Main Page/Teaching Resources
Contents
Teaching Resources
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
Setting up a teaching environment
Community agreements
Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project.
- One Mic - Don’t talk over folks.
- Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more!
- Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester.
- Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective.
- Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it.
- Land the plane - Have a point and make it.
General and multi-purpose teaching resources
- Tactical Technology Collective's 8-day Data Detox Kit
- Electronic Frontier Foundation's Security Education Companion
- Electronic Frontier Foundation's Surveillance Self-Defense
- Anti-Doxing Resource List
- Personal internet security slidedeck, M. Kinney
- Big Data slidedeck, M. Kinney
- Slides of news stories about companies behaving badly, C. Lobdell
- Privacy Tools - one stop shop for all tools listed below and a lot more
- Privacy Bingo Card, A. Puglisi
Advertising
Mobile privacy
- Mobile privacy notes and slides, B.N. Jones
- Secure messaging curriculum, S. Brown
- Mobile device privacy slides, M. Kinney
- Week 17.pdf Secure messaging slides, J. Stone
Passwords
- Password creating activity, S. Brown
- Lesson plan for creating strong passwords, C. Lobdell
- Zine about passwords and the diceware method, K. McElroy
- Diceware password activity, A. Mellon
- Diceware password activity, R. Eppley
- Diceware password activity, J. Stone
- Advice on password creation from The Intercept
- EFF's Diceware method and wordlist
Talking points
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
It's helpful to have a few privacy talking points on hand for informal teaching situations or everyday conversations. Below are sets of talking points created by participants in Library Freedom Institute.
- General big data/privacy talking points, S. Brown
- Privacy technologies talking points, B.N. Jones
- Ethics of Big Data talking points, C. Lobdell
- Data, advertising, and you, J. Stone
- General big data/privacy talking points, M. Kinney
- Browsers, social media, and advertising talking points, C. Lobdell
- General big data/privacy talking points, A. Mellon
Threat modeling
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
- Introduction to threat modeling and creating a security plan from EFF
- Threat model teaching slides, J. Stone
- A zine to teach about threat modeling, K. McElroy
- Example threat model for immigrants, A. Mellon
- Example threat model for union members with a grievance, B.N. Jones
- Example threat model for LGBTQ youth, S. Brown
- Example threat model for community college students, M. Kinney
- Example threat model for k-12 students in a Chromebook program, C. Lobdell
- Example threat model for a typical library patron with some cognitive challenges, S. White
- General big data/privacy talking points, R. Eppley
Download links to tools
These are trusted links to download some of our favorite privacy tools.
Password managers and 2fa tools
- LastPass password manager
- KeePassXC password manager
- Authy 2factor authentication app
- FreeOTP cross platform, free software 2FA app
- Yubikey 2factor authentication hardware
Web browsers and search engines
VPNs
Texting and calling
- Fastmail
- Riseup email
- FSF's guide to GPG encryption for email
- Protonmail secure email
- Librem Mail - requires subscription
Third-party tracker blocking
- Privacy Badger
- Lightbeam (not actually a blocker, just shows you what third-parties are tracking you
- uBlock Origin - ad blocker that doesn't track you
- 1Blocker X for mobile
- Ghostery
- AdBlock Plus
- Disconnect Me
Implementing HTTPS
Other teaching activities
- Privacy nihilist/privacy vegan activity, K. McElroy
- Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell
- Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones
Other presentation resources
These are materials to help make create your own privacy presentations.
- LibreOffice - a full featured, free software office suite including presentation and vector graphics tools
- Reveal.js - a framework for easily creating beautiful presentations using HTML
- Riseup.net's Etherpad - create online, temporary, collaborative text docs
- CryptPad - end to end encrypted cloud based office tools: etherpad, text editor, polls, project boards