Difference between revisions of "Main Page/Crash Courses/Programs and training/Week 4"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Readings)
Line 5: Line 5:
  
 
==== Overview ====
 
==== Overview ====
 +
 +
various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.
 +
 +
This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.
  
 
==== Readings ====
 
==== Readings ====
Line 15: Line 19:
  
 
https://www.ala.org/advocacy/intfreedom/librarybill
 
https://www.ala.org/advocacy/intfreedom/librarybill
 +
 +
https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources
 +
 +
    Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
 +
    Browse through EFF's Surveillance Self-Defense: ssd.eff.org
 +
    Browse through EFF's Security Education Companion: sec.eff.org
 +
 +
    EFF's digital security guide for protesting: https://ssd.eff.org/en/module/attending-protest
 +
    Guide to locking down Signal: https://medium.com/@mshelton/locking-down-signal-d71678f653d3
  
 
==== Discussion ====
 
==== Discussion ====

Revision as of 16:01, 1 October 2021

Week 4: Privacy tools and strategies 101

Overview

various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.

This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.

Readings

library privacy values in this week -- how is your library measuring up

https://www.ala.org/tools/ethics

https://www.ala.org/advocacy/intfreedom/corevalues

https://www.ala.org/advocacy/intfreedom/librarybill

https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources

   Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
   Browse through EFF's Surveillance Self-Defense: ssd.eff.org
   Browse through EFF's Security Education Companion: sec.eff.org
   EFF's digital security guide for protesting: https://ssd.eff.org/en/module/attending-protest
   Guide to locking down Signal: https://medium.com/@mshelton/locking-down-signal-d71678f653d3

Discussion

Link:

Tasks

  • Lecture, readings, discussion forum, and final project work