Difference between revisions of "Cryptoparty2"
(→Agenda) |
|||
(9 intermediate revisions by 7 users not shown) | |||
Line 3: | Line 3: | ||
|Location=ACTA, | |Location=ACTA, | ||
|EventType=Workshop | |EventType=Workshop | ||
− | |Contact=DrWhax, | + | |Contact=User:DrWhax, |
}} | }} | ||
Cryptoparty #2 | Cryptoparty #2 | ||
Line 9: | Line 9: | ||
= What is a cryptoparty = | = What is a cryptoparty = | ||
A cryptoparty is a place to learn more about security, privacy and anonymity online, we have small sessions through out the entire evening to see what people want to learn, think mobile security, how do I securely encrypt files, how can I be anonymous on the internet (facebook/google, is the root of all evil, not to speak about capitalism.) and much more. We have music, drinks, snacks and crypto, what else do we need? | A cryptoparty is a place to learn more about security, privacy and anonymity online, we have small sessions through out the entire evening to see what people want to learn, think mobile security, how do I securely encrypt files, how can I be anonymous on the internet (facebook/google, is the root of all evil, not to speak about capitalism.) and much more. We have music, drinks, snacks and crypto, what else do we need? | ||
+ | |||
= Agenda = | = Agenda = | ||
− | * | + | * Introduction by DrWhax 19:00 |
+ | * Introduction to cryptography, computing, anonymity and privacy - Arjen Kamphuis 19:10 - short why/howto and links:http://gendo.nl/en/content/secure-comms - slides used:http://pres.gendo.nl/cryptoparty.pdf - | ||
* Hands-on session by installing tools people are interested in. Think Tor, Truecrypt, Tomb, GnuPG. | * Hands-on session by installing tools people are interested in. Think Tor, Truecrypt, Tomb, GnuPG. | ||
* A small session about vpn's on the other side of the room. | * A small session about vpn's on the other side of the room. | ||
+ | |||
* Propose your own initiative! Contact [[User:DrWhax]] | * Propose your own initiative! Contact [[User:DrWhax]] | ||
= Signup list = | = Signup list = | ||
* [[User:DrWhax]] | * [[User:DrWhax]] | ||
+ | * [[User:ultratux]] | ||
+ | * [[User:the_JinX]] | ||
+ | * Stefania | ||
+ | * [[User:Reese]] | ||
+ | |||
If you don't want to be listed on the wiki, you can email to; cryptoparty@techinc.nl! There is a signup list so we have an average numbers of people and decide if we need to buy more drinks/snacks. | If you don't want to be listed on the wiki, you can email to; cryptoparty@techinc.nl! There is a signup list so we have an average numbers of people and decide if we need to buy more drinks/snacks. | ||
Line 85: | Line 93: | ||
When? | When? | ||
− | December | + | December 3rd, 7pm till late |
Bring? | Bring? |
Latest revision as of 20:51, 3 December 2012
Cryptoparty2 | |
---|---|
Date | 2012/12/03 |
Time | |
Location | ACTA |
Type | Workshop |
Contact | User:DrWhax |
Cryptoparty #2
What is a cryptoparty
A cryptoparty is a place to learn more about security, privacy and anonymity online, we have small sessions through out the entire evening to see what people want to learn, think mobile security, how do I securely encrypt files, how can I be anonymous on the internet (facebook/google, is the root of all evil, not to speak about capitalism.) and much more. We have music, drinks, snacks and crypto, what else do we need?
Agenda
- Introduction by DrWhax 19:00
- Introduction to cryptography, computing, anonymity and privacy - Arjen Kamphuis 19:10 - short why/howto and links:http://gendo.nl/en/content/secure-comms - slides used:http://pres.gendo.nl/cryptoparty.pdf -
- Hands-on session by installing tools people are interested in. Think Tor, Truecrypt, Tomb, GnuPG.
- A small session about vpn's on the other side of the room.
- Propose your own initiative! Contact User:DrWhax
Signup list
- User:DrWhax
- User:ultratux
- User:the_JinX
- Stefania
- User:Reese
If you don't want to be listed on the wiki, you can email to; cryptoparty@techinc.nl! There is a signup list so we have an average numbers of people and decide if we need to buy more drinks/snacks.
