Difference between revisions of "Main Page/Teaching Resources"
(added mobile privacy resources) |
(→Anti-doxxing) |
||
(35 intermediate revisions by 9 users not shown) | |||
Line 1: | Line 1: | ||
== Teaching Resources == | == Teaching Resources == | ||
− | Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy. | + | Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy. |
+ | |||
+ | === Setting up a teaching environment === | ||
+ | |||
+ | ==== Community agreements ==== | ||
+ | Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project. | ||
+ | |||
+ | * One Mic - Don’t talk over folks. | ||
+ | * Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more! | ||
+ | * Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester. | ||
+ | * Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective. | ||
+ | * Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it. | ||
+ | * Land the plane - Have a point and make it. | ||
=== General and multi-purpose teaching resources === | === General and multi-purpose teaching resources === | ||
− | + | * [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2021/09/PLP-Cybersecurity-Handbook_508-Compliant.pdf Data Privacy and Cybersecurity Best Practices Training: Train the trainers handbook] | |
+ | * [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2020/10/PLP_Toolkit_Final-Accessibility-Modified.pdf Data Privacy Best Practices Toolkit for Libraries] | ||
+ | * [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Glossary Privacy glossary] | ||
* [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | * [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | ||
* [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | * [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | ||
* [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | * [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | ||
+ | * [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ Cybersecurity Assessment Tool] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell] | ||
+ | * [https://www.privacytools.io/ Privacy Tools - one stop shop for all tools listed below and a lot more] | ||
+ | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_DigitalToolsBingo.pdf Privacy Tools Bingo Card, A. Puglisi] | ||
+ | * [https://libguides.senylrc.org/PrivacyBasics Privacy libguide, C. Bennett Glauda] | ||
+ | * [https://guides.masslibsystem.org/digital-privacy-and-technology LFP-MA & Mass Lib Association Digital Privacy LibGuide] | ||
+ | |||
+ | === Anti-doxxing === | ||
* [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] | * [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] | ||
− | * [https://github.com/ | + | * [https://medium.com/@EqualityLabs/anti-doxing-guide-for-activists-facing-attacks-from-the-alt-right-ec6c290f543c Equality Labs anti-doxxing guide] |
+ | * [https://hackblossom.org/cybersecurity/ HackBlossom DIY feminist cybersecurity] | ||
+ | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_Digital%20Safety%20for%20Library%20Workers_AntiDoxxing.pptx Digital Safety for Library Workers: Prevention strategies & removing personal data from internet directories, A. Puglisi] | ||
+ | * [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxing.png Digital Safety: AntiDoxing Bingo PNG] | [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxingpdf.pdf Digital Safety: AntiDoxing Bingo PDF, A. Puglisi] | ||
=== Advertising === | === Advertising === | ||
Line 32: | Line 59: | ||
* [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | * [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | ||
* [https://www.eff.org/dice EFF's Diceware method and wordlist] | * [https://www.eff.org/dice EFF's Diceware method and wordlist] | ||
+ | * | ||
=== Talking points === | === Talking points === | ||
Line 37: | Line 65: | ||
"If you have nothing to hide, you are nothing." - Shoshana Zuboff | "If you have nothing to hide, you are nothing." - Shoshana Zuboff | ||
− | |||
+ | * [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Talking_points Privacy talking points by category] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | ||
Line 65: | Line 93: | ||
