If you fill out the "Forgot Password" form but don't get an email to reset your password within 5-10 minutes, please email firstname.lastname@example.org for assistance.
Resource ID: #268
Source:Quinn Norton - 21Quinn Norton
This is an interactive workshop in digital security focused on what's called "Threat Modeling" in the computer security world -- understanding how the networks you use see you, and how to realistically defend against the most likely attacks. We'll cover some security tools and techniques, but we're focused on understanding the networked environment well enough to let you seek out tools and techniques suited to your situation. The workshop is in three parts. We'll begin by looking at the networks we use every day, how we relate to them, and how they are used by others. In the second part, we'll go over some real world examples of attacks, ranging from direct hacking, traffic analysis and implicit information, all the way to jurisdictional attacks such as subpoenas. Finally, we'll play through red team/blue team scenarios based on real world situations, to give a sense of choices and their consequence in a journalist's personal digital security.