<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=B01</id>
		<title>Gender and Tech Resources - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://gendersec.tacticaltech.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=B01"/>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php/Special:Contributions/B01"/>
		<updated>2026-05-03T09:37:55Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.26.2</generator>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9115</id>
		<title>Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9115"/>
				<updated>2017-06-19T14:09:36Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2017/01/27&lt;br /&gt;
|End when ?=2017/01/29&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=-0.8627452999999999, -80.5299541&lt;br /&gt;
|Who organize it=Fundacion Causana&lt;br /&gt;
|organisation(s) website=http://www.causana.org/&lt;br /&gt;
|For whom is it organized=Lesbianas y personas trans viviendo en Ecuador&lt;br /&gt;
|How many people trained=80&lt;br /&gt;
|Motivations for organizing training=Entre del 27 al 29 de enero de 2017, en el pueblo de Crucita provincia de Manabí, nos encontramos kuerpas diversas venidas desde varias ciudades del Ecuador: Tulcán, Ibarra, Cuenca, Quito, Loja, Guayaquil, Pasaje, Quevedo, Riobamba, Manta, Portoviejo, Santa Ana y kuerpas nómadas de Alemania, Colombia y Venezuela que bajo la consigna de KUERPAS SOBERANAS trabajamos, discutimos, cuestionamos y compartimos experiencias y aprendizajes sobre derechos, salud, espacios públicos, realidades locales, incidencia, organización, autodefensa digital, arte disidente, música, poesía, risas, diversión y placer ...&lt;br /&gt;
&lt;br /&gt;
El 7mo. Encuentro LBT feminista fue una jornada maravillosa.  Quedamos fortalecidxs y nos llevamos nuevos retos para continuar, entre todxs, la lucha por una vida digna y equitativa!&lt;br /&gt;
&lt;br /&gt;
Gracias a lxs compas que facilitaron los diferentes talleres y actividades.&lt;br /&gt;
&lt;br /&gt;
Ibarra nos espera para el 8vo. Encuentro LBT!&lt;br /&gt;
|Topics addressed=seguridad digital, privacidad, lesbianismo, trans, sororidad&lt;br /&gt;
|Links about the activity=http://www.causana.org/2017/02/07/las-voces-del-7mo-encuentro-lbt-feminista-de-ecuador/&lt;br /&gt;
http://www.causana.org/2017/01/31/7mo-encuentro-lesbitrans-feminista-del-ecuador/&lt;br /&gt;
|Upload content=7mo-encuentro.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9113</id>
		<title>Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9113"/>
				<updated>2017-06-19T13:07:57Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2017/01/27&lt;br /&gt;
|End when ?=2017/01/29&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=39° 28' 11&amp;quot;, -0° 22' 35&amp;quot;&lt;br /&gt;
|Who organize it=Fundacion Causana&lt;br /&gt;
|organisation(s) website=http://www.causana.org/&lt;br /&gt;
|For whom is it organized=Lesbianas y personas trans viviendo en Ecuador&lt;br /&gt;
|How many people trained=80&lt;br /&gt;
|Motivations for organizing training=Entre del 27 al 29 de enero de 2017, en el pueblo de Crucita provincia de Manabí, nos encontramos kuerpas diversas venidas desde varias ciudades del Ecuador: Tulcán, Ibarra, Cuenca, Quito, Loja, Guayaquil, Pasaje, Quevedo, Riobamba, Manta, Portoviejo, Santa Ana y kuerpas nómadas de Alemania, Colombia y Venezuela que bajo la consigna de KUERPAS SOBERANAS trabajamos, discutimos, cuestionamos y compartimos experiencias y aprendizajes sobre derechos, salud, espacios públicos, realidades locales, incidencia, organización, autodefensa digital, arte disidente, música, poesía, risas, diversión y placer ...&lt;br /&gt;
&lt;br /&gt;
El 7mo. Encuentro LBT feminista fue una jornada maravillosa.  Quedamos fortalecidxs y nos llevamos nuevos retos para continuar, entre todxs, la lucha por una vida digna y equitativa!&lt;br /&gt;
&lt;br /&gt;
Gracias a lxs compas que facilitaron los diferentes talleres y actividades.&lt;br /&gt;
&lt;br /&gt;
Ibarra nos espera para el 8vo. Encuentro LBT!&lt;br /&gt;
|Topics addressed=seguridad digital, privacidad, lesbianismo, trans, sororidad&lt;br /&gt;
|Links about the activity=http://www.causana.org/2017/02/07/las-voces-del-7mo-encuentro-lbt-feminista-de-ecuador/&lt;br /&gt;
http://www.causana.org/2017/01/31/7mo-encuentro-lesbitrans-feminista-del-ecuador/&lt;br /&gt;
|Upload content=7mo-encuentro.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9112</id>
		<title>Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9112"/>
				<updated>2017-06-19T13:05:00Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2017/01/27&lt;br /&gt;
|End when ?=2017/01/29&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=-0.8709762801336776, -80.53227424621582&lt;br /&gt;
|Who organize it=Fundacion Causana&lt;br /&gt;
|organisation(s) website=http://www.causana.org/&lt;br /&gt;
|For whom is it organized=Lesbianas y personas trans viviendo en Ecuador&lt;br /&gt;
|How many people trained=80&lt;br /&gt;
|Motivations for organizing training=Entre del 27 al 29 de enero de 2017, en el pueblo de Crucita provincia de Manabí, nos encontramos kuerpas diversas venidas desde varias ciudades del Ecuador: Tulcán, Ibarra, Cuenca, Quito, Loja, Guayaquil, Pasaje, Quevedo, Riobamba, Manta, Portoviejo, Santa Ana y kuerpas nómadas de Alemania, Colombia y Venezuela que bajo la consigna de KUERPAS SOBERANAS trabajamos, discutimos, cuestionamos y compartimos experiencias y aprendizajes sobre derechos, salud, espacios públicos, realidades locales, incidencia, organización, autodefensa digital, arte disidente, música, poesía, risas, diversión y placer ...&lt;br /&gt;
&lt;br /&gt;
El 7mo. Encuentro LBT feminista fue una jornada maravillosa.  Quedamos fortalecidxs y nos llevamos nuevos retos para continuar, entre todxs, la lucha por una vida digna y equitativa!&lt;br /&gt;
&lt;br /&gt;
Gracias a lxs compas que facilitaron los diferentes talleres y actividades.&lt;br /&gt;
&lt;br /&gt;
Ibarra nos espera para el 8vo. Encuentro LBT!&lt;br /&gt;
|Topics addressed=seguridad digital, privacidad, lesbianismo, trans, sororidad&lt;br /&gt;
|Links about the activity=http://www.causana.org/2017/02/07/las-voces-del-7mo-encuentro-lbt-feminista-de-ecuador/&lt;br /&gt;
http://www.causana.org/2017/01/31/7mo-encuentro-lesbitrans-feminista-del-ecuador/&lt;br /&gt;
|Upload content=7mo-encuentro.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9111</id>
		<title>Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9111"/>
				<updated>2017-06-19T13:01:40Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2017/01/27&lt;br /&gt;
|End when ?=2017/01/29&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Who organize it=Fundacion Causana&lt;br /&gt;
|organisation(s) website=http://www.causana.org/&lt;br /&gt;
|For whom is it organized=Lesbianas y personas trans viviendo en Ecuador&lt;br /&gt;
|How many people trained=80&lt;br /&gt;
|Motivations for organizing training=Entre del 27 al 29 de enero de 2017, en el pueblo de Crucita provincia de Manabí, nos encontramos kuerpas diversas venidas desde varias ciudades del Ecuador: Tulcán, Ibarra, Cuenca, Quito, Loja, Guayaquil, Pasaje, Quevedo, Riobamba, Manta, Portoviejo, Santa Ana y kuerpas nómadas de Alemania, Colombia y Venezuela que bajo la consigna de KUERPAS SOBERANAS trabajamos, discutimos, cuestionamos y compartimos experiencias y aprendizajes sobre derechos, salud, espacios públicos, realidades locales, incidencia, organización, autodefensa digital, arte disidente, música, poesía, risas, diversión y placer ...&lt;br /&gt;
