Difference between revisions of "Main Page/Crash Courses/Programs and training/Week 4"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(Discussion)
Line 5: Line 5:
  
 
==== Overview ====
 
==== Overview ====
 +
This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.
  
 
various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.  
 
various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.  
 
This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.
 
  
 
==== Readings ====
 
==== Readings ====
 
+
* Read through EFF's Surveillance Self-Defense: ssd.eff.org
library privacy values in this week -- how is your library measuring up
+
* Read through EFF's Security Education Companion: sec.eff.org
 
+
* Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
https://www.ala.org/tools/ethics
+
* Browse through LFP's teaching resources: https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources
 
 
https://www.ala.org/advocacy/intfreedom/corevalues
 
 
 
https://www.ala.org/advocacy/intfreedom/librarybill
 
 
 
https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources
 
 
 
    Browse through Tactical Technology Collective's Data Detox Kit: https://datadetox.myshadow.org/en/home
 
    Browse through EFF's Surveillance Self-Defense: ssd.eff.org
 
    Browse through EFF's Security Education Companion: sec.eff.org
 
  
 
==== Discussion ====
 
==== Discussion ====
    Which of these strategies and tools have you tried and what was your experience?
+
* Which of these strategies and tools have you tried and what was your experience?
 
Link:
 
Link:
  
 
==== Tasks ====  
 
==== Tasks ====  
* Lecture, readings, discussion forum, and final project work
+
* Lecture, readings, and discussion forum. Check in with Alison if you want to do a final project!

Revision as of 15:54, 19 October 2021

Week 4: Privacy tools and strategies 101

Overview

This week we'll discuss privacy tools and strategies, covering mobile device security, passwords, texting, email, browsers, and whatever else we have time for (we'll continue our conversation on privacy tools next week as well). We'll be focusing mainly on how each of these tools apply to the protestor threat model, but we'll also talk through some other threat models and how the recommendations might be the same or different.

various privacy tools that solve different problems, and will discuss the threat models that might find each tool relevant, as well as the amount of friction and technical difficulty that users often experience with each tool. Those in the cohort who are already teaching privacy are invited to talk about their experiences with these tools, as well as their preferred privacy tools that aren't covered in the lecture.

Readings

Discussion

  • Which of these strategies and tools have you tried and what was your experience?

Link:

Tasks

  • Lecture, readings, and discussion forum. Check in with Alison if you want to do a final project!