User Tools

Site Tools


tfp

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
tfp [2013-10-04 14:16] – [Tinfoil Hat Party] janetfp [2015-10-05 15:55] (current) – external edit 127.0.0.1
Line 1: Line 1:
-====== Tinfoil Hat Party ======+====== Tinfoil Hat Party #0 ======
  
 Overall goal: Increase capability of citizens to create privacy.\\ Overall goal: Increase capability of citizens to create privacy.\\
-Date: 2013-10-18\\ +Date: 2013-10-25\\ 
-Venue: Main room of the Edinb(not confirmedurgh Hacklab+Venue: Main room of the Edinburgh Hacklab\\ 
 +Next party: [[tfp1 |Tinfoil hat party #1]]
  
 ===== Intro ===== ===== Intro =====
Line 12: Line 13:
  
 First night: First night:
-  * Disclaimer: the tools presented in the workshop are only useful if the rest of the system is well protected, too. This means the system's security configuration as a whole should be fine-tuned against attackers. Communication is secure only as long as your partner employs the same level of paranoia. You're probably safe from a random thief, not NSA. (35 mins) - rsdy+  * Disclaimer: the tools presented in the workshop are only useful if the rest of the system is well protected, too. This means the system's security configuration as a whole should be fine-tuned against attackers. Communication is secure only as long as your partner employs the same level of paranoia. You're probably safe from a random thief, not NSA. (35 mins) - rhapsodhy
   * analyze e-mail headers to raise awareness(?).   * analyze e-mail headers to raise awareness(?).
-  * GPG janem+  * [[gnupg & Thunderbird]]Jane
   * Keysigning party!   * Keysigning party!
  
Line 30: Line 31:
  
   * Participants (max 10 people)    * Participants (max 10 people) 
-  * What OS is used +  * What OS is used to provide with the  
-  * Workshop hosts: rhapsodhy, Jane, Alex+  * Workshop hosts: rhapsodhy, Jane
   * Trainings material   * Trainings material
   * 3h   * 3h
Line 39: Line 40:
 We discussed to provide a workshop about disc encryption at the same evening. We discussed to provide a workshop about disc encryption at the same evening.
 The challenge here is, that on top of providing applicable training material about disc encryption, more resource are needed to get a neat USB sticks done. The challenge here is, that on top of providing applicable training material about disc encryption, more resource are needed to get a neat USB sticks done.
-I am not entirely sure if we have the capacity to do this on the first night. (Maybe an other go in Nov.)+I am not entirely sure if we have the capacity to do this on the first night. (Review and next planning IRC 2013-11-31)
 I am planning to limit the workshop content just to Thunderbird. I know there are x millions e-mail clients out there but I don't have the time to look into all of them. It might be the best to promote the event early and see if enough participants would go for this selection. I am planning to limit the workshop content just to Thunderbird. I know there are x millions e-mail clients out there but I don't have the time to look into all of them. It might be the best to promote the event early and see if enough participants would go for this selection.
  
Line 51: Line 52:
  
 Also I don't like this [[http://www.explainxkcd.com/wiki/index.php?title=177:_Alice_and_Bob | Alice and Bob story]], either this gets replaced with [[http://www.gutenberg.org/cache/epub/1112/pg1112.html |Romeo and Juliet]] or a famous homosexual couple. If you have a suggestions, feel free to share them. Also I don't like this [[http://www.explainxkcd.com/wiki/index.php?title=177:_Alice_and_Bob | Alice and Bob story]], either this gets replaced with [[http://www.gutenberg.org/cache/epub/1112/pg1112.html |Romeo and Juliet]] or a famous homosexual couple. If you have a suggestions, feel free to share them.
-I know everyone is in for NSA, but I am tired of that. The wish to have privacy was around before and will be after.+I know everyone is in for NSA, but I am tired of that. The wish to have privacy was around before and will be after.  
 +This includes as well the skill to access information. [[The Open Net Initiative |https://opennet.net/about-filtering]] outlines that here the wide range of reason why privacy can be interrupted. 
 We are not aware about the extend our private data is used for or against us but somehow this tech is also something we can hack and use for our purposes. (end of the bla bla part :)) We are not aware about the extend our private data is used for or against us but somehow this tech is also something we can hack and use for our purposes. (end of the bla bla part :))
  
 Anyway, maybe you have some ideas, how to hack ideas/misunderstandings/hopes about privacy. Anyway, maybe you have some ideas, how to hack ideas/misunderstandings/hopes about privacy.
  
-I am moving now for a few weeks to Germany. I am looking forward to catch you on IRC/Skype/Phone soonish. 
-This Sunday is the IRC meeting of the tin foil hat party at the lab IRC channel, please feel free to join in. 
  