&lt;br /&gt;
El 7mo. Encuentro LBT feminista fue una jornada maravillosa.  Quedamos fortalecidxs y nos llevamos nuevos retos para continuar, entre todxs, la lucha por una vida digna y equitativa!&lt;br /&gt;
&lt;br /&gt;
Gracias a lxs compas que facilitaron los diferentes talleres y actividades.&lt;br /&gt;
&lt;br /&gt;
Ibarra nos espera para el 8vo. Encuentro LBT!&lt;br /&gt;
|Topics addressed=seguridad digital, privacidad, lesbianismo, trans, sororidad&lt;br /&gt;
|Links about the activity=http://www.causana.org/2017/02/07/las-voces-del-7mo-encuentro-lbt-feminista-de-ecuador/&lt;br /&gt;
http://www.causana.org/2017/01/31/7mo-encuentro-lesbitrans-feminista-del-ecuador/&lt;br /&gt;
|Upload content=7mo-encuentro.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9110</id>
		<title>Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Taller_Autodefensa_Digital,_Encuentro_LBT_Feminista,_Ecuador&amp;diff=9110"/>
				<updated>2017-06-19T13:00:54Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Taller Autodefensa Digital, Encuentro LBT Feminista, Ecuador&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2017/01/27&lt;br /&gt;
|End when ?=2017/01/29&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=Country&lt;br /&gt;
|Geo-localization of the activity ?=-0.86218818937893, -80.524635314941&lt;br /&gt;
|Who organize it=Fundacion Causana&lt;br /&gt;
|organisation(s) website=http://www.causana.org/&lt;br /&gt;
|For whom is it organized=Lesbianas y personas trans viviendo en Ecuador&lt;br /&gt;
|How many people trained=80&lt;br /&gt;
|Motivations for organizing training=Entre del 27 al 29 de enero de 2017, en el pueblo de Crucita provincia de Manabí, nos encontramos kuerpas diversas venidas desde varias ciudades del Ecuador: Tulcán, Ibarra, Cuenca, Quito, Loja, Guayaquil, Pasaje, Quevedo, Riobamba, Manta, Portoviejo, Santa Ana y kuerpas nómadas de Alemania, Colombia y Venezuela que bajo la consigna de KUERPAS SOBERANAS trabajamos, discutimos, cuestionamos y compartimos experiencias y aprendizajes sobre derechos, salud, espacios públicos, realidades locales, incidencia, organización, autodefensa digital, arte disidente, música, poesía, risas, diversión y placer ...&lt;br /&gt;
&lt;br /&gt;
El 7mo. Encuentro LBT feminista fue una jornada maravillosa.  Quedamos fortalecidxs y nos llevamos nuevos retos para continuar, entre todxs, la lucha por una vida digna y equitativa!&lt;br /&gt;
&lt;br /&gt;
Gracias a lxs compas que facilitaron los diferentes talleres y actividades.&lt;br /&gt;
&lt;br /&gt;
Ibarra nos espera para el 8vo. Encuentro LBT!&lt;br /&gt;
|Topics addressed=seguridad digital, privacidad, lesbianismo, trans, sororidad&lt;br /&gt;
|Links about the activity=http://www.causana.org/2017/02/07/las-voces-del-7mo-encuentro-lbt-feminista-de-ecuador/&lt;br /&gt;
http://www.causana.org/2017/01/31/7mo-encuentro-lesbitrans-feminista-del-ecuador/&lt;br /&gt;
|Upload content=7mo-encuentro.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=la agenda de trabajo contempló los siguientes temas: Marco jurídico y ejercicio de derechos; salud sexual lésbica; kuerpas disientes y espacio público; autodefensa digital; arte como expresión de contracultura (serigrafía, poesía, música); gordofobia.&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8553</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8553"/>
				<updated>2016-09-16T12:29:30Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;bloc-news&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Some news and update about our Gender and Technology Institute in Ecuador can be found here : https://gendersec.tacticaltech.org/wiki/index.php/Gender_and_Technology_Institute,_Ecuador&lt;br /&gt;
* You can view a very nice TV Show by Luchadoras about the GTI in Ecuador here : https://frama.link/Luchadoras-GTI-on-Youtube&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8552</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8552"/>
				<updated>2016-09-14T18:12:08Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Some news and update about our Gender and Technology Institute in Ecuador can be found here : https://gendersec.tacticaltech.org/wiki/index.php/Gender_and_Technology_Institute,_Ecuador&lt;br /&gt;
* You can view a very nice TV Show by Luchadoras about the GTI in Ecuador here : https://frama.link/Luchadoras-GTI-on-Youtube&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8551</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8551"/>
				<updated>2016-09-14T18:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Some news and update about our Gender and Technology Institute in Ecuador can be found here : https://gendersec.tacticaltech.org/wiki/index.php/Gender_and_Technology_Institute,_Ecuador&lt;br /&gt;
* You can view a very nice TV Show by Luchadoras about the GTI in Ecuador here (youtube)  : https://frama.link/Luchadoras-GTI-on-Youtube&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8550</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8550"/>
				<updated>2016-09-14T18:02:20Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* Some news and update about our Gender and Technology Institute in Ecuador can be found here : https://gendersec.tacticaltech.org/wiki/index.php/Gender_and_Technology_Institute,_Ecuador&lt;br /&gt;
* You can view a very nice TV Show by Luchadoras about the GTI in Ecuador here (youtube)  : https://frama.link/Luchadoras-on-Youtube&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8420</id>
		<title>Workshop Digital security, Tech sans Violence, RDC</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8420"/>
				<updated>2016-07-29T13:42:29Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Workshop on digital security for the Tech without violence day&lt;br /&gt;
|Category=Digital Security&lt;br /&gt;
|Start when ?=2015/12/08&lt;br /&gt;
|End when ?=2015/12/10&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Geo-localization of the activity ?=-0.4829632, 15.893622400000027&lt;br /&gt;
|Who organize it=Si jeunesse savait&lt;br /&gt;
|organisation(s) website=https://www.facebook.com/feministes/&lt;br /&gt;
|For whom is it organized=WHRD, HRD&lt;br /&gt;
|How many people trained=25&lt;br /&gt;
|Upload content=Sijeunessesavait.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8419</id>
		<title>Workshop Digital security, Tech sans Violence, RDC</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8419"/>
				<updated>2016-07-29T13:38:50Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Workshop on digital security for the Tech without violence day&lt;br /&gt;
|Category=Digital Security&lt;br /&gt;
|Start when ?=2015/12/08&lt;br /&gt;
|End when ?=2015/12/10&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Geo-localization of the activity ?=-0.228021, 15.82765900000004&lt;br /&gt;
|Who organize it=Si jeunesse savait&lt;br /&gt;
|organisation(s) website=https://www.facebook.com/feministes/&lt;br /&gt;
|For whom is it organized=WHRD, HRD&lt;br /&gt;
