Editing LFI Course Materials 4/Week three
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
==== Overview ==== | ==== Overview ==== | ||
− | This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs | + | This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment. We'll also talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education. |
==== Readings ==== | ==== Readings ==== | ||
− | |||
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf | * Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf | ||
− | * Browse through Tactical Technology Collective's Data Detox Kit: https:// | + | * Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home |
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org | * Browse through EFF's Surveillance Self-Defense: ssd.eff.org | ||
− | * | + | * Browse through EFF's Security Education Companion: sec.eff.org |
+ | * Read about making strong passwords: https://ssd.eff.org/en/module/creating-strong-passwords | ||
==== Guest lecturer ==== | ==== Guest lecturer ==== | ||
Line 17: | Line 17: | ||
==== Discussion ==== | ==== Discussion ==== | ||
* How might someone's threat model have changed already given the current pandemic and uprisings for Black lives? | * How might someone's threat model have changed already given the current pandemic and uprisings for Black lives? | ||
− | * How can threat modeling help us when thinking about privacy practices | + | * How can threat modeling help us when thinking about privacy practices? |
− | |||
− | |||
− | |||
==== Tasks ==== | ==== Tasks ==== | ||
− | * Lecture, readings, | + | * Lecture, readings, discussion forum, and small group work |
− | * Complete one | + | * Complete one day of the Data Detox Kit https://datadetoxkit.org/en/home |
+ | * Download Signal Messenger (for Android or iOS) and then send a message to Alison to be added to the LFI cohort 3 Signal thread (Alison will share her number on the email list) |