If you can't read please download the document
Upload
surendran-balachandran
View
453
Download
0
Embed Size (px)
Citation preview
2. Why CryptoParty/Cryptography? When mass surveillance and data mining define our online lives, privacy and data protection acquire a whole new meaning. Citizens should be empowered to take informed decisions and resist such surveillance. 3. Some tools Lightbeam To visualise how third parties track you when you access any website.Browser extensions Do Not Track Me, HTTPSEverywhereAnonymous Browsing TOR BrowserEncrypted Emails Thunderbird / PGPPassword Management KeepassSecure Operating Systems TAILS 4. User Google's datacenter Internet 5. https://www.eff.org/https-everywhere 6. Do Not Track Me www.abine.com 7. Do Not Track Me www.abine.com 8. TOR Browser www.torproject.org 9. TOR Browser www.torproject.org Things to watch out for while using TOR Internet speed might be reducedWebsites ask you to authenticate againThe last loop is unsecure 10. Encrypted Emails How emails work 11. Encrypted Emails 12. Encrypted Emails Things you need Email Client (Thunderbird // Claws etc)OpenPGP Steps to Encrypted EmailsSetup your email clientGenerate your public and private keyPublish your private key, if you prefer to.Encrypt outgoing emails using the receipients' public keyDecrypt incoming emails using your own private key 13. Thank you Presentation by Surendran (@surendranb)