|How many people trained=25&lt;br /&gt;
|Upload content=Sijeunessesavait.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8418</id>
		<title>Workshop Digital security, Tech sans Violence, RDC</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Workshop_Digital_security,_Tech_sans_Violence,_RDC&amp;diff=8418"/>
				<updated>2016-07-29T13:37:07Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Workshop on digital security for the Tech without violence day&lt;br /&gt;
|Category=Digital Security&lt;br /&gt;
|Start when ?=2015/12/08&lt;br /&gt;
|End when ?=2015/12/10&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Geo-localization of the activity ?=-0.228021, 15.827659&lt;br /&gt;
|Who organize it=Si jeunesse savait&lt;br /&gt;
|organisation(s) website=https://www.facebook.com/feministes/&lt;br /&gt;
|For whom is it organized=WHRD, HRD&lt;br /&gt;
|How many people trained=25&lt;br /&gt;
|Upload content=Sijeunessesavait.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation}}&lt;br /&gt;
{{Learning outcomes}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8266</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8266"/>
				<updated>2016-07-14T18:46:44Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* '''GTI in Ecuador''' in june, link will comme ...&lt;br /&gt;
* A new resource to avoid electromagnetic fields [https://gendersec.tacticaltech.org/wiki/index.php/Funda_de_Faraday_para_el_tel%C3%A9fono_m%C3%B3vil here]&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8265</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8265"/>
				<updated>2016-07-14T18:41:30Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&amp;lt;p class=&amp;quot;welcome-msg&amp;quot;&amp;gt;''Welcome to this wiki about &amp;quot;Securing Online and Offline Freedoms for Women : Expression, Privacy and Digital Inclusion&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* ''''GTI in Ecuador''' in june, link will comme ...&lt;br /&gt;
* A new resource to avoid [[Funda de Faraday para el teléfono móvil|electromagnetic fields]] &lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8264</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8264"/>
				<updated>2016-07-14T18:05:08Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&amp;lt;p class=&amp;quot;welcome-msg&amp;quot;&amp;gt;''Welcome to this wiki about &amp;quot;Securing Online and Offline Freedoms for Women : Expression, Privacy and Digital Inclusion&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageActualities|align=left|title=Actualities|&lt;br /&gt;
* '''Actu 1''' :  GTI in Ecudaor&lt;br /&gt;
* '''Actu 2''' : Ecochonis are back&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Template:MainPageActualities&amp;diff=8263</id>
		<title>Template:MainPageActualities</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Template:MainPageActualities&amp;diff=8263"/>
				<updated>2016-07-14T18:04:32Z</updated>
		
		<summary type="html">&lt;p&gt;B01: Created page with &amp;quot;&amp;lt;div class=&amp;quot;large-12 columns mainpage-half-block-wrapper&amp;quot; style=&amp;quot;float:{{{align}}}&amp;quot;&amp;gt;     &amp;lt;div class=&amp;quot;mainpage-block-title&amp;quot;&amp;gt; =={{{title}}}==     &amp;lt;/div&amp;gt;     &amp;lt;div class=&amp;quot;mainpage...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;large-12 columns mainpage-half-block-wrapper&amp;quot; style=&amp;quot;float:{{{align}}}&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div class=&amp;quot;mainpage-block-title&amp;quot;&amp;gt;&lt;br /&gt;
=={{{title}}}==&lt;br /&gt;
    &amp;lt;/div&amp;gt;&lt;br /&gt;
    &amp;lt;div class=&amp;quot;mainpage-block-body&amp;quot;&amp;gt;{{{1}}}&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;[[Category:Model page format]]&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8262</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Main_Page&amp;diff=8262"/>
				<updated>2016-07-14T18:00:05Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ __NOEDITSECTION__&lt;br /&gt;
&amp;lt;p class=&amp;quot;welcome-msg&amp;quot;&amp;gt;''Welcome to this wiki about &amp;quot;Securing Online and Offline Freedoms for Women : Expression, Privacy and Digital Inclusion&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Actualities|&lt;br /&gt;
* '''Actu 1''' :  GTI in Ecudaor&lt;br /&gt;
* '''Actu 2''' : Ecochonis are back&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Activities|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Activities&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Activities| All the activities ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Activities|Create a new activity !]][[Form:Activities/es| Crear una nueva actividad !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;tutorials&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Tutorials|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Tutorials&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Tutorials| All the tutorials ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Tutorial|Create a new tutorial !]][[Form:Tutorial/es|Crear una nueva tutorial !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;storytelling&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=Storytelling|&lt;br /&gt;
* [[A feminist internet and its reflection on privacy, security, policy and violence against Women]]&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = Storytelling&lt;br /&gt;
count = 3&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:Storytelling| All the storytelling ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Form:Storytelling|Create a new storytelling !]] [[Form:Storytelling/es|Crear una nueva storytelling !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;howtos&amp;quot;&amp;gt;&lt;br /&gt;
{{HalfMainPageBlock|align=left|title=How To's|&lt;br /&gt;
&amp;lt;DynamicPageList&amp;gt;&lt;br /&gt;
category = How To&lt;br /&gt;
count = 4&lt;br /&gt;
&amp;lt;/DynamicPageList&amp;gt;&lt;br /&gt;
* [[:Category:How To| All the how to ...]]&lt;br /&gt;
----&lt;br /&gt;
* [[Page:Create a new how to|Create a new how to !]][[Page:Crear un nuevo how to|Crear un nuevo how to !]]&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;activities-map&amp;quot;&amp;gt;&lt;br /&gt;
{{MainPageMap|align=left|title=Activities Map|&lt;br /&gt;
{{&lt;br /&gt;
#ask:&lt;br /&gt;
[[Geo-localization of the activity::+]]&lt;br /&gt;
| ?Geo-localization of the activity&lt;br /&gt;
| format=leaflet&lt;br /&gt;
| layers=osm-mapnik&lt;br /&gt;
}}&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8163</id>
		<title>Digital security workshop - Les Degommeuses</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8163"/>
				<updated>2016-07-04T14:01:20Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/06/04&lt;br /&gt;
|End when ?=2016/06/04&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Geo-localization of the activity ?=48.85449836511, 2.4359497055411&lt;br /&gt;
|Who organize it=Les Dégommeuses&lt;br /&gt;
|organisation(s) website=http://www.lesdegommeuses.org/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/LesDegommeuses&lt;br /&gt;
|For whom is it organized=LGBT refugees from various african countries :  Zimbabwe, Malawi, Zambia, Nigeria, Libya, Uganda,&lt;br /&gt;
|How many people trained=12&lt;br /&gt;
|Motivations for organizing training=&amp;quot;Les Dégommeuses&amp;quot; is a french NGO devoted to inclusive process threw women and sport, they invited a dozen of LGBT refugees from various african countries, one part of the project was to hold this workshop about digital security to increase the level of privacy and anonymity for those activists&lt;br /&gt;
|Topics addressed=Digital security and privacy with a gender focus, feminist approaches to tech, alternative emails, Software Libre, mobile security, safe space, online identities,&lt;br /&gt;
|Links about the activity=https://gendersec.tacticaltech.org/wiki/index.php/Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/simplonco/status/735848385538850818&lt;br /&gt;
|Upload content=LesdegommeusesDigitalSecurity.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=Program :&lt;br /&gt;
* Issues about Security, Privacy, Anonymity&lt;br /&gt;
* Mapping activities and risks&lt;br /&gt;
* Draw your tech day&lt;br /&gt;
* Ask yourself good questions&lt;br /&gt;
* Secure your devices and data&lt;br /&gt;
* What is Internet ?&lt;br /&gt;
* How the data are circulating in the network&lt;br /&gt;
* Reduce your digital shadow&lt;br /&gt;
* Use emails in a safer way&lt;br /&gt;
* Preserve your anonymity, circumvent censorship&lt;br /&gt;
* Social network, safe space, online identities&lt;br /&gt;
* Téléphone mobile / intelligent&lt;br /&gt;
* Specific questions&lt;br /&gt;
* Good practices, a synthesis&lt;br /&gt;
* Identifying good resources&lt;br /&gt;
|Methodologies for training=Methods&lt;br /&gt;
# Sharing Issues about Security, Privacy, Anonymity&lt;br /&gt;
# Mapping activities and risks&lt;br /&gt;
# Understand when / where / how data are exchanged, stored&lt;br /&gt;
# Practical methods to reduce our digital shadow, increase our anonymity&lt;br /&gt;
|Existing toolkits and resources=Good ressources&lt;br /&gt;
* Security in a box https://securityinabox.org/ &lt;br /&gt;
* Me and my shadow https://myshadow.org/&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual &lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ... &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
|Gender and tech tutorials used=Holistic security - A day in your life, Holistic security - Self care, Threat analysis - Information Mapping I,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=too short !&lt;br /&gt;
|Feedbacks=good&lt;br /&gt;
|START=adjust the level of practical content, theoretical content, methodology aspects&lt;br /&gt;
|STOP=giving too much details on how internet works&lt;br /&gt;
|KEEP=the mix between personal histories, anecdotes, facts at a world scale, and the content of the workshop by itself&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8144</id>
		<title>Digital security workshop - Les Degommeuses</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8144"/>
				<updated>2016-06-27T16:58:17Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/06/04&lt;br /&gt;
|End when ?=2016/06/04&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Geo-localization of the activity ?=48.85449836511, 2.4359497055411&lt;br /&gt;
|Who organize it=Les Dégommeuses&lt;br /&gt;
|organisation(s) website=http://www.lesdegommeuses.org/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/LesDegommeuses&lt;br /&gt;
|For whom is it organized=LGBT refugees from various african countries :  Zimbabwe, Malawi, Zambia, Nigeria, Libya, Uganda,&lt;br /&gt;
|How many people trained=12&lt;br /&gt;
|Motivations for organizing training=&amp;quot;Les Dégommeuses&amp;quot; is a french NGO devoted to inclusive process threw women and sport, they invited a dozen of LGBT refugees from various african countries, one part of the project was to hold this workshop about digital security to increase the level of privacy and anonymity for those activists&lt;br /&gt;
|Topics addressed=Digital security and privacy with a gender focus, feminist approaches to tech, alternative emails, Software Libre, mobile security, safe space, online identities,&lt;br /&gt;
|Links about the activity=https://gendersec.tacticaltech.org/wiki/index.php/Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/simplonco/status/735848385538850818&lt;br /&gt;
|Upload content=LesdegommeusesDigitalSecurity.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=* Issues about Security, Privacy, Anonymity&lt;br /&gt;
* Mapping activities and risks&lt;br /&gt;
* Draw your tech day&lt;br /&gt;
* Ask yourself good questions&lt;br /&gt;
* Secure your devices and data&lt;br /&gt;
* What is Internet ?&lt;br /&gt;
* How the data are circulating in the network&lt;br /&gt;
* Reduce your digital shadow&lt;br /&gt;
* Use emails in a safer way&lt;br /&gt;
* Preserve your anonymity, circumvent censorship&lt;br /&gt;
* Social network, safe space, online identities&lt;br /&gt;
* Téléphone mobile / intelligent&lt;br /&gt;
* Specific questions&lt;br /&gt;
* Good practices, a synthesis&lt;br /&gt;
* Identifying good resources&lt;br /&gt;
|Methodologies for training=# Sharing Issues about Security, Privacy, Anonymity&lt;br /&gt;
# Mapping activities and risks&lt;br /&gt;
# Understand when / where / how data are exchanged, stored&lt;br /&gt;
# Practical methods to reduce our digital shadow, increase our anonymity&lt;br /&gt;
|Existing toolkits and resources=* Security in a box https://securityinabox.org/ &lt;br /&gt;
* Me and my shadow https://myshadow.org/&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual &lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ... &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
|Gender and tech tutorials used=Holistic security - A day in your life, Holistic security - Self care, Threat analysis - Information Mapping I,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=too short !&lt;br /&gt;
|Feedbacks=good&lt;br /&gt;
|START=adjust the level of practical content, theoretical content, methodology aspects&lt;br /&gt;
|STOP=giving too much details on how internet works&lt;br /&gt;
|KEEP=the mix between personal histories, anecdotes, facts at a world scale, and the content of the workshop by itself&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8143</id>
		<title>Digital security workshop - Les Degommeuses</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8143"/>
				<updated>2016-06-27T16:33:49Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/06/04&lt;br /&gt;
|End when ?=2016/06/04&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Geo-localization of the activity ?=48.8544983651096, 2.435949705541134&lt;br /&gt;
|Who organize it=Les Dégommeuses&lt;br /&gt;
|organisation(s) website=http://www.lesdegommeuses.org/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/LesDegommeuses&lt;br /&gt;
|For whom is it organized=LGBT refugees from various african countries :  Zimbabwe, Malawi, Zambia, Nigeria, Libya, Uganda,&lt;br /&gt;
|How many people trained=12&lt;br /&gt;
|Motivations for organizing training=&amp;quot;Les Dégommeuses&amp;quot; is a french NGO devoted to inclusive process threw women and sport, they invited a dozen of LGBT refugees from various african countries, one part of the project was to hold this workshop about digital security to increase the level of privacy and anonymity for those activists&lt;br /&gt;
|Topics addressed=Digital security and privacy with a gender focus, feminist approaches to tech, alternative emails, Software Libre, mobile security, safe space, online identities,&lt;br /&gt;
|Links about the activity=https://gendersec.tacticaltech.org/wiki/index.php/Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/simplonco/status/735848385538850818&lt;br /&gt;
|Upload content=LesdegommeusesDigitalSecurity2.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=* Issues about Security, Privacy, Anonymity&lt;br /&gt;
* Mapping activities and risks&lt;br /&gt;
* Draw your tech day&lt;br /&gt;
* Ask yourself good questions&lt;br /&gt;
* Secure your devices and data&lt;br /&gt;
* What is Internet ?&lt;br /&gt;
* How the data are circulating in the network&lt;br /&gt;
* Reduce your digital shadow&lt;br /&gt;
* Use emails in a safer way&lt;br /&gt;
* Preserve your anonymity, circumvent censorship&lt;br /&gt;
* Social network, safe space, online identities&lt;br /&gt;
* Téléphone mobile / intelligent&lt;br /&gt;
* Specific questions&lt;br /&gt;
* Good practices, a synthesis&lt;br /&gt;
* Identifying good resources&lt;br /&gt;
|Methodologies for training=# Sharing Issues about Security, Privacy, Anonymity&lt;br /&gt;
# Mapping activities and risks&lt;br /&gt;
# Understand when / where / how data are exchanged, stored&lt;br /&gt;
# Practical methods to reduce our digital shadow, increase our anonymity&lt;br /&gt;
|Existing toolkits and resources=* Security in a box https://securityinabox.org/ &lt;br /&gt;
* Me and my shadow https://myshadow.org/&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual &lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ... &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
|Gender and tech tutorials used=Holistic security - A day in your life, Holistic security - Self care, Threat analysis - Information Mapping I,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=too short !&lt;br /&gt;
|Feedbacks=good&lt;br /&gt;
|START=adjust the level of practical content, theoretical content, methodology aspects&lt;br /&gt;
|STOP=giving too much details on how internet works&lt;br /&gt;
|KEEP=the mix between personal histories, anecdotes, facts at a world scale, and the content of the workshop by itself&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8142</id>
		<title>Digital security workshop - Les Degommeuses</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8142"/>
				<updated>2016-06-27T16:31:50Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/06/04&lt;br /&gt;
|End when ?=2016/06/04&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Geo-localization of the activity ?=48.863776059093844, 2.4485430121421814&lt;br /&gt;
|Who organize it=Les Dégommeuses&lt;br /&gt;
|organisation(s) website=http://www.lesdegommeuses.org/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/LesDegommeuses&lt;br /&gt;
|For whom is it organized=LGBT refugees from various african countries :  Zimbabwe, Malawi, Zambia, Nigeria, Libya, Uganda,&lt;br /&gt;
|How many people trained=12&lt;br /&gt;
|Motivations for organizing training=&amp;quot;Les Dégommeuses&amp;quot; is a french NGO devoted to inclusive process threw women and sport, they invited a dozen of LGBT refugees from various african countries, one part of the project was to hold this workshop about digital security to increase the level of privacy and anonymity for those activists&lt;br /&gt;
|Topics addressed=Digital security and privacy with a gender focus, feminist approaches to tech, alternative emails, Software Libre, mobile security, safe space, online identities,&lt;br /&gt;
|Links about the activity=https://gendersec.tacticaltech.org/wiki/index.php/Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/simplonco/status/735848385538850818&lt;br /&gt;
|Upload content=LesdegommeusesDigitalSecurity2.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=* Issues about Security, Privacy, Anonymity&lt;br /&gt;
* Mapping activities and risks&lt;br /&gt;
* Draw your tech day&lt;br /&gt;
* Ask yourself good questions&lt;br /&gt;
* Secure your devices and data&lt;br /&gt;
* What is Internet ?&lt;br /&gt;
* How the data are circulating in the network&lt;br /&gt;
* Reduce your digital shadow&lt;br /&gt;
* Use emails in a safer way&lt;br /&gt;
* Preserve your anonymity, circumvent censorship&lt;br /&gt;
* Social network, safe space, online identities&lt;br /&gt;
* Téléphone mobile / intelligent&lt;br /&gt;
* Specific questions&lt;br /&gt;
* Good practices, a synthesis&lt;br /&gt;
* Identifying good resources&lt;br /&gt;
|Methodologies for training=# Sharing Issues about Security, Privacy, Anonymity&lt;br /&gt;
# Mapping activities and risks&lt;br /&gt;
# Understand when / where / how data are exchanged, stored&lt;br /&gt;
# Practical methods to reduce our digital shadow, increase our anonymity&lt;br /&gt;
|Existing toolkits and resources=* Security in a box https://securityinabox.org/ &lt;br /&gt;
* Me and my shadow https://myshadow.org/&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual &lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ... &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
|Gender and tech tutorials used=Holistic security - A day in your life, Holistic security - Self care, Threat analysis - Information Mapping I,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=too short !&lt;br /&gt;
|Feedbacks=good&lt;br /&gt;
|START=adjust the level of practical content, theoretical content, methodology aspects&lt;br /&gt;
|STOP=giving too much details on how internet works&lt;br /&gt;
|KEEP=the mix between personal histories, anecdotes, facts at a world scale, and the content of the workshop by itself&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8141</id>
		<title>Digital security workshop - Les Degommeuses</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_-_Les_Degommeuses&amp;diff=8141"/>
				<updated>2016-06-27T16:28:08Z</updated>
		
		<summary type="html">&lt;p&gt;B01: Created page with &amp;quot;{{Activities |Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris |Category=Privacy Advocacy, Digital Security, Gender and Tech |Start whe...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Activities&lt;br /&gt;
|Title of the activity=Digital security workshop - Les Degommeuses - in Montreuil / Paris&lt;br /&gt;
|Category=Privacy Advocacy, Digital Security, Gender and Tech&lt;br /&gt;
|Start when ?=2016/06/04&lt;br /&gt;
|End when ?=2016/06/04&lt;br /&gt;
|Number of hours if only one day ?=3&lt;br /&gt;
|Where is located the activity ?=World level for international activities&lt;br /&gt;
|Who organize it=Les Dégommeuses&lt;br /&gt;
|organisation(s) website=http://www.lesdegommeuses.org/&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/LesDegommeuses&lt;br /&gt;
|For whom is it organized=LGBT refugees from various african countries :  Zimbabwe, Malawi, Zambia, Nigeria, Libya, Uganda,&lt;br /&gt;
|How many people trained=12&lt;br /&gt;
|Motivations for organizing training=&amp;quot;Les Dégommeuses&amp;quot; is a french NGO devoted to inclusive process threw women and sport, they invited a dozen of LGBT refugees from various african countries, one part of the project was to hold this workshop about digital security to increase the level of privacy and anonymity for those activists&lt;br /&gt;
