Difference between revisions of "Online Privacy and Security Workshop - Spring 2017"

From Help Wiki
m (subst applied to Template:TwoColumn)
 
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
 
__NOTOC__
 
__NOTOC__
{{TwoColumn|lead=
+
 
 +
<div class="container-fluid">
 +
<div class="row">
 +
<div class="col-md-8">
 +
<div class="lead">
 
This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.
 
This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.
 
+
</div>
 
+
|content=
+
  
 
====[https://ssd.eff.org/en/module/introduction-threat-modeling An Introduction to Threat Modeling]====
 
====[https://ssd.eff.org/en/module/introduction-threat-modeling An Introduction to Threat Modeling]====
Line 40: Line 42:
 
* Delivery to other providers over Tor
 
* Delivery to other providers over Tor
 
* and more
 
* and more
 +
  
  
 
====Additional Resources====
 
====Additional Resources====
* [http://femtechnet.org/csov/ FEM TECH NET]
+
 
** Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
+
=====Online Safety Under White Supremacy=====
*[https://ssd.eff.org/ Surveillance Self-Defense]  
+
* A presentation by Evergreen Faculty, Julie Russo
**Tips, Tools and How-tos for Safer Online Communications
+
 
* [http://techwithoutviolence.ca/ Tech Without Violence]
+
=====Doxxing=====
** Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
+
"Doxxing" means to search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.
* [http://holdyourboundaries.com/posts/ The Boundaries Project]
+
* [http://www.thedailybeast.com/i-got-doxxed-so-you-dont-have-to I Got Doxxed So You Don’t Have To]: What you need to do if you don’t want all your secrets blasted around the Internet.
** Tips and additional resources on how to increase your digital security]
+
* [http://www.crashoverridenetwork.com/soyouvebeendoxed.html So You've Been Doxed: A guide on what to do next.]
* [http://girlswhocode.com/clubs/ Girls Who Code]
+
 
** Free after-school programs for 6-12th grade girls to use computer science to impact their community and join our sisterhood of supportive peers and role models ]
+
=====Online Safety and Digital Security=====
* [http://techladymafia.com/ Tech LadyMafia]
+
* [http://www.crashoverridenetwork.com/index.html Crash Override Network]: Crisis Helpline, Advocacy Group and Resource Center for People who are experiencing online abuse.
** Tech LadyMafia supports women who work in and around the internet. We are astrophysicists and developers, writers and digital strategists.]
+
* [http://femtechnet.org/csov/ FEM TECH NET]: Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
* [http://ihollaback.org/ Hollaback!]
+
*[https://ssd.eff.org/ Surveillance Self-Defense]: Tips, Tools and How-tos for Safer Online Communications
** FROM ONLINE TO THE STREETS, YOU HAVE THE RIGHT TO BE IN PUBLIC SPACE
+
* [http://techwithoutviolence.ca/ Tech Without Violence]: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
* [http://iheartmob.org/ HeartMob (powered by Hollaback!]
+
* [http://holdyourboundaries.com/posts/ The Boundaries Project]: Tips and additional resources on how to increase your digital security]
** Join the movement to end online harassment
+
 
* [http://takebackthetech.net/ Take Back the Tech!]
+
=====Feminism/Gender and Online Safety=====
** A call to everyone, especially women and girls, to take control of technology to end violence against women.
+
* [http://girlswhocode.com/clubs/ Girls Who Code]: Free after-school programs for 6-12th grade girls to use computer science to impact their community and join our sisterhood of supportive peers and role models ]
 +
* [http://techladymafia.com/ Tech LadyMafia]: Supports women who work in and around the internet. We are astrophysicists and developers, writers and digital strategists.]
 +
* [http://ihollaback.org/ Hollaback!]: FROM ONLINE TO THE STREETS, YOU HAVE THE RIGHT TO BE IN PUBLIC SPACE
 +
* [http://iheartmob.org/ HeartMob (powered by Hollaback!]: Join the movement to end online harassment
 +
* [http://takebackthetech.net/ Take Back the Tech!]: A call to everyone, especially women and girls, to take control of technology to end violence against women.
 
* [http://nnedv.org/projects/safetynet.html National Safe & Strategic Technology Project]
 
* [http://nnedv.org/projects/safetynet.html National Safe & Strategic Technology Project]
 
* [http://endmisogyny.org/ End Online Misogyny]
 
* [http://endmisogyny.org/ End Online Misogyny]
Line 67: Line 74:
  
  
|sidebar=
+
<!-- end col-md-8 -->
 +
</div>
 +
<div class="col-md-1"></div>
 +
<div class="col-md-3 sidebar">
 
{{GetHelp}}
 
{{GetHelp}}
}}
+
 
 +
<!-- end col-md-3-->
 +
</div>
 +
<!-- end row-->
 +
</div>
 +
<!-- end container-->
 +
</div>
 +
<!-- Generator=Template:TwoColumn -->
 +
__NOTOC__
 +
__NOEDITSECTION__
  
 
[[Category:2016-2017]]
 
[[Category:2016-2017]]

Latest revision as of 17:01, 14 August 2017


This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.

An Introduction to Threat Modeling

  1. What do you want to protect?
  2. Who do you want to protect it from?
  3. How likely is it that you will need to protect it?
  4. How bad are the consequences if you fail?
  5. How much trouble are you willing to go through in order to try to prevent those?


Commonly used social media and their privacy options


How to find out what information is publicly available about you as an individual

content here


Encrypted Communication Options

Tor Browser Project (Web Browser)

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

Signal Private Messenger (Text/SMS)

Privacy is possible, Signal makes it easy. Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media all with complete privacy. The server never has access to any of your communication and never stores any of your data.

Riseup (Encrypted Email)
  • Full disk encryption
  • Personally encrypted email storage
  • All services are encrypted
  • Riseup encrypts traffic whenever possible
  • Delivery to other providers over Tor
  • and more


Additional Resources

Online Safety Under White Supremacy
  • A presentation by Evergreen Faculty, Julie Russo
Doxxing

"Doxxing" means to search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.

Online Safety and Digital Security
  • Crash Override Network: Crisis Helpline, Advocacy Group and Resource Center for People who are experiencing online abuse.
  • FEM TECH NET: Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
  • Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications
  • Tech Without Violence: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
  • The Boundaries Project: Tips and additional resources on how to increase your digital security]
Feminism/Gender and Online Safety