"Privacy is the power to selectively reveal oneself to the world." - Cypherpunk Manifesto, 1993. Data retention, wiretapping, interception, stalking.. Make it really f&*^ing hard for them! -----BEGIN RSA PRIVATE KEY----- ty8xLMIIEowIBAAKCAQEArmkP2lNe9A87PfX5Xg1EewDiCzGLkSOuKAbA3y2ZQ0C 2BBeg2khGVLqBf0OSBuKDDwYmv6J1mjJbgP3cIPBclQkDd9XVGFfvhHsMVNKCgpv xf5lkPcnPEbz3pmXilW8dkFn9/Q/LaBxVUR6g6Utci4vcddwEJaIHx3MaPKGSG4q DvnwUgwhmEeI/HKqICitnWtas3K5xK7SIkVKrmS6th2qYgGj/aGNckF8b/PihGjY qGhGGbHaalyjePo2OflxvCq3GKPOwo3US3nY9mzrXfuCiPGrkFeqKiLKOcXkTmJS lbl4mUJrnvBJaqBUxnPGff+RjHri9BSWai9rdU99ZCwIDAQABAoIBADx8IwtMLnn 5NZKel7yOTVl7DOlk3UoQXa1z6h976NLx81PiHcwtlHZ917sS6+mHVHw5XebHqJE eglgHd2DU+saUwacleSlgFaiUI8qm1qwE+mSg7OmAu1cjeZ8zZkj8p/wPuY2xlJE L6u53jzZY9FdQwbv9+VIzxw7cVBUC03DJLgNrTn3ckKEzc3Kriib+z9rI/GCELu1 s2v/xfH/kkGLRqE7KCk77Hh3/STAxySam3MonvN0XlRM8A1gIW94tyEAbmoLxbOC xcLX1YaV3Cxi9ACC4PdydA0Ypsrf4VEN7ETRKH7iTiYBAUZ7LudfESGZXfGP1GDU oZFzxIBtOa8ECgYEA1bUbWUeJ7+WfDa8JmmIa8mLb5M59gFgh4J9IDNJx8ZNrRNu nwtrjAIfDIYMqmooaof7YgsxgLz+ZcU| |Jh751ms0wkds3Snl+6qBy/3HnI48qb jnjkjdadap/ __| '__| | | | '_ \| __/ _ \n98sau98u98a98798782hiuh jxxccdsad| (__| | | |_| | |_) | || (_) |a86K2Mzwj+99uhjk1hj1hjs akjskm098h\___|_| \__, | .__/ \__\___/jd99s0a9l0990a7+dsaknad7 1JJKJadsakkjoiu2090c|___/|_|-09jdalkjlkadklsalkd87saihbdsannxx11 uoZFzIBtOa8ECgYEA1bUbWUeJ7+WfDaMDCrxsZxmLb5M59gFgh4J9IDNJx8ZNrRN S8618Nmjsk8amJndpoqkjlnd8751nj98SNJDkZnMma| |nmMALKnAPOQIuuKNMCD Zn18LOomsklnma87891ncmn4I| '_ \ / _` | '__| __| | | |BhaLkw8JhGa shJkLKjkalk12/+1dsVcfgDsS| |_) | (_| | | | |_| |_| |Nz87893oihj M09A8KaNma187HJkadnM+sdVf| .__/ \__,_|_| \__|\__, |10Kla+4lsdN cmMN1Janbsd82HgdfG81445Mn|_|0Kla/sHaj243676HaK1|___/aZdhjkaZ817d tUY1xI/zRRZvw88GajezKm3oiRjdppiLVqSwYG6NRkoZvGkTUUljq60klkjee+5T OTGIrldw2/YfI5iDMCvo0yBJVhv28XCIqy3Bd3JlXO+ygwlCqvrSuMDI8uE6KW07 tDvEidtFmkr/sMAxxhACu0zqd5wKBgQCV3ruJpUh6zYNtWbj8efLChRHA+wCXwJi kFgFlBYMK407EIyQmLFh4PzwWsN7AXghCAwKnRiBIsshx0xuvW4Erbr1PaUicKLj fuREsMg698TmZum4kdCxwg5Q0AzpEdlyW98PR7gLSwj6EmkslgGcnyChFvtnCMEP f61M+u/JgkQKBgB5KCUjrVMG8xicZ+zUTGchOCzlzV+zWvpLbO/slxCIhi+aLMWP t+je5KTbXzpyjxoAWN9Pw0/LxQLxXsgtipa1WEpdKguviNChiXuqOMlo9Ie0Ou9R NCKCs6eiK6xijeZiBDFVcWF4dVThM1lkiWw394ovn7BdAJ1BOAMF06ZK1/bJWZgW A0O0UAIfDIYMqmooaof7YgsxgLz+ZcUvFk33Snl+6qBy/3HnI48qbnwtrjE8CgYE +XdpuUwlEzwuv5xD1eDqh0Y9/yE7yAmcHlsrdWcFAtyzFNU9lUE/M+AEoAGtIV/r LzVI2G18ZduTfbK/kXxZatpamEgPAudc/HrwkkdkxJzDuG5nDM4U -----END RSA PRIVATE KEY----- What happens? We're going to install and use Online anonymity tools Secure communication tools using, SSH, SSL, OpenVPN, GnuPG, Tor Steganography tools (hide data in other data) Music will be heard, drinks will be drunk Where? http://wiki.techinc.nl/index.php/ACTA Hosts? Technologia Incognita When? December 3rd, 7pm till late Bring? 0. Laptop, usbsticks, tablet and/or fancy phone