These are trusted links to download some of our favorite privacy tools. | These are trusted links to download some of our favorite privacy tools. | ||
+ | |||
+ | ==== Password managers and 2fa tools ==== | ||
+ | |||
+ | * [https://www.lastpass.com/ LastPass password manager] | ||
+ | * [https://keepassxc.org/ KeePassXC password manager] | ||
+ | * [https://authy.com/ Authy 2factor authentication app] | ||
+ | * [https://freeotp.github.io/ FreeOTP cross platform, free software 2FA app] | ||
+ | * [https://www.yubico.com Yubikey 2factor authentication hardware] | ||
+ | |||
+ | ==== Web browsers and search engines ==== | ||
+ | |||
+ | * [https://www.mozilla.org/en-US/firefox/new/ Firefox browser] | ||
+ | * [https://www.torproject.org/ Tor Browser] | ||
+ | * [https://duckduckgo.com DuckDuckGo search engine] | ||
+ | |||
+ | ==== VPNs ==== | ||
+ | * [https://www.privateinternetaccess.com/ Private Internet Access] | ||
+ | * [https://riseup.net/en/vpn Riseup VPN] | ||
+ | * [https://phys.org/news/2019-02-vpn.html Is your VPN secure?] | ||
+ | |||
+ | ==== Texting and calling ==== | ||
+ | * [https://www.signal.org/ Signal private messenger and calls] | ||
+ | |||
+ | ==== Email ==== | ||
+ | * [https://www.fastmail.com/ Fastmail] | ||
+ | * [https://riseup.net/en/email Riseup email] | ||
+ | * [https://emailselfdefense.fsf.org/en/ FSF's guide to GPG encryption for email] | ||
+ | * [https://protonmail.com/ Protonmail secure email] | ||
+ | * [https://https://librem.one/ Librem Mail - requires subscription] | ||
+ | |||
+ | ==== Third-party tracker blocking ==== | ||
+ | |||
+ | * [https://www.eff.org/privacybadger Privacy Badger] | ||
+ | * [https://addons.mozilla.org/en-US/firefox/addon/lightbeam/ Lightbeam (not actually a blocker, just shows you what third-parties are tracking you] | ||
+ | * [https://github.com/gorhill/uBlock/ uBlock Origin - ad blocker that doesn't track you] | ||
+ | * [https://backstage.1blocker.com/say-hello-to-1blocker-x-8b55efe1ae36 1Blocker X for mobile] | ||
+ | * [https://www.ghostery.com/ Ghostery] | ||
+ | * [https://adblockplus.org/ AdBlock Plus] | ||
+ | * [https://disconnect.me/ Disconnect Me] | ||
+ | * [https://themarkup.org/blacklight Blacklight] | ||
+ | |||
+ | ==== Implementing HTTPS ==== | ||
+ | |||
+ | * [https://letsencrypt.org/ Let's Encrypt project for setting up HTTPS on websites] | ||
+ | * [https://certbot.eff.org/ CertBot client for Let's Encrypt] | ||
=== Other teaching activities === | === Other teaching activities === | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | ||
+ | * [https://sandbox.acrl.org/library-collection/thinking-about-digital-privacy-including-rewards-and-risks-convenience Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell] | ||
+ | * [https://media.libreplanet.org/u/libreplanet/m/library-freedom-institute-a-new-hope/ Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones] | ||
=== Other presentation resources === | === Other presentation resources === | ||
These are materials to help make create your own privacy presentations. | These are materials to help make create your own privacy presentations. | ||
+ | |||
+ | *[https://www.libreoffice.org/ LibreOffice - a full featured, free software office suite including presentation and vector graphics tools] | ||
+ | *[https://github.com/hakimel/reveal.js/ Reveal.js - a framework for easily creating beautiful presentations using HTML] | ||
+ | *[https://pad.riseup.net/ Riseup.net's Etherpad - create online, temporary, collaborative text docs] | ||
+ | *[https://cryptpad.fr/ CryptPad - end to end encrypted cloud based office tools: etherpad, text editor, polls, project boards] |
Latest revision as of 23:18, 29 November 2022
Contents
- 1 Teaching Resources
Teaching Resources[edit]
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
Setting up a teaching environment[edit]
Community agreements[edit]
Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project.
- One Mic - Don’t talk over folks.
- Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more!
- Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester.
- Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective.
- Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it.
- Land the plane - Have a point and make it.
