Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| university_of_pennsylvania [2016/10/11 18:26] – 127.0.0.1 | university_of_pennsylvania [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| - | Penn for Privacy proudly hosts it' | + | <- [[: |
| + | |||
| + | Penn for Privacy proudly hosts its very first CryptoParty! | ||
| Penn for Privacy is a proud member of the Electronic Frontiers Alliance, a national grassroots organization dedicated to protecting your digital rights! | Penn for Privacy is a proud member of the Electronic Frontiers Alliance, a national grassroots organization dedicated to protecting your digital rights! | ||
| - | ===== The Gist ===== | ||
| - | Saturday, December 3, 2016 starting at 4PM (tentative, check back for updates) and expected to run approximately 4 hours. | + | ==== When ==== |
| - | Hosted at [[http:// | + | * Saturday, December 3, 2016 |
| + | * starting at 4PM and expected to run approximately 4 hours. | ||
| - | A free event open to the public! Practical advise and aide in implementing tools related to privacy, security and anonymity will be given and available. | + | ==== Where ==== |
| + | |||
| + | * [[http:// | ||
| + | * Hall of Flags (first floor) | ||
| + | * 3417 Spruce Street Philadelphia PA, 19104 | ||
| ===== Rules ===== | ===== Rules ===== | ||
| - | * Bring your laptops & USB keys: this is a hands-on experience. | + | * Bring your laptops & Phones & Tablets |
| * Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age. | * Come ready to discuss your concerns about, tool sets for, and own approaches toward safety in the digital age. | ||
| - | * Have tinfoil ready. | + | * Have a tinfoil |
| * Be excellent to each other. | * Be excellent to each other. | ||
| * No photographing or recording of attendees [at least not without their permission]. | * No photographing or recording of attendees [at least not without their permission]. | ||
| Line 22: | Line 28: | ||
| ===== Planned Topics ===== | ===== Planned Topics ===== | ||
| + | **Threat Modelling** | ||
| + | |||
| + | * What do you feel is important to protect? | ||
| + | * Who do you need to protect it from? | ||
| **Email Encryption with PGP/GPG** | **Email Encryption with PGP/GPG** | ||
| Line 32: | Line 42: | ||
| Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web. | Best practices, tools & procedures to keep you safe while increasing privacy when browsing the web. Browser hardening and internet safety protocols to keep your privacy on the web. | ||
| + | |||
| + | **Much, much more!** | ||
| + | |||