Editing Main Page/Teaching Resources
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
== Teaching Resources == | == Teaching Resources == | ||
− | Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy. | + | Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy. |
− | |||
− | |||
− | === | + | === General and multi-purpose teaching resources === |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
* [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | * [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit] | ||
* [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | * [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion] | ||
* [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | * [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense] | ||
− | * [https:// | + | * [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List] |
− | * | + | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney] |
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
=== Advertising === | === Advertising === | ||
Line 59: | Line 34: | ||
* [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | * [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept] | ||
* [https://www.eff.org/dice EFF's Diceware method and wordlist] | * [https://www.eff.org/dice EFF's Diceware method and wordlist] | ||
− | |||
=== Talking points === | === Talking points === | ||
Line 65: | Line 39: | ||
"If you have nothing to hide, you are nothing." - Shoshana Zuboff | "If you have nothing to hide, you are nothing." - Shoshana Zuboff | ||
+ | It's helpful to have a few privacy talking points on hand for informal teaching situations or everyday conversations. Below are sets of talking points created by participants in Library Freedom Institute. | ||
− | |||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown] | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones] | ||
Line 99: | Line 73: | ||
* [https://keepassxc.org/ KeePassXC password manager] | * [https://keepassxc.org/ KeePassXC password manager] | ||
* [https://authy.com/ Authy 2factor authentication app] | * [https://authy.com/ Authy 2factor authentication app] | ||
− | |||
* [https://www.yubico.com Yubikey 2factor authentication hardware] | * [https://www.yubico.com Yubikey 2factor authentication hardware] | ||
Line 107: | Line 80: | ||
* [https://www.torproject.org/ Tor Browser] | * [https://www.torproject.org/ Tor Browser] | ||
* [https://duckduckgo.com DuckDuckGo search engine] | * [https://duckduckgo.com DuckDuckGo search engine] | ||
− | |||
− | |||
− | |||
− | |||
− | |||
==== Texting and calling ==== | ==== Texting and calling ==== | ||
Line 117: | Line 85: | ||
==== Email ==== | ==== Email ==== | ||
− | + | ||
* [https://riseup.net/en/email Riseup email] | * [https://riseup.net/en/email Riseup email] | ||
* [https://emailselfdefense.fsf.org/en/ FSF's guide to GPG encryption for email] | * [https://emailselfdefense.fsf.org/en/ FSF's guide to GPG encryption for email] | ||
* [https://protonmail.com/ Protonmail secure email] | * [https://protonmail.com/ Protonmail secure email] | ||
− | |||
==== Third-party tracker blocking ==== | ==== Third-party tracker blocking ==== | ||
Line 127: | Line 94: | ||
* [https://www.eff.org/privacybadger Privacy Badger] | * [https://www.eff.org/privacybadger Privacy Badger] | ||
* [https://addons.mozilla.org/en-US/firefox/addon/lightbeam/ Lightbeam (not actually a blocker, just shows you what third-parties are tracking you] | * [https://addons.mozilla.org/en-US/firefox/addon/lightbeam/ Lightbeam (not actually a blocker, just shows you what third-parties are tracking you] | ||
− | |||
* [https://backstage.1blocker.com/say-hello-to-1blocker-x-8b55efe1ae36 1Blocker X for mobile] | * [https://backstage.1blocker.com/say-hello-to-1blocker-x-8b55efe1ae36 1Blocker X for mobile] | ||
* [https://www.ghostery.com/ Ghostery] | * [https://www.ghostery.com/ Ghostery] | ||
* [https://adblockplus.org/ AdBlock Plus] | * [https://adblockplus.org/ AdBlock Plus] | ||
* [https://disconnect.me/ Disconnect Me] | * [https://disconnect.me/ Disconnect Me] | ||
− | * | + | * |
==== Implementing HTTPS ==== | ==== Implementing HTTPS ==== | ||
Line 142: | Line 108: | ||
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | * [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy] | ||
+ | * [https://media.libreplanet.org/u/libreplanet/m/library-freedom-institute-a-new-hope/ Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones] | ||
* [https://sandbox.acrl.org/library-collection/thinking-about-digital-privacy-including-rewards-and-risks-convenience Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell] | * [https://sandbox.acrl.org/library-collection/thinking-about-digital-privacy-including-rewards-and-risks-convenience Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell] | ||
− | |||
=== Other presentation resources === | === Other presentation resources === |