|Topics addressed=Digital security and privacy with a gender focus, feminist approaches to tech, alternative emails, Software Libre, mobile security, safe space, online identities,&lt;br /&gt;
|Links about the activity=https://gendersec.tacticaltech.org/wiki/index.php/Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&lt;br /&gt;
&lt;br /&gt;
https://twitter.com/simplonco/status/735848385538850818&lt;br /&gt;
|Upload content=LesdegommeusesDigitalSecurity2.jpg&lt;br /&gt;
}}&lt;br /&gt;
{{Planning and documentation&lt;br /&gt;
|Detailed schedule and contents=* Issues about Security, Privacy, Anonymity&lt;br /&gt;
* Mapping activities and risks&lt;br /&gt;
* Draw your tech day&lt;br /&gt;
* Ask yourself good questions&lt;br /&gt;
* Secure your devices and data&lt;br /&gt;
* What is Internet ?&lt;br /&gt;
* How the data are circulating in the network&lt;br /&gt;
* Reduce your digital shadow&lt;br /&gt;
* Use emails in a safer way&lt;br /&gt;
* Preserve your anonymity, circumvent censorship&lt;br /&gt;
* Social network, safe space, online identities&lt;br /&gt;
* Téléphone mobile / intelligent&lt;br /&gt;
* Specific questions&lt;br /&gt;
* Good practices, a synthesis&lt;br /&gt;
* Identifying good resources&lt;br /&gt;
|Methodologies for training=# Sharing Issues about Security, Privacy, Anonymity&lt;br /&gt;
# Mapping activities and risks&lt;br /&gt;
# Understand when / where / how data are exchanged, stored&lt;br /&gt;
# Practical methods to reduce our digital shadow, increase our anonymity&lt;br /&gt;
|Existing toolkits and resources=* Security in a box https://securityinabox.org/ &lt;br /&gt;
* Me and my shadow https://myshadow.org/&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual &lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ... &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
|Gender and tech tutorials used=Holistic security - A day in your life, Holistic security - Self care, Threat analysis - Information Mapping I,&lt;br /&gt;
}}&lt;br /&gt;
{{Learning outcomes&lt;br /&gt;
|Feelings=too short !&lt;br /&gt;
|Feedbacks=good&lt;br /&gt;
|START=adjust the level of practical content, theoretical content, methodology aspects&lt;br /&gt;
|STOP=giving too much details on how internet works&lt;br /&gt;
|KEEP=the mix between personal histories, anecdotes, facts at a world scale, and the content of the workshop by itself&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8140</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8140"/>
				<updated>2016-06-27T15:32:45Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Téléphone mobile / intelligent */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/163562609&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/106165094&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|640px|center]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mobile / Smart Phone ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8139</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8139"/>
				<updated>2016-06-21T19:53:56Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Preserve your anonymity, circumvent censorship */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/163562609&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/106165094&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|640px|center]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8138</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8138"/>
				<updated>2016-06-21T19:52:48Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Preserve your anonymity, circumvent censorship */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/163562609&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/106165094&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|640px|center]]&lt;br /&gt;
&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8137</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8137"/>
				<updated>2016-06-21T19:51:00Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* How the data are circulating in the network */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/163562609&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/106165094&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8136</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8136"/>
				<updated>2016-06-21T19:49:25Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Remove metadata from files */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/106165094&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8135</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8135"/>
				<updated>2016-06-21T19:46:09Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Preserve your anonymity, circumvent censorship */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;vimeo&amp;quot;&amp;gt;https://vimeo.com/132517596&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&amp;lt;embedvideo service=&amp;quot;youtube&amp;quot;&amp;gt;https://www.youtube.com/watch?v=JWII85UlzKw&amp;lt;/embedvideo&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8134</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8134"/>
				<updated>2016-06-21T16:48:58Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* How can I create a mobile application from a responsive design web site */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer (yet), some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8133</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8133"/>
				<updated>2016-06-21T16:48:32Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Good practices, a synthesis */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Specific questions ==&lt;br /&gt;
=== How can I ask Google to forget about me ===&lt;br /&gt;
* At least in Europe https://support.google.com/legal/contact/lr_eudpa?product=websearch&lt;br /&gt;
&lt;br /&gt;
=== How can I create a mobile application from a responsive design web site ===&lt;br /&gt;
At the end, no straight easy answer, some resources :&lt;br /&gt;
* With Cordova https://github.com/MobileChromeApps/mobile-chrome-apps and http://taco.visualstudio.com/en-us/docs/create-a-hosted-app/&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8132</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8132"/>
				<updated>2016-06-21T16:39:11Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* So what ? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security http://holistic-security.org/&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8131</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8131"/>
				<updated>2016-06-21T16:38:15Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Identifying good resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;br /&gt;
&lt;br /&gt;
[[File:Killyourphone.jpg|center]]&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Killyourphone.jpg&amp;diff=8130</id>
		<title>File:Killyourphone.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Killyourphone.jpg&amp;diff=8130"/>
				<updated>2016-06-21T16:37:54Z</updated>
		
		<summary type="html">&lt;p&gt;B01: B01 uploaded a new version of File:Killyourphone.jpg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Killyourphone.jpg&amp;diff=8129</id>
