Cryptoparty2

From Technologia Incognita
Jump to: navigation, search
Cryptoparty2
Date 2012/12/03
Time
Location ACTA
Type Workshop
Contact User:DrWhax

Cryptoparty #2

What is a cryptoparty

A cryptoparty is a place to learn more about security, privacy and anonymity online, we have small sessions through out the entire evening to see what people want to learn, think mobile security, how do I securely encrypt files, how can I be anonymous on the internet (facebook/google, is the root of all evil, not to speak about capitalism.) and much more. We have music, drinks, snacks and crypto, what else do we need?


Agenda

  • Introduction by DrWhax 19:00
  • Introduction to cryptography, computing, anonymity and privacy - Arjen Kamphuis 19:10 - short why/howto and links:http://gendo.nl/en/content/secure-comms - slides used:http://pres.gendo.nl/cryptoparty.pdf -
  • Hands-on session by installing tools people are interested in. Think Tor, Truecrypt, Tomb, GnuPG.
  • A small session about vpn's on the other side of the room.

Signup list


If you don't want to be listed on the wiki, you can email to; cryptoparty@techinc.nl! There is a signup list so we have an average numbers of people and decide if we need to buy more drinks/snacks.

 "Privacy is the power to selectively reveal oneself to the world."
	- Cypherpunk Manifesto, 1993.

    Data retention, wiretapping, interception, stalking.. Make it 
    really f&*^ing hard for them!

    -----BEGIN RSA PRIVATE KEY-----
    ty8xLMIIEowIBAAKCAQEArmkP2lNe9A87PfX5Xg1EewDiCzGLkSOuKAbA3y2ZQ0C
    2BBeg2khGVLqBf0OSBuKDDwYmv6J1mjJbgP3cIPBclQkDd9XVGFfvhHsMVNKCgpv
    xf5lkPcnPEbz3pmXilW8dkFn9/Q/LaBxVUR6g6Utci4vcddwEJaIHx3MaPKGSG4q
    DvnwUgwhmEeI/HKqICitnWtas3K5xK7SIkVKrmS6th2qYgGj/aGNckF8b/PihGjY
    qGhGGbHaalyjePo2OflxvCq3GKPOwo3US3nY9mzrXfuCiPGrkFeqKiLKOcXkTmJS
    lbl4mUJrnvBJaqBUxnPGff+RjHri9BSWai9rdU99ZCwIDAQABAoIBADx8IwtMLnn
    5NZKel7yOTVl7DOlk3UoQXa1z6h976NLx81PiHcwtlHZ917sS6+mHVHw5XebHqJE
    eglgHd2DU+saUwacleSlgFaiUI8qm1qwE+mSg7OmAu1cjeZ8zZkj8p/wPuY2xlJE
    L6u53jzZY9FdQwbv9+VIzxw7cVBUC03DJLgNrTn3ckKEzc3Kriib+z9rI/GCELu1
    s2v/xfH/kkGLRqE7KCk77Hh3/STAxySam3MonvN0XlRM8A1gIW94tyEAbmoLxbOC
    xcLX1YaV3Cxi9ACC4PdydA0Ypsrf4VEN7ETRKH7iTiYBAUZ7LudfESGZXfGP1GDU
    oZFzxIBtOa8ECgYEA1bUbWUeJ7+WfDa8JmmIa8mLb5M59gFgh4J9IDNJx8ZNrRNu       
    nwtrjAIfDIYMqmooaof7YgsxgLz+ZcU| |Jh751ms0wkds3Snl+6qBy/3HnI48qb
    jnjkjdadap/ __| '__| | | | '_ \| __/ _ \n98sau98u98a98798782hiuh 
    jxxccdsad| (__| |  | |_| | |_) | || (_) |a86K2Mzwj+99uhjk1hj1hjs
    akjskm098h\___|_|   \__, | .__/ \__\___/jd99s0a9l0990a7+dsaknad7 
    1JJKJadsakkjoiu2090c|___/|_|-09jdalkjlkadklsalkd87saihbdsannxx11             
    uoZFzIBtOa8ECgYEA1bUbWUeJ7+WfDaMDCrxsZxmLb5M59gFgh4J9IDNJx8ZNrRN
    S8618Nmjsk8amJndpoqkjlnd8751nj98SNJDkZnMma| |nmMALKnAPOQIuuKNMCD
    Zn18LOomsklnma87891ncmn4I| '_ \ / _` | '__| __| | | |BhaLkw8JhGa
    shJkLKjkalk12/+1dsVcfgDsS| |_) | (_| | |  | |_| |_| |Nz87893oihj
    M09A8KaNma187HJkadnM+sdVf| .__/ \__,_|_|   \__|\__, |10Kla+4lsdN
    cmMN1Janbsd82HgdfG81445Mn|_|0Kla/sHaj243676HaK1|___/aZdhjkaZ817d
    tUY1xI/zRRZvw88GajezKm3oiRjdppiLVqSwYG6NRkoZvGkTUUljq60klkjee+5T
    OTGIrldw2/YfI5iDMCvo0yBJVhv28XCIqy3Bd3JlXO+ygwlCqvrSuMDI8uE6KW07
    tDvEidtFmkr/sMAxxhACu0zqd5wKBgQCV3ruJpUh6zYNtWbj8efLChRHA+wCXwJi
    kFgFlBYMK407EIyQmLFh4PzwWsN7AXghCAwKnRiBIsshx0xuvW4Erbr1PaUicKLj
    fuREsMg698TmZum4kdCxwg5Q0AzpEdlyW98PR7gLSwj6EmkslgGcnyChFvtnCMEP
    f61M+u/JgkQKBgB5KCUjrVMG8xicZ+zUTGchOCzlzV+zWvpLbO/slxCIhi+aLMWP
    t+je5KTbXzpyjxoAWN9Pw0/LxQLxXsgtipa1WEpdKguviNChiXuqOMlo9Ie0Ou9R
    NCKCs6eiK6xijeZiBDFVcWF4dVThM1lkiWw394ovn7BdAJ1BOAMF06ZK1/bJWZgW
    A0O0UAIfDIYMqmooaof7YgsxgLz+ZcUvFk33Snl+6qBy/3HnI48qbnwtrjE8CgYE
    +XdpuUwlEzwuv5xD1eDqh0Y9/yE7yAmcHlsrdWcFAtyzFNU9lUE/M+AEoAGtIV/r
    LzVI2G18ZduTfbK/kXxZatpamEgPAudc/HrwkkdkxJzDuG5nDM4U
    -----END RSA PRIVATE KEY-----

    What happens?

        We're going to install and use

            Online anonymity tools 
            Secure communication tools using, SSH, SSL, OpenVPN, GnuPG, Tor
            Steganography tools (hide data in other data) 

	Music will be heard, drinks will be drunk
    
    Where?

    http://wiki.techinc.nl/index.php/ACTA

    Hosts? 

	Technologia Incognita

    When?

        December 3rd, 7pm till late

    Bring?

        0. Laptop, usbsticks, tablet and/or fancy phone