Difference between revisions of "Main Page/Teaching Resources"

From Library Freedom Wiki Page
Jump to navigation Jump to search
(created page)
 
(Anti-doxxing)
 
(47 intermediate revisions by 9 users not shown)
Line 1: Line 1:
TODO
+
== Teaching Resources ==
  
* Add existing presentations
+
Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.
* Add presentation resources like photos (with attribution) and LFI/LFP logos
+
 +
=== Setting up a teaching environment ===
 +
 
 +
==== Community agreements ====
 +
Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project.
 +
 
 +
* One Mic - Don’t talk over folks.
 +
* Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more!
 +
* Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester.
 +
* Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective.
 +
* Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it.
 +
* Land the plane - Have a point and make it. 
 +
 
 +
=== General and multi-purpose teaching resources ===
 +
* [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2021/09/PLP-Cybersecurity-Handbook_508-Compliant.pdf Data Privacy and Cybersecurity Best Practices Training: Train the trainers handbook]
 +
* [https://1gp3bd3nt4aa1f5uv53pfuu3-wpengine.netdna-ssl.com/wp-content/uploads/2020/10/PLP_Toolkit_Final-Accessibility-Modified.pdf Data Privacy Best Practices Toolkit for Libraries]
 +
* [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Glossary Privacy glossary]
 +
* [https://datadetox.myshadow.org/en/detox Tactical Technology Collective's 8-day Data Detox Kit]
 +
* [https://sec.eff.org Electronic Frontier Foundation's Security Education Companion]
 +
* [https://ssd.eff.org Electronic Frontier Foundation's Surveillance Self-Defense]
 +
* [https://www.fordfoundation.org/work/our-grants/building-institutions-and-networks/cybersecurity-assessment-tool/ Cybersecurity Assessment Tool]
 +
*  [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Kinney_2018_LFI_3.pdf Personal internet security slidedeck, M. Kinney]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/LFI%20Big%20Data.pdf Big Data slidedeck, M. Kinney]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/Compendium_of_creepy_things.pptx Slides of news stories about companies behaving badly, C. Lobdell]
 +
* [https://www.privacytools.io/ Privacy Tools - one stop shop for all tools listed below and a lot more]
 +
* [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_DigitalToolsBingo.pdf Privacy Tools Bingo Card, A. Puglisi]
 +
* [https://libguides.senylrc.org/PrivacyBasics Privacy libguide, C. Bennett Glauda]
 +
* [https://guides.masslibsystem.org/digital-privacy-and-technology LFP-MA & Mass Lib Association Digital Privacy LibGuide]
 +
 
 +
=== Anti-doxxing ===
 +
* [https://libraryfreedom.wiki/html/public_html/index.php/Main_Page/Teaching_Resources/Anti_Doxing_Resources Anti-Doxing Resource List]
 +
* [https://medium.com/@EqualityLabs/anti-doxing-guide-for-activists-facing-attacks-from-the-alt-right-ec6c290f543c Equality Labs anti-doxxing guide]
 +
* [https://hackblossom.org/cybersecurity/ HackBlossom DIY feminist cybersecurity]
 +
* [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFP_Digital%20Safety%20for%20Library%20Workers_AntiDoxxing.pptx Digital Safety for Library Workers: Prevention strategies & removing personal data from internet directories, A. Puglisi]
 +
* [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxing.png Digital Safety: AntiDoxing Bingo PNG] | [https://github.com/apuglibrarian/libraryfreedom/blob/master/LFPBingo_AntiDoxingpdf.pdf Digital Safety: AntiDoxing Bingo PDF, A. Puglisi]
 +
 
 +
=== Advertising ===
 +
 
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week16/Kinney_2018_LFI_16wk.pdf Slides for teaching a privacy class focused on digital advertising, M. Kinney]
 +
 
 +
=== Mobile privacy ===
 +
 
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week17/B.N.%20Jones%20LFI%20Week%2017.md Mobile privacy notes and slides, B.N. Jones]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week17/Brown_wk17.pdf Secure messaging curriculum, S. Brown]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week17/Kinney_2018_LFI_17wk.pdf Mobile device privacy slides, M. Kinney]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week17/Stone Week 17.pdf Secure messaging slides, J. Stone]
 +
 
