Structures of the workshops
The workshops can be organized and structured in several ways. It can be only a one day theoretical workshop with few aspects on practices, or workshops can be organized with a mix between theory and practices from two to five days. It's also possible for NGO, University and else, to have a half day theory and to organize a practical session/cryptoparty on the evening, on the same day or on the day after. The schedule can be flexible in the aim to comply with the constraints of the journalists work and media schedules. Workshops can starts during the afternoon and end during the evening if needed. It can also be organize on Saturday and Sunday.
An important thing with the workshops that they have to be taken as the start of something, after to have follow a theoretical or practical workshop you must keep going using the tools you were using during the workshop, in your everyday life, especially when you don't need it. If you wait to have a situation which is sensitive enough to require to use anonymity or security tools, is quite risky… A good way to keep going using those tools and improve your knowledge of it is the organize or to participate in Cryptoparties in you area. You can find if some are organized in your city on the following website www.cryptoparty.in, on this website, you will as well find how to organize one.
WORHOPS KEWWORDS: METADATA – TOR – VPN – TAILS – PASSWORDS – GPG/PGP – VERACRYPT – ENCRYPTION – MOBILE SECURITY – BEHAVIORS – SOCIAL NETWORKS – ANONYMITY
Topics of the worshops
- Identify, manage or erase metadata (EXIF, PDF, Word, etc …) and securely delete information from most magnetic and SSD storage devices. More info: http://wiki.rsf.org/doku.php?id=en:remove_meta_data_from_your_files
- Learn how to surf anonymously and use TOR, protect and understand browser security, and certificates (SSL). More info: https://www.torproject.org/projects/torbrowser.html.enl & http://wiki.rsf.org/doku.php?id=en:secure_your_browsing
- Learn how to use TAILS (Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.. It can be start from a computer in an Internet cafe, for example). More info: https://tails.boum.org/about/index.en.html
- Passwords and multi-factor authentication also two-factor authentication, or two-step verification (how to choose a good password/paraphrase and enable multi-factor authentication whenever possible. Knowing how to use a password manager). More info: http://wiki.rsf.org/doku.php?id=en:digital_security_the_basics
- Understand and use a VPN (protect its communications, exchange of data, Ip address and browsing) and how to use Wifi from your laptop or your mobile devices in a safe way. More info: http://wiki.rsf.org/doku.php?id=en:vpn
- How to encrypt emails with GPG (understand the principle of public and private keys, and encrypted emails). More info: www.wefightcensorship.org/article/sending-encrypted-emails-using-thunderbird-and-pgphtml.html
- Encrypt your data with Verarypt (encrypt a USB key, memory card, or hard drive. Create encrypted volumes in your computer and understand the concept of plausible deniability). More info: http://wiki.rsf.org/doku.php?id=en:truecrypt
- Social Networks, Search Engines, and Social Engineering, how to decrease you digital fingerprint on Social Networks and Search Engines? What are the rules to remove content from Search Engine? What you digital fingerprint is telling about you? How to read and understand correctly digital information to avoid phishing or spear phishing attack? How to compartmentalize your information from one Social Network to another? Understanding the risks linked to the use of SNA (Social Network Analysis). Understanding the risk of using Social Connectors.
- Checking the Integrity of the security software, how to checks whether the signature file matches the source file (how to make sure that the software you're downloading was not replaced by one trapped with a trojan)
- Mobile Security what are the available tools to secure your communications and your files (voice, emails, files)? What are the limit of the Smartphones use, how it can be used to track you and which trace your Smartphone can host? What mean giving permissions to applications? How governments and private security company can track you conversations and your moves? What information you are giving by having a phone on you.