		<title>File:Killyourphone.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Killyourphone.jpg&amp;diff=8129"/>
				<updated>2016-06-21T16:37:45Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8128</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8128"/>
				<updated>2016-06-21T16:37:00Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Let's ask some good questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
[[File:FB-privacy-setting-image2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:FB-privacy-setting-image2.jpg&amp;diff=8127</id>
		<title>File:FB-privacy-setting-image2.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:FB-privacy-setting-image2.jpg&amp;diff=8127"/>
				<updated>2016-06-21T16:36:31Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8126</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8126"/>
				<updated>2016-06-21T16:35:14Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Preserve your anonymity, circumvent censorship */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject&lt;br /&gt;
&lt;br /&gt;
[[File:Htw3.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Htw3.png&amp;diff=8125</id>
		<title>File:Htw3.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Htw3.png&amp;diff=8125"/>
				<updated>2016-06-21T16:35:04Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8124</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8124"/>
				<updated>2016-06-21T16:34:29Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Tchat */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8123</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8123"/>
				<updated>2016-06-21T16:32:06Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Communication and exchange services */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
&lt;br /&gt;
[[File:Carte2015-victoires-en.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
[[File:cryptocat.png|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Carte2015-victoires-en.png&amp;diff=8122</id>
		<title>File:Carte2015-victoires-en.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Carte2015-victoires-en.png&amp;diff=8122"/>
				<updated>2016-06-21T16:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8121</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8121"/>
				<updated>2016-06-21T16:29:38Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Alternative search engines */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
&lt;br /&gt;
[[File:searx.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
[[Fichier:Carte-full.jpg|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
[[File:cryptocat.png|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Searx.png&amp;diff=8120</id>
		<title>File:Searx.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Searx.png&amp;diff=8120"/>
				<updated>2016-06-21T16:29:28Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8119</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8119"/>
				<updated>2016-06-21T16:27:22Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* The web - Browser and plug-ins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
[[File:webplugins.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
[[File:framabee.png|900px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
[[Fichier:Carte-full.jpg|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
[[File:cryptocat.png|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Webplugins.png&amp;diff=8118</id>
		<title>File:Webplugins.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Webplugins.png&amp;diff=8118"/>
				<updated>2016-06-21T16:27:05Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8117</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8117"/>
				<updated>2016-06-21T16:25:58Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* Internet role play */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
[[File:FacebookHI5OrkutMAP.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
[[File:framabee.png|900px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
[[Fichier:Carte-full.jpg|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
[[File:cryptocat.png|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:FacebookHI5OrkutMAP.jpg&amp;diff=8116</id>
		<title>File:FacebookHI5OrkutMAP.jpg</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:FacebookHI5OrkutMAP.jpg&amp;diff=8116"/>
				<updated>2016-06-21T16:25:40Z</updated>
		
		<summary type="html">&lt;p&gt;B01: MsUpload&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;MsUpload&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8115</id>
		<title>Digital security workshop Les Dégommeuses - Paris</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=Digital_security_workshop_Les_D%C3%A9gommeuses_-_Paris&amp;diff=8115"/>
				<updated>2016-06-21T16:24:31Z</updated>
		
		<summary type="html">&lt;p&gt;B01: /* What is Internet ? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Issues about Security, Privacy, Anonymity ==&lt;br /&gt;
* Data and states&lt;br /&gt;
* Data and companies&lt;br /&gt;
* Data and citizens&lt;br /&gt;
* Data and art&lt;br /&gt;
[[File:deadrop2.jpg|center]]&lt;br /&gt;
&lt;br /&gt;
== So what ? ==&lt;br /&gt;
* '''Holistic security''' : Physical security + Psycho-social security + digital security&lt;br /&gt;
* '''A global recipe''' : Autonomous infrastructures - Free Libre Open Source Softwares - end to end encryption&lt;br /&gt;
* '''Make some noise !''' encrypt to increase the cost of surveillance&lt;br /&gt;
[[File:content_holisticsecurityvenn.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Mapping activities and risks ==&lt;br /&gt;
'''Cloud of ideas and words related to security''' &amp;gt; questions to establish a baseline of privacy and security knowledge&lt;br /&gt;
&lt;br /&gt;
== Draw your tech day ==&lt;br /&gt;
'''Draw your interactions with your digital devices''', from the morning to the moment you go to bed, including what kind of data you receive, you produce, you transfert and exchange with other people&lt;br /&gt;
&lt;br /&gt;
== Ask yourself good questions ==&lt;br /&gt;
#  Read up and '''educate yourself about your country's internet laws and policies'''. Some security technologies such as encryption are illegal in some countries, for example. &lt;br /&gt;
# Inform yourself about your '''country's laws and policies in relation to freedom of expression, right to privacy and against online and offline harassment'''. Those laws do not exist in all countries, and when they exist they are not framed and applied in the same way. &lt;br /&gt;
# Keep your '''computer and devices clean and healthy''': Updating your software, running a firewall, and protecting yourself from virus infection are fundamental to the security of your data &lt;br /&gt;
#'''Map your data''': What kind of data do you produce and/or manage? With whom? Where is this data stored? Which devices or online platforms hold your data? Most importantly, how sensitive is your data and what would happen if this particular data suddenly disappeared or was seen and copied by a third party?&lt;br /&gt;
