Difference between revisions of "Online Privacy and Security Workshop - Spring 2017"

From Help Wiki
Line 43: Line 43:
  
 
====Additional Resources====
 
====Additional Resources====
* [https://ssd.eff.org/ Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications]
+
* [http://femtechnet.org/csov/ FEM TECH NET]
* [http://techwithoutviolence.ca/ Tech Without Violence: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
+
** Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
* [http://holdyourboundaries.com/posts/ ]
+
*[https://ssd.eff.org/ Surveillance Self-Defense]
* [http://girlswhocode.com/clubs/ ]
+
**Tips, Tools and How-tos for Safer Online Communications
* [http://techladymafia.com/ ]
+
* [http://techwithoutviolence.ca/ Tech Without Violence]
* [http://ihollaback.org/ & http://iheartmob.org/ ]
+
** Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
* [http://takebackthetech.net/ ]
+
* [http://holdyourboundaries.com/posts/ The Boundaries Project]
* [http://nnedv.org/projects/safetynet.html ]
+
** Tips and additional resources on how to increase your digital security]
* [http://endmisogyny.org/ ]
+
* [http://girlswhocode.com/clubs/ Girls Who Code]
* [http://thimbleprojects.org/mozstacy/209502/ ]
+
** Free after-school programs for 6-12th grade girls to use computer science to impact their community and join our sisterhood of supportive peers and role models ]
* [http://womenactionmedia.org/events/report-gendered-harassment-on-twitter-with-wams-new-reporting-tool/ ]
+
* [http://techladymafia.com/ Tech LadyMafia]
 +
** Tech LadyMafia supports women who work in and around the internet. We are astrophysicists and developers, writers and digital strategists.]
 +
* [http://ihollaback.org/ Hollaback!]
 +
** FROM ONLINE TO THE STREETS, YOU HAVE THE RIGHT TO BE IN PUBLIC SPACE
 +
* [http://iheartmob.org/ HeartMob (powered by Hollaback!]
 +
** Join the movement to end online harassment
 +
* [http://takebackthetech.net/ Take Back the Tech!]
 +
** A call to everyone, especially women and girls, to take control of technology to end violence against women.
 +
* [http://nnedv.org/projects/safetynet.html National Safe & Strategic Technology Project]
 +
* [http://endmisogyny.org/ End Online Misogyny]
 +
* [http://thimbleprojects.org/mozstacy/209502/ Cyber Safety for Girls]
 +
* [http://womenactionmedia.org/events/report-gendered-harassment-on-twitter-with-wams-new-reporting-tool/ Report Gendered Harassment on Twitter with WAM!’s New Reporting Tool]
  
  

Revision as of 17:23, 1 June 2017


This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.

An Introduction to Threat Modeling

  1. What do you want to protect?
  2. Who do you want to protect it from?
  3. How likely is it that you will need to protect it?
  4. How bad are the consequences if you fail?
  5. How much trouble are you willing to go through in order to try to prevent those?


Commonly used social media and their privacy options


How to find out what information is publicly available about you as an individual

content here


Encrypted Communication Options

Tor Browser Project (Web Browser)

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

Signal Private Messenger (Text/SMS)

Privacy is possible, Signal makes it easy. Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media all with complete privacy. The server never has access to any of your communication and never stores any of your data.

Riseup (Encrypted Email)
  • Full disk encryption
  • Personally encrypted email storage
  • All services are encrypted
  • Riseup encrypts traffic whenever possible
  • Delivery to other providers over Tor
  • and more


Additional Resources