Difference between revisions of "LFI Course Materials 2020/Week two"
(Updates) |
|||
Line 1: | Line 1: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Week 2: Foundational reading=== | === Week 2: Foundational reading=== | ||
− | * Real time lecture: | + | * Real time lecture: March 16, 12 Pacific/2 Eastern |
==== Overview ==== | ==== Overview ==== | ||
Line 25: | Line 20: | ||
==== Discussion ==== | ==== Discussion ==== | ||
− | + | How do you see the surveillant assemblage at work in our lives? | |
− | + | ||
+ | If human contact is becoming a luxury good, what are the implications for privacy? | ||
+ | |||
+ | What terms or concepts were new and noteworthy to you in "The New Terminology for Privacy"? Which of these do you want to learn more about in LFI? | ||
+ | What are your personal goals for this course? | ||
==== Tasks ==== | ==== Tasks ==== | ||
* Lecture, readings, discussion forum, and small group work | * Lecture, readings, discussion forum, and small group work | ||
* Complete one day of the Data Detox Kit | * Complete one day of the Data Detox Kit | ||
* Schedule time with Alison to talk about questions and ideas for your small group projects | * Schedule time with Alison to talk about questions and ideas for your small group projects |
Revision as of 15:35, 27 February 2020
Contents
Week 2: Foundational reading
- Real time lecture: March 16, 12 Pacific/2 Eastern
Overview
This week we'll cover some of the building blocks of privacy advocacy: threat modeling, and learning basic privacy strategies and tools. Threat modeling is a method for figuring out a privacy strategy that works for someone based on their unique needs. Alison will teach us how to threat model, and then we'll talk about some of the 101 level ways that anyone can protect their privacy. We'll close out the lecture with some resources for learning how to do basic privacy education.
Learning objectives
- Learn starting points for teaching privacy
- Learn about top privacy resources
- Learn about the importance of threat modeling and how to create a threat model
Readings
- Read EFF's threat modeling one-pager: https://www.eff.org/files/2015/11/24/3mod_threat-modeling-ssd_9-3-15.pdf
- Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
- Browse through EFF's Surveillance Self-Defense: ssd.eff.org
- Browse through EFF's Security Education Companion: sec.eff.org
Guest lecturer
No guest this week; Alison will lead the lecture
Discussion
How do you see the surveillant assemblage at work in our lives?
If human contact is becoming a luxury good, what are the implications for privacy?
What terms or concepts were new and noteworthy to you in "The New Terminology for Privacy"? Which of these do you want to learn more about in LFI?
What are your personal goals for this course?
Tasks
- Lecture, readings, discussion forum, and small group work
- Complete one day of the Data Detox Kit
- Schedule time with Alison to talk about questions and ideas for your small group projects