Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
university_of_pennsylvania [2016/10/11 18:26] 127.0.0.1university_of_pennsylvania [2022/05/08 11:42] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== Philadelphia ======+====== CryptoParty @ University of Pennsylvania======
  
-Penn for Privacy proudly hosts it'very first Cryptoparty!+<- [[:philadelphia|Philadelphia Index Page]] 
 + 
 +Penn for Privacy proudly hosts its very first CryptoParty!
 Penn for Privacy is a proud member of the Electronic Frontiers Alliance, a national grassroots organization dedicated to protecting your digital rights! Penn for Privacy is a proud member of the Electronic Frontiers Alliance, a national grassroots organization dedicated to protecting your digital rights!
  
-===== The Gist ===== 
  
-Saturday, December 3, 2016 starting at 4PM (tentative, check back for updates) and expected to run approximately 4 hours. +==== When ====
  
-Hosted at [[http://www.facilities.upenn.edu/maps/locations/houston-hall | Houston Hall]] on the first floor in the Hall of Flags. Located at 3417 Spruce Street Philadelphia PA19104.+  * SaturdayDecember 3, 2016 
 +  * starting at 4PM and expected to run approximately 4 hours
  
-A free event open to the public! Practical advise and aide in implementing tools related to privacy, security and anonymity will be given and available+==== Where ==== 
 + 
 +  * [[http://www.facilities.upenn.edu/maps/locations/houston-hall | Houston Hall]] 
 +  * Hall of Flags (first floor) 
 +  * 3417 Spruce Street Philadelphia PA, 19104
  
 ===== Rules ===== ===== Rules =====
  
-  * Bring your laptops & USB keys: this is a hands-on experience.+  * Bring your laptops & Phones & Tablets USB keys & Abacuses: this is a hands-on experience.
   * Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age.   * Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age.
-  * Have tinfoil ready.+  * Have tinfoil hat ready. If not, one will be supplied.
   * Be excellent to each other.   * Be excellent to each other.
   * No photographing or recording of attendees [at least not without their permission].   * No photographing or recording of attendees [at least not without their permission].
Line 22: Line 28:
  
 ===== Planned Topics ===== ===== Planned Topics =====
 +**Threat Modelling**
 +
 +  * What do you feel is important to protect?
 +  * Who do you need to protect it from?
  
 **Email Encryption with PGP/GPG** **Email Encryption with PGP/GPG**
Line 32: Line 42:
  
 Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web. Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web.
 +
 +**Much, much more!**
 +