Editing Main Page/Crash Courses/Programs and training/Week 2
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
=== Week 2: Threat modeling and privacy terms=== | === Week 2: Threat modeling and privacy terms=== | ||
− | * Real time lecture: October | + | * Real time lecture: October 11th, 12 - 2 pm Pacific/3 - 5 pm Eastern on Zoom https://zoom.us/j/9129428892 |
− | * Recording: | + | * Recording: |
− | * Slides: | + | * Slides: |
==== Overview ==== | ==== Overview ==== | ||
Line 14: | Line 14: | ||
==== Discussion board prompt ==== | ==== Discussion board prompt ==== | ||
* What threat models do you know exist in your community? Which ones resonate with you the most? How could you use threat modeling to make arguments in favor of privacy in your library? In what ways is the library an adversary or a potential adversary? | * What threat models do you know exist in your community? Which ones resonate with you the most? How could you use threat modeling to make arguments in favor of privacy in your library? In what ways is the library an adversary or a potential adversary? | ||
− | * Chat | + | * What takeaways do you have from the week one readings? |
+ | * Chat link: https://libraryfreedom.chat/t/cc-2-week-2-threat-modeling/876 | ||
==== Tasks ==== | ==== Tasks ==== | ||
* Lecture, readings, post to discussion board | * Lecture, readings, post to discussion board |