 ===== Disk encryption/Encrypted storage ===== ===== Disk encryption/Encrypted storage =====
Line 68: Line 69:
  
 Part 2 should be based on the GPG part, for storing/sending/archiving data using GPG. Compare and contrast the usecases with using a symmetric algo for file storage. Part 2 should be based on the GPG part, for storing/sending/archiving data using GPG. Compare and contrast the usecases with using a symmetric algo for file storage.
 +
 +
 +==== Draft Tin foil hat party announcement ==== 
 +
 +The reason why we keep certain information private, when and to whom we disclose it, is a private choice.
 +The Edinburgh Hacklab hosts this month the first tin foil hat party to investigate together how you can hack your daily routine to limit access to this information (Yes, it is a cryptoparty.in with a hat).
 +
 +The event has three parts to it: talk and workshop require booking and are limited to seven to nine participants.
 +The last part is the key signing party, which is open to all and kicks of at 9pm. All parts of the event are free to attend. This is brought to you by regular membership fees and donations to the Hacklab. (Look a donate button :))
 +
 +Here is the agenda for the night:
 +Talk:
 +Disclaimer: the tools presented in the workshop are only useful if the rest of the system is well protected, too. This means the system's security configuration as a whole should be fine-tuned against attackers. Communication is secure only as long as your partner employs the same level of paranoia. You're probably safe from a random thief, not NSA. (35 mins)
 +
 +Workshop 2 1/2h:
 +Setting up a  GnuPG RSA 4096-bits key pair
 +Encrypt and decrypt e-mails using Thunderbird on your laptop. (This workshop does not cover e-mail clients installed on hand held devices. Consider it an e-mail client workshop like it's 2007. (Still interested in encrypt and decrypt files on Android? securityinabox.org/en/apg_main))
 +
 +Reference:
 +securityinabox.org/en/thunderbird_main
 +cryptoparty.in/documentation/handbook
 +
 +Here is what you need for the key signing party 
 +* Be there: physical attendance (with tin foil hat).
 +* Have your passport/national identity card (without hat).
 +* Have your key ID, key type, fingerprint, and key size. (Workshop participants -> We generate it on the day) 
 +
 +
 +Here some notes:
 +The timing of the event is not great for everyone. If you would like to attend this kind of event and can't make it, please contact us, we try to work something out. The Hacklab is located in Summerhall   http://edinburghhacklab.com/visit/. and accessible with a wheelchair http://www.summerhall.co.uk/about/accessibility/. As always does the anti-harassment policy apply for this event http://wiki.edinburghhacklab.com/antiharassment?s[]=anti&s[]=harassment.
 +
 +==== You would like to wear your tin foil hat at home? ==== 
 +
 +Some advice on how to bypass online censorship
 +http://en.flossmanuals.net/bypassing-censorship/ch004_quickstart-from-lg/
 +
 +==== Sticker idea ====
 +  * edinburghhacklab: tin foil hats, like it's 1984
 +  * edinburghhacklab: shared knowledge under one sheet 
 +  * edinburghhacklab: shared space/knowledge
 +  * edinburghhacklab: shared space, shared knowledge
 +
 +==== Thunderbird with Enigmail ==== 
 +
 +Thunderbird with Enigmail is available on all major OS platforms (Linux, Mac, Windows) and is therefore the most widely available. Install: 
 +
 +Alternative you become a customer and  (which can be used by Thunderbird). 
 + Start Thunderbird: 
 +Menu -> Internet -> Thunderbird 
 + Set up your new e-mail account in Thunderbird to use IMAP. (In the example, Yahoo Mail is used, but the method is the same for Gmail.) Make sure your firewall allows ports 993 (IMAP) and 465 (SMTP) and 11371 (HKP). 
 +Thunderbird -> file -> New -> Mail Account... -> (Enter Your name, Email address, Password) 
 +-> IMAP: Access folders and messages from multiple computers (ticked) -> Create Account 
 + Generate a new OpenPGP key pair: 
 +Thunderbird -> OpenPGP -> Key Management -> Generate -> New Key Pair -> (fill in desired passpharase, if any, and details) 
 + -> Advanced -> Key Size:4096-bits key -> Key type:  RSA  -> Generate key 
 + -> "We highly recommend to generate a revocation certificate for your key..." -> Generate Certificate 
 +This method will use pre-selected key servers stored in the default Thunderbird settings. If you wish to add selected key servers (such as keys.gnupg.net and keyserver.ubuntu.com): 
 +Thunderbird -> OpenPGP -> Preferences -> Keyserver -> Specify your keyserver(s): -> keys.gnupg.net, keyserver.ubuntu.com -> OK 
 + Turn off HTML in messages: 
 +Thunderbird -> (Email Account ID) -> Composition & Addressing -> Compose messages in HTML format (unticked) -> OK 
 + Send and sign encrypted email with your OpenPGP key. 
 +Thunderbird -> Write -> (compose message) -> OpenPGP -> Sign Message (ticked) -> Encrypt Message (ticked) -> Send
tfp.1380896178.txt.gz · Last modified: 2015-10-05 15:55 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki