Information Security for Radicals Workshop

Date/Time: 
Sat, 07/06/2013 - 2:00pm - 5:00pm
Location: 
The Teardown
80 Mayson Ave NE
Atlanta, GA
United States

The government is watching.  No matter who you are, the NSA is intercepting and storing all of your electronic communications.  Phone calls, emails, txts, web browsing, and more.

Hackers and privacy activists have warned about this for years, but the NSA documents leaked by Edward Snowden are forcing all of us to confront the reality: we have no rights on the network.

Don't despair!  The government won't grant you privacy, but you can still have it if you're willing to fight for it.  In order to fight, you have to learn about the network, about the tools available to you, and how to use them.  There's a lot to learn, but with help from each other, we can figure it out.

This is a workshop, not a training - there won't neccesarily be one instructor presenting a lesson to everyone else.  Instead, we will all help each other learn, install and use secure communication tools.

We want to learn and teach about things like:

  • Being more anonymous online
  • Sending encrypted (secret) messages
  • Avoiding and resisting censorship
  • How network surveillance works


* Whether you just got your first computer or are a veteran hacker, all levels of experience are welcome.

* If you have a portable computer and/or a smartphone, please bring it.

 

Contact: marlon {a) riseup .net

Comments

Re: Information Security for Radicals Workshop

@7:12

I mispoke, I meant the password used to decrypt the harddrive encryption key/GPG private key/etc, not the encryption key itself.

I agree that this doesn't matter in the case of a "man in the middle" (spying ISP for example), in the case of a seized computer, the decryption password for an encrypted drive or the decryption password for one's GPG private key is very important.

Re: Information Security for Radicals Workshop

RE: comment on encryption being only as strong as the key length

While key length is important, the actual cipher used is a much bigger factor. I can set up a long DES key, but if you're using DES, your encryption isn't strong. Comparatively, an equal length AES key would be much stronger. 

This has nothing to do with setting passwords, as most passwords get hashed when they are stored, and hashing any password is going to produce the same length digest. 

Unfortunately I'm unable to make it to this on Saturday - I'll be out of town - but I'll keep my eye out for the next meeting. 

Re: Information Security for Radicals Workshop

@1:07

One's encryption is only as strong as one's encryption key though,... something to keep in mind when setting your passwords.


@2:44

In the interest of information security though, I would recommend avoiding closed-source software whenever possible/practical (since closed-source software cannot be reviewed for backdoors and other security flaws by your peers like free/open source software can.)

So rather than learning photoshop, try learning Gimp instead. Rather than play or mod closed-source games, try free/open source alternatives.

Re: Information Security for Radicals Workshop

http://www.wired.com/threatlevel/2013/06/encryption-foiled-wiretaps/

NSA reports  being unable to detect encrypted info

Re: Information Security for Radicals Workshop

I wish I could go to this, but alas, I have to work. I will go to the next one if I can!

For those who are motivated to do more, here are some fun ways to learn more about computers and their many uses:

  • play videogames (and if possible mod them!)
  • pirate software (maybe a videogame or two)
  • learn Photoshop (perhaps a pirated copy, double wammy)
  • learn a code language
  • learn how to animate
  • scan your hand-drawn artwork (perhaps for sale or just to have digital copies)
  • sell stuff online (that you've made or scrounged, perhaps)

A less than fun way is to intentionally organize your computer files so that everything is in a neat and tidy place. If computers seem like hostile aliens to you, this is a good way to make them a bit more familiar.

Always remember most of your computer problems can be googled for troubleshooting. Doing this yourself is the best way to learn in my experience but having someone to help you is always nice.

glhf

So stoked

Marlon,

I'm very excited for this to be happening! I hope that everyone interested and available attends. It's so important.

Re: Information Security for Radicals Workshop

The idea is that if there is enough interest, this will be a recurring event.  There's far too much to learn in one session anyway, and the security situation is always changing.  We need to make this kind of study a continuous practice.

Re: Information Security for Radicals Workshop

I sooo want to come but cant make this round can you schedule another for a couple months out or can you set up another to do it one on one?