 +
=== Passwords ===
 +
 
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Brown_wk3.pdf Password creating activity, S. Brown]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Lobdell_LFIWeek3_StrongPasswordsLesson.pdf Lesson plan for creating strong passwords, C. Lobdell]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/McElroy%20Week%203.pdf Zine about passwords and the diceware method, K. McElroy]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Mellon%20-%20diceware%20flyer.pdf Diceware password activity, A. Mellon]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Rebekah%20Eppley%20Assignment%203.docx Diceware password activity, R. Eppley]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week3/Stone%20Week%203.pdf Diceware password activity, J. Stone]
 +
* [https://theintercept.com/2015/03/26/passphrases-can-memorize-attackers-cant-guess/ Advice on password creation from The Intercept]
 +
* [https://www.eff.org/dice EFF's Diceware method and wordlist]
 +
*
 +
 
 +
=== Talking points ===
 +
 
 +
"If you have nothing to hide, you are nothing." - Shoshana Zuboff
 +
 
 +
 
 +
* [https://libraryfreedom.wiki/html/public_html/index.php?title=Main_Page/Teaching_Resources/Talking_points Privacy talking points by category]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Brown_wk4.pdf General big data/privacy talking points, S. Brown]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/B.N.%20Jones%20LFI%20Week%204.pdf Privacy technologies talking points, B.N. Jones]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Ethics%20of%20Big%20Data%20talking%20points_Lobdell.pdf Ethics of Big Data talking points, C. Lobdell]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Josh%20Stone%20Week%204%20Assignment.pdf Data, advertising, and you, J. Stone]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Kinney_2018_LFI_4wk.pdf General big data/privacy talking points, M. Kinney]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Lobdell_LFI%20week%204%20talking%20points.pdf Browsers, social media, and advertising talking points, C. Lobdell]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Mellon%20talking%20pts General big data/privacy talking points, A. Mellon]
 +
 
 +
=== Threat modeling ===
 +
 
 +
Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.
 +
 
 +
* [https://ssd.eff.org/en/module/your-security-plan Introduction to threat modeling and creating a security plan from EFF]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Josh%20Stone%20Threat%20Model%20Lesson%20Plan_Week%205.pdf Threat model teaching slides, J. Stone]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/McElroy%20Week%205.pdf A zine to teach about threat modeling, K. McElroy]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Ally%20Week%205.pdf Example threat model for immigrants, A. Mellon]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/B.N.%20Jones%20LFI%20Week%205.pdf Example threat model for union members with a grievance, B.N. Jones]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Brown_wk5.pdf Example threat model for LGBTQ youth, S. Brown]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Kinney_2018_LFI_5wk.pdf Example threat model for community college students, M. Kinney]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Lobdell_LFIweek5_threatmodel.pdf Example threat model for k-12 students in a Chromebook program, C. Lobdell]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week5/Social%20media%20privacy%20class%20-%20threat%20modeling.pptx Example threat model for a typical library patron with some cognitive challenges, S. White]
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/Rebekah%20Week%204%20Talking%20Points.docx General big data/privacy talking points, R. Eppley]
 +
 
 +
=== Download links to tools ===
 +
 
 +
These are trusted links to download some of our favorite privacy tools.
 +
 
 +
==== Password managers and 2fa tools ====
 +
 
 +
* [https://www.lastpass.com/ LastPass password manager]
 +
* [https://keepassxc.org/ KeePassXC password manager]
 +
* [https://authy.com/ Authy 2factor authentication app]
 +
* [https://freeotp.github.io/ FreeOTP cross platform, free software 2FA app]
 +
* [https://www.yubico.com Yubikey 2factor authentication hardware]
 +
 
 +
==== Web browsers and search engines ====
 +
 
 +
* [https://www.mozilla.org/en-US/firefox/new/ Firefox browser]
 +
* [https://www.torproject.org/ Tor Browser]
 +
* [https://duckduckgo.com DuckDuckGo search engine]
 +
 
 +
==== VPNs ====
 +
* [https://www.privateinternetaccess.com/ Private Internet Access]
 +
* [https://riseup.net/en/vpn Riseup VPN]
 +
* [https://phys.org/news/2019-02-vpn.html Is your VPN secure?]
 +
 
 +
==== Texting and calling ====
 +
* [https://www.signal.org/ Signal private messenger and calls]
 +
 
 +
==== Email ====
 +
* [https://www.fastmail.com/ Fastmail]
 +
* [https://riseup.net/en/email Riseup email]
 +
* [https://emailselfdefense.fsf.org/en/ FSF's guide to GPG encryption for email]
 +
* [https://protonmail.com/ Protonmail secure email]
 +
* [https://https://librem.one/ Librem Mail - requires subscription]
 +
 
 +
==== Third-party tracker blocking ====
 +
 
 +
* [https://www.eff.org/privacybadger Privacy Badger]
 +
* [https://addons.mozilla.org/en-US/firefox/addon/lightbeam/ Lightbeam (not actually a blocker, just shows you what third-parties are tracking you]
 +
* [https://github.com/gorhill/uBlock/ uBlock Origin - ad blocker that doesn't track you]
 +
* [https://backstage.1blocker.com/say-hello-to-1blocker-x-8b55efe1ae36 1Blocker X for mobile]
 +
* [https://www.ghostery.com/ Ghostery]
 +
* [https://adblockplus.org/ AdBlock Plus]
 +
* [https://disconnect.me/ Disconnect Me]
 +
* [https://themarkup.org/blacklight Blacklight]
 +
 
 +
==== Implementing HTTPS ====
 +
 
 +
* [https://letsencrypt.org/ Let's Encrypt project for setting up HTTPS on websites]
 +
* [https://certbot.eff.org/ CertBot client for Let's Encrypt]
 +
 
 +
=== Other teaching activities ===
 +
 
 +
* [https://github.com/alisonLFP/libraryfreedominstitute/blob/master/assignments/week4/McElroy%20Week%204.pdf Privacy nihilist/privacy vegan activity, K. McElroy]
 +
* [https://sandbox.acrl.org/library-collection/thinking-about-digital-privacy-including-rewards-and-risks-convenience Thinking about digital privacy: A 75-minute lesson plan including the debate activity 'The Rewards and Risks of Convenience,' C. Lobdell]
 +
* [https://media.libreplanet.org/u/libreplanet/m/library-freedom-institute-a-new-hope/ Library Freedom Project: A New Hope, an overview of goals and plans of LFI's first cohort, A. Macrina, B.N. Jones]
 +
 
 +
=== Other presentation resources ===
 +
 
 +
These are materials to help make create your own privacy presentations.
 +
 
 +
*[https://www.libreoffice.org/ LibreOffice - a full featured, free software office suite including presentation and vector graphics tools]
 +
*[https://github.com/hakimel/reveal.js/ Reveal.js - a framework for easily creating beautiful presentations using HTML]
 +
*[https://pad.riseup.net/ Riseup.net's Etherpad - create online, temporary, collaborative text docs]
 +
*[https://cryptpad.fr/ CryptPad - end to end encrypted cloud based office tools: etherpad, text editor, polls, project boards]

Latest revision as of 23:18, 29 November 2022

Teaching Resources[edit]

Some of these are resources created by members of Library Freedom Project, and some are trusted resources from around the privacy community. All of them will help you teach others about protecting their privacy.

Setting up a teaching environment[edit]

Community agreements[edit]

Community agreements help create a space where everyone feels comfortable learning and teaching. Here are the community agreements we use at Library Freedom Project.

  • One Mic - Don’t talk over folks.
  • Step up/step back - If you’re usually loud, consider listening. If you’re usually quiet, consider speaking more!
  • Oops/ouch - If you make a mistake or say something bad, it’s OK. Acknowledge the error, think about it, and move forward. We all make mistakes, but we only learn when we give feedback. As a corollary, if someone does something that hurts your feelings or is problematic/rude/etc., let them know immediately so they can apologize and learn. Don’t let something fester.
  • Try it on - You may think you have a strong reaction and fixed position, so try to push yourself to consider someone else’s perspective.
  • Make commitments - Don’t let something sit in the ether. If you propose to do something, bottom line it.
  • Land the plane - Have a point and make it.

General and multi-purpose teaching resources[edit]

Anti-doxxing[edit]

Advertising[edit]

Mobile privacy[edit]

Passwords[edit]

Talking points[edit]

"If you have nothing to hide, you are nothing." - Shoshana Zuboff


Threat modeling[edit]

Everyone has a different set of reasons for needing privacy. Threat modeling is a method of figuring out what tools and strategies are right for you and your situation. Below are some resources to help you learn about and teach threat modeling.

Download links to tools[edit]

These are trusted links to download some of our favorite privacy tools.

Password managers and 2fa tools[edit]

Web browsers and search engines[edit]

VPNs[edit]

Texting and calling[edit]

Email[edit]

Third-party tracker blocking[edit]

Implementing HTTPS[edit]

Other teaching activities[edit]

Other presentation resources[edit]

These are materials to help make create your own privacy presentations.