Difference between revisions of "Main Page/Teaching Resources"
(added talking points) |
|||
Line 1: | Line 1: | ||
− | + | == Teaching Resources == | |
− | + | Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy. | |
− | |||
− | |||
− | |||
− | === General | + | === General and multi-purpose teaching resources === |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
* [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | * [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | ||
Line 23: | Line 14: | ||
=== Passwords === | === Passwords === | ||
− | * | + | * [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] |
− | * | + | * [https://www.eff.org/dice EFF's Diceware method and wordlist] |
− | === Threat | + | === Talking points === |
+ | |||
+ | "If you have nothing to hide, you are nothing." - Shoshana Zuboff | ||
+ | |||
+ | It's helpful to have a few privacy talking points on hand for informal teaching situations or everyday conversations. Below are sets of talking points created by participants in Library Freedom Institute. | ||
+ | |||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Ethics%20of%20Big%20Data%20talking%20points_Lobdell.pdf Ethics of Big Data talking points, C. Lobdell] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Josh%20Stone%20Week%204%20Assignment.pdf Data, advertising, and you, J. Stone] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Kinney_2018_LFI_4wk.pdf General big data/privacy talking points, M. Kinney] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Lobdell_LFI%20week%204%20talking%20points.pdf Browsers, social media, and advertising talking points, C. Lobdell] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Mellon%20talking%20pts General big data/privacy talking points, A. Mellon] | ||
+ | |||
+ | |||
+ | === Threat modeling === | ||
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling. | Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling. | ||
* [https://ssd.eff.org/en/module/your-security-plan Introduction to threat modeling and creating a security plan from EFF] | * [https://ssd.eff.org/en/module/your-security-plan Introduction to threat modeling and creating a security plan from EFF] | ||
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Josh%20Stone%20Threat%20Model%20Lesson%20Plan_Week%205.pdf Threat model teaching slides | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Josh%20Stone%20Threat%20Model%20Lesson%20Plan_Week%205.pdf Threat model teaching slides, J. Stone] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/McElroy%20Week%205.pdf A zine to teach about threat modeling | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/McElroy%20Week%205.pdf A zine to teach about threat modeling, K. McElroy] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Ally%20Week%205.pdf Example threat model for immigrants | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Ally%20Week%205.pdf Example threat model for immigrants, A. Mellon] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/B.N.%20Jones%20LFI%20Week%205.pdf Example threat model for union members with a grievance | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/B.N.%20Jones%20LFI%20Week%205.pdf Example threat model for union members with a grievance, B.N. Jones] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Brown_wk5.pdf Example threat model for LGBTQ youth | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Brown_wk5.pdf Example threat model for LGBTQ youth, S. Brown] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Kinney_2018_LFI_5wk.pdf Example threat model for community college students | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Kinney_2018_LFI_5wk.pdf Example threat model for community college students, M. Kinney] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Lobdell_LFIweek5_threatmodel.pdf Example threat model for k-12 students in a Chromebook program | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Lobdell_LFIweek5_threatmodel.pdf Example threat model for k-12 students in a Chromebook program, C. Lobdell] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Social%20media%20privacy%20class%20-%20threat%20modeling.pptx Example threat model for a typical library patron with some cognitive challenges | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Social%20media%20privacy%20class%20-%20threat%20modeling.pptx Example threat model for a typical library patron with some cognitive challenges, S. White] |
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Rebekah%20Week%204%20Talking%20Points.docx General big data/privacy talking points, R. Eppley | ||
=== Download links to tools === | === Download links to tools === | ||
These are trusted links to download some of our favorite privacy tools. | These are trusted links to download some of our favorite privacy tools. | ||
+ | |||
+ | === Other teaching activities === | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | ||
=== Other presentation resources === | === Other presentation resources === | ||
These are materials to help make create your own privacy presentations. | These are materials to help make create your own privacy presentations. |
Revision as of 06:25, 5 March 2019
Contents
Teaching Resources
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
General and multi-purpose teaching resources
- Tactical Technology Collective's 8-day Data Detox Kit
- Electronic Frontier Foundation's Security Education Companion
- Electronic Frontier Foundation's Surveillance Self-Defense
- Anti-Doxing Resource List
Advertising
Passwords
Talking points
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
It's helpful to have a few privacy talking points on hand for informal teaching situations or everyday conversations. Below are sets of talking points created by participants in Library Freedom Institute.
- General big data/privacy talking points, S. Brown
- Privacy technologies talking points, B.N. Jones
- Ethics of Big Data talking points, C. Lobdell
- Data, advertising, and you, J. Stone
- General big data/privacy talking points, M. Kinney
- Browsers, social media, and advertising talking points, C. Lobdell
- General big data/privacy talking points, A. Mellon
Threat modeling
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
- Introduction to threat modeling and creating a security plan from EFF
- Threat model teaching slides, J. Stone
- A zine to teach about threat modeling, K. McElroy
- Example threat model for immigrants, A. Mellon
- Example threat model for union members with a grievance, B.N. Jones
- Example threat model for LGBTQ youth, S. Brown
- Example threat model for community college students, M. Kinney
- Example threat model for k-12 students in a Chromebook program, C. Lobdell
- Example threat model for a typical library patron with some cognitive challenges, S. White
- [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Rebekah%20Week%204%20Talking%20Points.docx General big data/privacy talking points, R. Eppley
Download links to tools
These are trusted links to download some of our favorite privacy tools.
Other teaching activities
Other presentation resources
These are materials to help make create your own privacy presentations.