Differences
This shows you the differences between two versions of the page.
connect:resources [2020/07/16 04:30] – old revision restored (2016/02/02 15:59) 127.0.0.1 | connect:resources [2022/05/08 11:42] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 3: | Line 3: | ||
====== Resources ====== | ====== Resources ====== | ||
- | We are working on multi language resources like Slides, Guides and Flyers in order to make Cryptoparty more accessible to people that are not native English speakers or would prefer the resources in their own language. | + | We are working on multi language |
Here are some links to the resources made by our community which can be used below: | Here are some links to the resources made by our community which can be used below: | ||
- | ^ Link ^ Comment ^ | + | ^ Link |
- | | [[https:// | + | | [[https:// |
- | | [[https:// | + | | [[https:// |
- | | [[https:// | + | | [[https:// |
- | | [[https:// | + | | [[https:// |
- | | [[https:// | + | | [[https:// |
+ | | [[https:// | ||
+ | |||
+ | \\ | ||
==== old stuff below ==== | ==== old stuff below ==== | ||
Line 54: | Line 58: | ||
Committee to Protect Journalists [[http:// | Committee to Protect Journalists [[http:// | ||
- | //Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. | + | //Your emphasis should be on simplicity. There’s no point in surrounding yourself with computer security that you don’t use, or that fails to address a weaker link elsewhere. Take advantage of what you know well: the people who are most likely to take offense or otherwise target your work, and what they may be seeking to obtain or disrupt. Use that knowledge to determine what you need to protect and how. Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, |
- | + | ||
- | Ask yourself: What information should I protect? What data is valuable to me or a potential adversary? It might not be what you think of at first. Many journalists feel that what they are doing is largely transparent, | + | |
===== Kerckhoffs' | ===== Kerckhoffs' | ||
Line 78: | Line 80: | ||
===== Why there is no 100% anonymity ===== | ===== Why there is no 100% anonymity ===== | ||
- | * **People make mistakes** | + | * **People make mistakes** |
* **Behavior can be analyzed** | * **Behavior can be analyzed** | ||
* **Behavior can be correlated** | * **Behavior can be correlated** | ||
* You have to connect somehow. Everything between your body and **your means of anonymity is exposed**. (e.g if you're using tor, // | * You have to connect somehow. Everything between your body and **your means of anonymity is exposed**. (e.g if you're using tor, // | ||
* Some **offline threat** | * Some **offline threat** | ||
+ | |||
+ | \\ | ||