General and multi-purpose teaching resources[edit]
- Data Privacy and Cybersecurity Best Practices Training: Train the trainers handbook
- Data Privacy Best Practices Toolkit for Libraries
- Privacy glossary
- Tactical Technology Collective's 8-day Data Detox Kit
- Electronic Frontier Foundation's Security Education Companion
- Electronic Frontier Foundation's Surveillance Self-Defense
- Cybersecurity Assessment Tool
- Personal internet security slidedeck, M. Kinney
- Big Data slidedeck, M. Kinney
- Slides of news stories about companies behaving badly, C. Lobdell
- Privacy Tools - one stop shop for all tools listed below and a lot more
- Privacy Tools Bingo Card, A. Puglisi
- Privacy libguide, C. Bennett Glauda
- LFP-MA & Mass Lib Association Digital Privacy LibGuide
Anti-doxxing[edit]
- Anti-Doxing Resource List
- Equality Labs anti-doxxing guide
- HackBlossom DIY feminist cybersecurity
- Digital Safety for Library Workers: Prevention strategies & removing personal data from internet directories, A. Puglisi
- Digital Safety: AntiDoxing Bingo PNG | Digital Safety: AntiDoxing Bingo PDF, A. Puglisi
Advertising[edit]
Mobile privacy[edit]
- Mobile privacy notes and slides, B.N. Jones
- Secure messaging curriculum, S. Brown
- Mobile device privacy slides, M. Kinney
- Week 17.pdf Secure messaging slides, J. Stone
Passwords[edit]
- Password creating activity, S. Brown
- Lesson plan for creating strong passwords, C. Lobdell
- Zine about passwords and the diceware method, K. McElroy
- Diceware password activity, A. Mellon
- Diceware password activity, R. Eppley
- Diceware password activity, J. Stone
- Advice on password creation from The Intercept
- EFF's Diceware method and wordlist
Talking points[edit]
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
- Privacy talking points by category
- General big data/privacy talking points, S. Brown
- Privacy technologies talking points, B.N. Jones
- Ethics of Big Data talking points, C. Lobdell
- Data, advertising, and you, J. Stone
- General big data/privacy talking points, M. Kinney
- Browsers, social media, and advertising talking points, C. Lobdell
- General big data/privacy talking points, A. Mellon
Threat modeling[edit]
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
- Introduction to threat modeling and creating a security plan from EFF
- Threat model teaching slides, J. Stone
- A zine to teach about threat modeling, K. McElroy
- Example threat model for immigrants, A. Mellon
- Example threat model for union members with a grievance, B.N. Jones
- Example threat model for LGBTQ youth, S. Brown
- Example threat model for community college students, M. Kinney
- Example threat model for k-12 students in a Chromebook program, C. Lobdell
- Example threat model for a typical library patron with some cognitive challenges, S. White
- General big data/privacy talking points, R. Eppley
Download links to tools[edit]
These are trusted links to download some of our favorite privacy tools.
Password managers and 2fa tools[edit]
- LastPass password manager
- KeePassXC password manager
- Authy 2factor authentication app
- FreeOTP cross platform, free software 2FA app
- Yubikey 2factor authentication hardware
Web browsers and search engines[edit]
VPNs[edit]
Texting and calling[edit]
Email[edit]
- Fastmail
- Riseup email
- FSF's guide to GPG encryption for email
- Protonmail secure email
- Librem Mail - requires subscription
Third-party tracker blocking[edit]
- Privacy Badger
- Lightbeam (not actually a blocker, just shows you what third-parties are tracking you
- uBlock Origin - ad blocker that doesn't track you
- 1Blocker X for mobile
- Ghostery
- AdBlock Plus
- Disconnect Me
- Blacklight
Implementing HTTPS[edit]
Other teaching activities[edit]
- Privacy nihilist/privacy vegan activity, K. McElroy
- Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell
- Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones
Other presentation resources[edit]
These are materials to help make create your own privacy presentations.
- LibreOffice - a full featured, free software office suite including presentation and vector graphics tools
- Reveal.js - a framework for easily creating beautiful presentations using HTML
- Riseup.net's Etherpad - create online, temporary, collaborative text docs
- CryptPad - end to end encrypted cloud based office tools: etherpad, text editor, polls, project boards