Difference between revisions of "Main Page/Teaching Resources"
(→General and multi-purpose teaching resources) |
(→Anti-doxxing) |
||
(15 intermediate revisions by 4 users not shown) | |||
Line 16: | Line 16: | ||
=== General and multi-purpose teaching resources === | === General and multi-purpose teaching resources === | ||
− | + | * [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2021/09/PLP-Cybersecurity-Handbook_508-Compliant.pdf Data Privacy and Cybersecurity Best Practices Training: Train the trainers handbook] | |
+ | * [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2020/10/PLP_Toolkit_Final-Accessibility-Modified.pdf Data Privacy Best Practices Toolkit for Libraries] | ||
+ | * [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Glossary Privacy glossary] | ||
* [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | * [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | ||
* [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | * [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | ||
* [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | * [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | ||
− | * [https:// | + | * [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ Cybersecurity Assessment Tool] |
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney] | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney] |
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell] | ||
* [https://www.privacytools.io/ Privacy Tools - one stop shop for all tools listed below and a lot more] | * [https://www.privacytools.io/ Privacy Tools - one stop shop for all tools listed below and a lot more] | ||
− | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_DigitalToolsBingo.pdf Privacy Bingo Card, A. Puglisi] | + | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_DigitalToolsBingo.pdf Privacy Tools Bingo Card, A. Puglisi] |
+ | * [https://libguides.senylrc.org/PrivacyBasics Privacy libguide, C. Bennett Glauda] | ||
+ | * [https://guides.masslibsystem.org/digital-privacy-and-technology LFP-MA & Mass Lib Association Digital Privacy LibGuide] | ||
+ | |||
+ | === Anti-doxxing === | ||
+ | * [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] | ||
+ | * [https://medium.com/@EqualityLabs/anti-doxing-guide-for-activists-facing-attacks-from-the-alt-right-ec6c290f543c Equality Labs anti-doxxing guide] | ||
+ | * [https://hackblossom.org/cybersecurity/ HackBlossom DIY feminist cybersecurity] | ||
+ | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_Digital%20Safety%20for%20Library%20Workers_AntiDoxxing.pptx Digital Safety for Library Workers: Prevention strategies & removing personal data from internet directories, A. Puglisi] | ||
+ | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxing.png Digital Safety: AntiDoxing Bingo PNG] | [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxingpdf.pdf Digital Safety: AntiDoxing Bingo PDF, A. Puglisi] | ||
=== Advertising === | === Advertising === | ||
Line 54: | Line 65: | ||
"If you have nothing to hide, you are nothing." - Shoshana Zuboff | "If you have nothing to hide, you are nothing." - Shoshana Zuboff | ||
− | |||
+ | * [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Talking_points Privacy talking points by category] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | ||
Line 100: | Line 111: | ||
* [https://www.privateinternetaccess.com/ Private Internet Access] | * [https://www.privateinternetaccess.com/ Private Internet Access] | ||
* [https://riseup.net/en/vpn Riseup VPN] | * [https://riseup.net/en/vpn Riseup VPN] | ||
+ | * [https://phys.org/news/2019-02-vpn.html Is your VPN secure?] | ||
==== Texting and calling ==== | ==== Texting and calling ==== | ||
Line 120: | Line 132: | ||
* [https://adblockplus.org/ AdBlock Plus] | * [https://adblockplus.org/ AdBlock Plus] | ||
* [https://disconnect.me/ Disconnect Me] | * [https://disconnect.me/ Disconnect Me] | ||
− | * | + | * [https://themarkup.org/blacklight Blacklight] |
==== Implementing HTTPS ==== | ==== Implementing HTTPS ==== |
Latest revision as of 23:18, 29 November 2022
Contents
- 1 Teaching Resources
Teaching Resources[edit]
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
Setting up a teaching environment[edit]
Community agreements[edit]
Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project.
- One Mic - Don’t talk over folks.
- Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more!
- Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester.
- Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective.
- Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it.
- Land the plane - Have a point and make it.
