Difference between revisions of "Online Privacy and Security Workshop - Spring 2017"

From Help Wiki
Line 2: Line 2:
 
{{TwoColumn|lead=
 
{{TwoColumn|lead=
 
This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.
 
This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.
 +
  
 
|content=
 
|content=
 +
 +
====[https://ssd.eff.org/en/module/introduction-threat-modeling An Introduction to Threat Modeling]====
 +
# What do you want to protect?
 +
# Who do you want to protect it from?
 +
# How likely is it that you will need to protect it?
 +
# How bad are the consequences if you fail?
 +
# How much trouble are you willing to go through in order to try to prevent those?
 +
 +
 
====Commonly used social media and their privacy options====
 
====Commonly used social media and their privacy options====
 
* [https://www.facebook.com/about/basics/manage-your-privacy/us Facebook: Manage Your Privacy]
 
* [https://www.facebook.com/about/basics/manage-your-privacy/us Facebook: Manage Your Privacy]
Line 30: Line 40:
 
* Delivery to other providers over Tor
 
* Delivery to other providers over Tor
 
* and more
 
* and more
 +
 +
 +
====Additional Resources====
 +
* [https://ssd.eff.org/ Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications]
 +
* [http://techwithoutviolence.ca/ Tech Without Violence: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
 +
* [http://holdyourboundaries.com/posts/ ]
 +
* [http://girlswhocode.com/clubs/ ]
 +
* [http://techladymafia.com/ ]
 +
* [http://ihollaback.org/ & http://iheartmob.org/ ]
 +
* [http://takebackthetech.net/ ]
 +
* [http://nnedv.org/projects/safetynet.html ]
 +
* [http://endmisogyny.org/ ]
 +
* [http://thimbleprojects.org/mozstacy/209502/ ]
 +
* [http://womenactionmedia.org/events/report-gendered-harassment-on-twitter-with-wams-new-reporting-tool/ ]
  
  

Revision as of 17:05, 1 June 2017


This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.

An Introduction to Threat Modeling

  1. What do you want to protect?
  2. Who do you want to protect it from?
  3. How likely is it that you will need to protect it?
  4. How bad are the consequences if you fail?
  5. How much trouble are you willing to go through in order to try to prevent those?


Commonly used social media and their privacy options


How to find out what information is publicly available about you as an individual

content here


Encrypted Communication Options

Tor Browser Project (Web Browser)

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

Signal Private Messenger (Text/SMS)

Privacy is possible, Signal makes it easy. Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media all with complete privacy. The server never has access to any of your communication and never stores any of your data.

Riseup (Encrypted Email)
  • Full disk encryption
  • Personally encrypted email storage
  • All services are encrypted
  • Riseup encrypts traffic whenever possible
  • Delivery to other providers over Tor
  • and more


Additional Resources