Online Privacy and Security Workshop - Spring 2017

From Help Wiki
Revision as of 16:01, 14 August 2017 by SubstBot (Talk | contribs) (subst applied to Template:TwoColumn)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)


This information session is about privacy and security in the realm of technology and social media and intended to provide students with tools to improve awareness of their online presence.

An Introduction to Threat Modeling

  1. What do you want to protect?
  2. Who do you want to protect it from?
  3. How likely is it that you will need to protect it?
  4. How bad are the consequences if you fail?
  5. How much trouble are you willing to go through in order to try to prevent those?


Commonly used social media and their privacy options


How to find out what information is publicly available about you as an individual

content here


Encrypted Communication Options

Tor Browser Project (Web Browser)

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

Signal Private Messenger (Text/SMS)

Privacy is possible, Signal makes it easy. Using Signal, you can communicate instantly while avoiding SMS fees, create groups so that you can chat in real time with all your friends at once, and share media all with complete privacy. The server never has access to any of your communication and never stores any of your data.

Riseup (Encrypted Email)
  • Full disk encryption
  • Personally encrypted email storage
  • All services are encrypted
  • Riseup encrypts traffic whenever possible
  • Delivery to other providers over Tor
  • and more


Additional Resources

Online Safety Under White Supremacy
  • A presentation by Evergreen Faculty, Julie Russo
Doxxing

"Doxxing" means to search for and publish private or identifying information about (a particular individual) on the Internet, typically with malicious intent.

Online Safety and Digital Security
  • Crash Override Network: Crisis Helpline, Advocacy Group and Resource Center for People who are experiencing online abuse.
  • FEM TECH NET: Helping people safely navigate digital experiences and understand the impacts of and responses to online violence
  • Surveillance Self-Defense: Tips, Tools and How-tos for Safer Online Communications
  • Tech Without Violence: Resources to help prevent, respond to and support individuals experiencing online gender-based violence or harassment—known as cyberviolence.]
  • The Boundaries Project: Tips and additional resources on how to increase your digital security]
Feminism/Gender and Online Safety