Online Privacy and Security Workshop - Spring 2017
This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.
An Introduction to Threat Modeling
- What do you want to protect?
- Who do you want to protect it from?
- How likely is it that you will need to protect it?
- How bad are the consequences if you fail?
- How much trouble are you willing to go through in order to try to prevent those?
Commonly used social media and their privacy options
- Facebook: Manage Your Privacy
- Instagram: How do I set my photos and videos to private so that only approved followers can see them?
- Snapchat: Change your privacy settings
- Twitter: Protecting and unprotecting your Tweets
How to find out what information is publicly available about you as an individual
content here
Encrypted Communication Options
Tor Browser Project (Web Browser)
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
Signal Private Messenger (Text/SMS)
Privacy is possible, Signal makes it easy. Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media all with complete privacy. The server never has access to any of your communication and never stores any of your data.
Riseup (Encrypted Email)
- Full disk encryption
- Personally encrypted email storage
- All services are encrypted
- Riseup encrypts traffic whenever possible
- Delivery to other providers over Tor
- and more
Additional Resources
Online Safety Under White Supremacy
- A presentation by Evergreen Faculty, Julie Russo
Doxxing
"Doxxing" means to search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.
- I Got Doxxed So You Don’t Have To: What you need to do if you don’t want all your secrets blasted around the Internet.
- So You've Been Doxed: A guide on what to do next.
Online Safety and Digital Security
- Crash Override Network: Crisis Helpline, Advocacy Group and Resource Center for People who are experiencing online abuse.
- FEM TECH NET: Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
- Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications
- Tech Without Violence: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
- The Boundaries Project: Tips and additional resources on how to increase your digital security]
Feminism/Gender and Online Safety
- Girls Who Code: Free after-school programs for 6-12th grade girls to use computer science to impact their community and join our sisterhood of supportive peers and role models ]
- Tech LadyMafia: Supports women who work in and around the internet. We are astrophysicists and developers, writers and digital strategists.]
- Hollaback!: FROM ONLINE TO THE STREETS, YOU HAVE THE RIGHT TO BE IN PUBLIC SPACE
- HeartMob (powered by Hollaback!: Join the movement to end online harassment
- Take Back the Tech!: A call to everyone, especially women and girls, to take control of technology to end violence against women.
- National Safe & Strategic Technology Project
- End Online Misogyny
- Cyber Safety for Girls
- Report Gendered Harassment on Twitter with WAM!’s New Reporting Tool