Difference between revisions of "Main Page/Teaching Resources"
(added talking points) |
(added password activities) |
||
Line 9: | Line 9: | ||
* [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | * [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | ||
* [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] | * [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney] | ||
=== Advertising === | === Advertising === | ||
− | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week16/Kinney_2018_LFI_16wk.pdf Slides for teaching a privacy class focused on digital advertising] | + | |
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week16/Kinney_2018_LFI_16wk.pdf Slides for teaching a privacy class focused on digital advertising, M. Kinney] | ||
=== Passwords === | === Passwords === | ||
+ | |||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Brown_wk3.pdf Password creating activity, S. Brown] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Lobdell_LFIWeek3_StrongPasswordsLesson.pdf Lesson plan for creating strong passwords, C. Lobdell] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/McElroy%20Week%203.pdf Zine about passwords and the diceware method, K. McElroy] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Mellon%20-%20diceware%20flyer.pdf Diceware password activity, A. Mellon] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Rebekah%20Eppley%20Assignment%203.docx Diceware password activity, R. Eppley] | ||
+ | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Stone%20Week%203.pdf Diceware password activity, J. Stone] | ||
* [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | * [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | ||
* [https://www.eff.org/dice EFF's Diceware method and wordlist] | * [https://www.eff.org/dice EFF's Diceware method and wordlist] | ||
Line 30: | Line 39: | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Lobdell_LFI%20week%204%20talking%20points.pdf Browsers, social media, and advertising talking points, C. Lobdell] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Lobdell_LFI%20week%204%20talking%20points.pdf Browsers, social media, and advertising talking points, C. Lobdell] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Mellon%20talking%20pts General big data/privacy talking points, A. Mellon] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Mellon%20talking%20pts General big data/privacy talking points, A. Mellon] | ||
− | |||
=== Threat modeling === | === Threat modeling === | ||
Line 52: | Line 60: | ||
=== Other teaching activities === | === Other teaching activities === | ||
+ | |||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | ||
Revision as of 06:37, 5 March 2019
Contents
Teaching Resources
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
General and multi-purpose teaching resources
- Tactical Technology Collective's 8-day Data Detox Kit
- Electronic Frontier Foundation's Security Education Companion
- Electronic Frontier Foundation's Surveillance Self-Defense
- Anti-Doxing Resource List
- Personal internet security slidedeck, M. Kinney
Advertising
Passwords
- Password creating activity, S. Brown
- Lesson plan for creating strong passwords, C. Lobdell
- Zine about passwords and the diceware method, K. McElroy
- Diceware password activity, A. Mellon
- Diceware password activity, R. Eppley
- Diceware password activity, J. Stone
- Advice on password creation from The Intercept
- EFF's Diceware method and wordlist
Talking points
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
It's helpful to have a few privacy talking points on hand for informal teaching situations or everyday conversations. Below are sets of talking points created by participants in Library Freedom Institute.
- General big data/privacy talking points, S. Brown
- Privacy technologies talking points, B.N. Jones
- Ethics of Big Data talking points, C. Lobdell
- Data, advertising, and you, J. Stone
- General big data/privacy talking points, M. Kinney
- Browsers, social media, and advertising talking points, C. Lobdell
- General big data/privacy talking points, A. Mellon
Threat modeling
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
- Introduction to threat modeling and creating a security plan from EFF
- Threat model teaching slides, J. Stone
- A zine to teach about threat modeling, K. McElroy
- Example threat model for immigrants, A. Mellon
- Example threat model for union members with a grievance, B.N. Jones
- Example threat model for LGBTQ youth, S. Brown
- Example threat model for community college students, M. Kinney
- Example threat model for k-12 students in a Chromebook program, C. Lobdell
- Example threat model for a typical library patron with some cognitive challenges, S. White
- [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Rebekah%20Week%204%20Talking%20Points.docx General big data/privacy talking points, R. Eppley
Download links to tools
These are trusted links to download some of our favorite privacy tools.
Other teaching activities
Other presentation resources
These are materials to help make create your own privacy presentations.