Difference between revisions of "CryptoParty"

From Freeside Atlanta
Jump to: navigation, search
(Links)
(Talks)
(6 intermediate revisions by one user not shown)
Line 48: Line 48:
  
 
* 2013-JUL-11 [[media:2013-JUL-11.VPN.pdf|Virtual Private Networks, Expounded Casually for the Novice Computer User]]
 
* 2013-JUL-11 [[media:2013-JUL-11.VPN.pdf|Virtual Private Networks, Expounded Casually for the Novice Computer User]]
 +
* 2013-AUG-07 [[media:2013-AUG-08.DeadDrop.pdf|Dead Drop, or how I learned to stop worrying and love encryption]]
 +
* 2013-SEP-12 [[media:OnionPi.Presentation.pdf|Onion Pi, Turning a Raspberry Pi into a Tor Access Point]]
 +
* 2013-OCT-10 [[media:SilkRoad.Presentation.pdf|The Silk Road OPSEC Fail, "Whoops!"]]
  
 
== Links ==
 
== Links ==
Line 57: Line 60:
 
* [http://www.vpntopten.com/security/what-is-a-dns-leak-and-how-it-affects-vpn-security DNS Leaks Explained]
 
* [http://www.vpntopten.com/security/what-is-a-dns-leak-and-how-it-affects-vpn-security DNS Leaks Explained]
 
* [https://www.eff.org/https-everywhere HTTPS Everywhere Browser Extension]
 
* [https://www.eff.org/https-everywhere HTTPS Everywhere Browser Extension]
 +
* [http://learn.adafruit.com/onion-pi/overview Onion Pi Step-by-Step Instructions]
 +
* [http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf Silk Road Criminal Complaint]
 +
* [http://grugq.github.io/blog/archives The Grugq Blog Archives]

Revision as of 00:54, 12 October 2013

We're going to be throwing a CryptoParty every second Thursday from 7-11pm. We have detailed directions if you're unfamiliar with the space. It's free! Just bring your laptop or other devices.

You don't have to sign up to come along - but if you do, it helps us prepare. Pseudonymous sign-ups are fine!

Drop in for a few minutes to ask a question or stay all evening and chat about privacy, security, and the interwebz.

Contents

What is a CryptoParty?

It's a lot of things in a lot of places. For most, it's a practical workshop for anyone interested in keeping their digital lives private.

Bring your laptops, netbooks, tablets and phones - we'll help you learn how to secure them and your communications:

  • full disk encryption for your computers and memory sticks;
  • encrypted email, text messages, IM on all your devices;
  • anonymous browsing and tracker-avoidance;
  • censorship circumvention;
  • password generation, databases and management;
  • keysigning / extending the web-of-trust.

If you have knowledge and skills to contribute in these or related areas please come along and share them with us!

Plus:

  • ad-hoc discussion of the laws that govern who can access your stuff and when; and, at some point in the evening,
  • our regular round-up and discussion of some cryptography basics and the latest digital-rights news, opinions, and happenings.


Have more questions? Check out cryptoparty.org. And remember to party like it's 1984! (tin foil hats not included)

Code Examples

The demonstration where I pulled my own session keys to put them into the browser had a few commands associated with it. Here they are: https://gist.github.com/eldondev/5980868

This is the script I used to modify the .ovpn files from VPNGate so that the VPN settings could be easily imported into Ubuntu: extract.sh

Talks

Links

Personal tools
Namespaces

Variants
Actions
About Us
Support Us
Activities and Culture
Membership
Outreach
Leadership
Teams
Organization
Toolbox