Cryptoparties

Get Started. It's Free
or sign up with your email address
Cryptoparties by Mind Map: Cryptoparties

1. Topics

1.1. Why security and privacy education matters

1.1.1. Post Snowden era

1.1.1.1. Snowden

1.1.1.2. Wikileaks

1.1.2. Kevin Mitnick overview

1.2. Software

1.2.1. VPN and privacy online

1.2.2. Web Browser choices

1.2.2.1. Firefox (Custom config)

1.2.2.2. Opera

1.2.2.3. TOR

1.2.3. Server tools

1.2.3.1. Let's encrypt

1.2.3.2. Linux distributions

1.2.4. Advanced tools

1.2.4.1. PGN

1.2.4.2. TOR

1.2.5. Best practices

1.2.5.1. Saftware updated

1.2.5.2. Strong passwords

1.2.5.3. Security Checklist for online navigation

1.3. Hardware

1.3.1. USB and hard drives

1.3.1.1. Encrypted drives

1.3.2. Vulnerable Hardware

1.3.2.1. Outdated firmware

1.3.2.2. Computer cameras

1.3.2.3. Voice assistants

1.3.2.4. Routers

1.3.2.5. IoT

1.4. Cloud services

1.4.1. About corporate policies

1.4.1.1. Google, FB and other american companies

1.4.1.2. About safe-countries companies

1.4.2. Email service selection

1.4.3. Cloud storage selection

1.5. Web allies

1.5.1. Mozilla

1.5.2. Creative Commons

1.5.3. EFF

1.5.4. Apache foundation

1.5.5. Automattic

1.5.5.1. Wordpress

1.5.6. EC Council

1.5.6.1. ECH

1.5.7. Internet Foundation

1.5.8. Internet society

1.5.9. W3C

1.5.10. ISRG

2. Guest list

2.1. Journalists

2.2. Librarians

2.3. Activist

2.4. IT Teachers

2.5. IT people (Novice)