Editing Main Page/Crash Courses/Programs and training/Week 4

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 4: Line 4:
  
 
==== Overview ====
 
==== Overview ====
This week we'll begin to discuss privacy tools and strategies, covering things like passwords, texting, email, browsers, mobile device security, really whatever we have time for. We'll talk through how different tools and strategies relate to various threat models and how the best practices might be the same or different, as well as the amount of friction and technical difficulty that users tend to experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture. We'll also review and discuss some of the privacy teaching resources out there, from LFP and beyond.
+
This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.
 +
 
 +
various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.  
  
 
==== Readings ====
 
==== Readings ====

Please note that all contributions to Library Freedom Wiki Page may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Library Freedom Wiki Page:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel Editing help (opens in new window)