Editing LFI Course Materials 4/Week twelve

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 3: Line 3:
  
 
==== Overview ====
 
==== Overview ====
This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.
 
  
 
==== Readings ====
 
==== Readings ====
* EFF's digital security guide for protesting: https://ssd.eff.org/en/module/attending-protest
+
https://www.privacyduck.com/
* Guide to locking down Signal: https://medium.com/@mshelton/locking-down-signal-d71678f653d3
+
https://signalboost.info/
 +
http://www.ala.org/advocacy/privacy/checklists/public-access-computer
 +
 
 +
Here's something I wrote about Tor Browser in libraries all the way back in 2015: https://digitalhumanities.library.cornell.edu/sites/default/files/u31/TorBrowser.pdf
 +
Some background on one of our early newsmaking victories: the Tor relay we set up in New Hampshire that DHS tried to shut down: https://slate.com/technology/2015/09/how-new-hampshire-s-lebanon-libraries-fought-back-against-dhs-fearmongering-about-tor.html https://www.theverge.com/2015/9/16/9341409/library-tor-encryption-privacy https://www.npr.org/sections/thetwo-way/2015/09/16/440848324/n-h-public-library-resumes-its-support-of-tor-network https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email
 +
https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources
 +
Equality labs anti-doxxing guide https://medium.com/@EqualityLabs/anti-doxing-guide-for-activists-facing-attacks-from-the-alt-right-ec6c290f543c
 +
Anti-doxxing link list https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources
 +
Downloading Tor Browser: https://www.torproject.org/
 +
Tor Browser and intellectual freedom in the digital age: https://digitalscholarship.library.cornell.edu/sites/default/files/u31/TorBrowser.pdf
 +
 
 +
EFF's digital security guide for protesting: https://ssd.eff.org/en/module/attending-protest
 +
Guide to locking down Signal: https://medium.com/@mshelton/locking-down-signal-d71678f653d3
 +
 
 +
 
 +
* protesting and doxing
  
 
==== Guest lecturer ====
 
==== Guest lecturer ====
Line 13: Line 27:
  
 
==== Discussion ====
 
==== Discussion ====
* Which of these strategies and tools have you tried and what was your experience?
 
  
 
==== Tasks ====
 
==== Tasks ====
* Lecture, readings, discussion forum, and final project work
 

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)