinfoil |
* Be excellent to each other. | * Be excellent to each other. | ||
* No photographing or recording of attendees [at least not without their permission]. | * No photographing or recording of attendees [at least not without their permission]. | ||
Line 29: | Line 34: | ||
===== Planned Topics ===== | ===== Planned Topics ===== | ||
+ | **Threat Modelling** | ||
+ | |||
+ | * What do you feel is important to protect? | ||
+ | * Who do you need to protect it from? | ||
**Email Encryption with PGP/GPG** | **Email Encryption with PGP/GPG** | ||
Line 39: | Line 48: | ||
Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web. | Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web. | ||
+ | |||
+ | **Much, much more!** | ||
+ | |||