Editing LFI Course Materials 4/Week three

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs, their material conditions, and their community network. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment and beyond. We'll also talk about free and open source software (FOSS), what it means for privacy, and how it offers one vision of a rhizomatic, grassroots, internationalist movement for better technology. Depending on time, we may cover some of the 101 level privacy tools for anyone with any threat model.
+
This week we'll cover one of the building blocks of privacy advocacy and a major theme for this course: threat modeling. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and how we can use this methodology in thinking about privacy in the current moment. We'll also talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.  
  
 
==== Readings ====
 
==== Readings ====
* Bruce Schneier on "The Security Mindset" https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html
 
 
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
 
* Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetoxkit.org/en/home/
+
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
 
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
 
* Browse through EFF's Surveillance Self-Defense: ssd.eff.org
* Globalization from below: free software and alternatives to neoliberalism: https://drive.google.com/file/d/11Bf6S2-cujj21uLM0XzPHQVuV2Kg40d3/view?usp=sharing
+
* Browse through EFF's Security Education Companion: sec.eff.org
 +
* Read about making strong passwords: https://ssd.eff.org/en/module/creating-strong-passwords
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 17: Line 17:
 
==== Discussion ====
 
==== Discussion ====
 
* How might someone's threat model have changed already given the current pandemic and uprisings for Black lives?
 
* How might someone's threat model have changed already given the current pandemic and uprisings for Black lives?
* How can threat modeling help us when thinking about privacy practices?
+
* How can threat modeling help us when thinking about privacy practices?  
* What adversaries are you thinking like when you think in a security mindset?
 
* Discussion of Data Detox Kit and Surveillance Self-Defense modules
 
* How can free software challenge the hegemony of Big Tech? What lessons can we take from the Brazilian free software movement? What are the limitations to this approach?
 
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, and discussion forum  
+
* Lecture, readings, discussion forum, and small group work
* Complete one module of the Data Detox Kit https://datadetoxkit.org/en/home or one module on Surveillance Self-Defense ssd.eff.org
+
* Complete one day of the Data Detox Kit https://datadetoxkit.org/en/home
 +
* Download Signal Messenger (for Android or iOS) and then send a message to Alison to be added to the LFI cohort 3 Signal thread (Alison will share her number on the email list)

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)