General and multi-purpose teaching resources[edit]
- Data Privacy and Cybersecurity Best Practices Training: Train the trainers handbook
- Data Privacy Best Practices Toolkit for Libraries
- Privacy glossary
- Tactical Technology Collective's 8-day Data Detox Kit
- Electronic Frontier Foundation's Security Education Companion
- Electronic Frontier Foundation's Surveillance Self-Defense
- Cybersecurity Assessment Tool
- Personal internet security slidedeck, M. Kinney
- Big Data slidedeck, M. Kinney
- Slides of news stories about companies behaving badly, C. Lobdell
- Privacy Tools - one stop shop for all tools listed below and a lot more
- Privacy Tools Bingo Card, A. Puglisi
- Privacy libguide, C. Bennett Glauda
- LFP-MA & Mass Lib Association Digital Privacy LibGuide
Anti-doxxing[edit]
- Anti-Doxing Resource List
- Equality Labs anti-doxxing guide
- HackBlossom DIY feminist cybersecurity
- Digital Safety for Library Workers: Prevention strategies & removing personal data from internet directories, A. Puglisi
- Digital Safety: AntiDoxing Bingo PNG | Digital Safety: AntiDoxing Bingo PDF, A. Puglisi
Advertising[edit]
Mobile privacy[edit]
- Mobile privacy notes and slides, B.N. Jones
- Secure messaging curriculum, S. Brown
- Mobile device privacy slides, M. Kinney
- Week 17.pdf Secure messaging slides, J. Stone
Passwords[edit]
- Password creating activity, S. Brown
- Lesson plan for creating strong passwords, C. Lobdell
- Zine about passwords and the diceware method, K. McElroy
- Diceware password activity, A. Mellon
- Diceware password activity, R. Eppley
- Diceware password activity, J. Stone
- Advice on password creation from The Intercept
- EFF's Diceware method and wordlist
Talking points[edit]
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
- Privacy talking points by category
- General big data/privacy talking points, S. Brown
- Privacy technologies talking points, B.N. Jones
- Ethics of Big Data talking points, C. Lobdell
- Data, advertising, and you, J. Stone
- General big data/privacy talking points, M. Kinney
- Browsers, social media, and advertising talking points, C. Lobdell
- General big data/privacy talking points, A. Mellon
Threat modeling[edit]
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
- Introduction to threat modeling and creating a security plan from EFF
- Threat model teaching slides, J. Stone
- A zine to teach about threat modeling, K. McElroy
- Example threat model for immigrants, A. Mellon
- Example threat model for union members with a grievance, B.N. Jones
- Example threat model for LGBTQ youth, S. Brown
- Example threat model for community college students, M. Kinney
- Example threat model for k-12 students in a Chromebook program, C. Lobdell
- Example threat model for a typical library patron with some cognitive challenges, S. White
- General big data/privacy talking points, R. Eppley
Download links to tools[edit]
These are trusted links to download some of our favorite privacy tools.
Password managers and 2fa tools[edit]
- LastPass password manager
- KeePassXC password manager
- Authy 2factor authentication app
- FreeOTP cross platform, free software 2FA app
- Yubikey 2factor authentication hardware
Web browsers and search engines[edit]
VPNs[edit]
Texting and calling[edit]
Email[edit]
- Fastmail
- Riseup email
- FSF's guide to GPG encryption for email
- Protonmail secure email
- Librem Mail - requires subscription
Third-party tracker blocking[edit]
- Privacy Badger
- Lightbeam (not actually a blocker, just shows you what third-parties are tracking you
- uBlock Origin - ad blocker that doesn't track you
- 1Blocker X for mobile
- Ghostery
- AdBlock Plus
- Disconnect Me
- Blacklight
Implementing HTTPS[edit]
Other teaching activities[edit]
- Privacy nihilist/privacy vegan activity, K. McElroy
- Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell
- Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones
Other presentation resources[edit]
These are materials to help make create your own privacy presentations.
- LibreOffice - a full featured, free software office suite including presentation and vector graphics tools
- Reveal.js - a framework for easily creating beautiful presentations using HTML
- Riseup.net's Etherpad - create online, temporary, collaborative text docs
- CryptPad - end to end encrypted cloud based office tools: etherpad, text editor, polls, project boards