# '''Secure your data''': Especially where our data is stored online, it is crucial to '''choose strong passwords, or better passphrases''', and to use a different one for each of our accounts.&lt;br /&gt;
# '''Connect safely to the internet''': When going online, especially if you are transmitting personal data and passwords, it is crucial to always use an encrypted connection which ensures that your data cannot be seen by anyone as it travels from your computer to the website you are visiting or to the service you are using.&lt;br /&gt;
# '''Anonymise your connections''': There are sometimes good reasons to hide your physical location and your internet activities. Tor browser anonymises your connections when you're browsing the internet, by hiding the sites you are visiting from your internet service provider, and hiding your location from the sites you visit. &lt;br /&gt;
# '''Secure your communications''': you might want to consider tools you can use and ways you can change your behavior to increase your security when using mobile phones as well as options for email and instant messaging&lt;br /&gt;
# '''Practice self-care''': Nothing is secure if we only think about technology and we neglect our wellbeing. If you are exhausted, stressed or burnt out, you might make mistakes that impair your security. &lt;br /&gt;
&lt;br /&gt;
'''You should repeat periodically this exercise of permanent risk analysis so as to update the threat model and the answers you could put into practice'''&lt;br /&gt;
&lt;br /&gt;
== Secure your devices and data ==&lt;br /&gt;
=== Computer ===&lt;br /&gt;
* '''Switch your computer to linux''' ;)&lt;br /&gt;
* '''Protect your computer against malware and virus''' https://securityinabox.org/en/guide/malware&lt;br /&gt;
* '''Protect your information from physical threats''' https://securityinabox.org/en/guide/physical&lt;br /&gt;
* '''Create and maintain secure passwords''' https://securityinabox.org/en/guide/passwords&lt;br /&gt;
* '''Destroy sensitive information''' https://securityinabox.org/en/guide/destroy-sensitive-information&lt;br /&gt;
&lt;br /&gt;
=== Mobile phone / tablet ===&lt;br /&gt;
*'''Use mobile phones as securely as possible''' https://securityinabox.org/en/guide/mobile-phones&lt;br /&gt;
*'''Use smartphones as securely as possible''' https://securityinabox.org/en/guide/smartphones&lt;br /&gt;
*'''Encrypt your mobile phone''', basic Android security setup guide https://securityinabox.org/en/guide/basic-setup/android&lt;br /&gt;
&lt;br /&gt;
== What is Internet ? ==&lt;br /&gt;
'''A network of networks of computers''' : Your computer &amp;gt; Internet Service Provider &amp;gt; router &amp;gt; gateway &amp;gt; backbone &amp;gt; sever serveur / routeur&lt;br /&gt;
* http://maps.level3.com/default/ ou http://www.submarinecablemap.com/#/landing-point/marseille-france&lt;br /&gt;
* http://www.teliasoneraicmap.com/&lt;br /&gt;
* http://www.vox.com/a/internet-maps 40 maps that explain the internet&lt;br /&gt;
&lt;br /&gt;
[[File:Global-Global-IP.png|center]]&lt;br /&gt;
&lt;br /&gt;
=== What is an IP address ? ===&lt;br /&gt;
'''An IP address identify your computer inside a local network''' (it is a private IP, for example 192.168.1.101), then your internet box provide you '''a public IP address''' connected to Internet (for example 82.239.0.211). Each network devices is identfied by a unique physical address called the MAC address (for example f4:6d:04:3a:ef:55)&lt;br /&gt;
* visualize your ip address and the geolocalization of your computer http://whatismyipaddress.com/&lt;br /&gt;
* demo traceroute : visualize where your traffic is going http://www.yougetsignal.com/tools/visual-tracert/&lt;br /&gt;
&lt;br /&gt;
[[File:1-what-is-ip-address.png|center]]&lt;br /&gt;
&lt;br /&gt;
== How the data are circulating in the network ==&lt;br /&gt;
If you tried the previous link, you can see that your request reach a server that can be on the other side if the world. But there are third parties that collect informations and datas on your navigation, most of the time to gather informations about you and to sell it for commercial purposes (we call them data brokers), so in function of the website, one single request can be tracked by up to more than twenty other companies ...&lt;br /&gt;
* https://trackography.org/ &amp;gt; Choose a country and a newspaper and see who is collecting data when you go to this website&lt;br /&gt;
&lt;br /&gt;
=== Internet role play ===&lt;br /&gt;
'''Each person become an element of the network :'''&lt;br /&gt;
* Computer A&lt;br /&gt;
* ISP box at home&lt;br /&gt;
* Gateway to Internet&lt;br /&gt;
* Backbone&lt;br /&gt;
* Trans-oceanic cable&lt;br /&gt;
* Gmail server&lt;br /&gt;
* Autonomous Tchat server&lt;br /&gt;
* Public wifi access point&lt;br /&gt;
* Computer B&lt;br /&gt;
'''Now, let's send a &amp;quot;normal&amp;quot; e-mail from computer A to computer B and let's see who can read what between metadatas and the content of the mail. Repeat the exercise with an encrypted e-mail, with a normal tchat and an encrypted tchat'''&lt;br /&gt;
&lt;br /&gt;
== Reduce your digital shadow ==&lt;br /&gt;
=== The web - Browser and plug-ins ===&lt;br /&gt;
* '''To remove adds''' : ublock origin https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/ &lt;br /&gt;
* '''To prevent tracking''' : betterprivacy  https://addons.mozilla.org/en-US/firefox/addon/betterprivacy/&lt;br /&gt;
* '''To reduce our digital shadow''' : Privacy Badger https://www.eff.org/privacybadger&lt;br /&gt;
* '''To use as much as possible encrypted communication''' between our computer and the server :  HTTP'''S''' everywhere https://www.eff.org/https-everywhere&lt;br /&gt;
* '''To avoid viruses from web pages''' and javascript https://noscript.net/&lt;br /&gt;
* '''To avoid viruses from Flash content''' : flashblock https://addons.mozilla.org/en-US/firefox/addon/flashblock/&lt;br /&gt;
&lt;br /&gt;
=== Alternative search engines ===&lt;br /&gt;
'''To add a new search engine to Firefox''', see https://support.mozilla.org/en-US/kb/add-or-remove-search-engine-firefox&lt;br /&gt;
* https://duckduckgo.com/ see also the bangs https://duckduckgo.com/bang : if you add &amp;quot;!w&amp;quot; to your request, it will search directly on wikipedia&lt;br /&gt;
* https://www.qwant.com/&lt;br /&gt;
* https://startpage.com/&lt;br /&gt;
* https://searx.laquadrature.net/ meta hackable search engine&lt;br /&gt;
[[File:framabee.png|900px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Evaluate the traceability of your system and browser ===&lt;br /&gt;
'''The &amp;quot;fingerprinting&amp;quot;''' allow one to identify us in function of our configuration : operating system, browser configuration, plug-ins, size of our screen, ...  &lt;br /&gt;
* to make a test : Panopticlick http://panopticlick.eff.org/&lt;br /&gt;
&lt;br /&gt;
=== Remove metadata from files ===&lt;br /&gt;
'''Metadata are included in pictures, text documents, videos''', and can include geolocalization, the name of the autor and many more informations&lt;br /&gt;
* see the tool  [http://sourceforge.net/projects/exiftool/ Exiftool] : to remove metadata :&lt;br /&gt;
 exiftool &amp;quot;-all:all=petit chaton&amp;quot; -overwrite_original *.ogg&lt;br /&gt;
&lt;br /&gt;
== Use emails in a safer way ==&lt;br /&gt;
=== Alternative email providers ===&lt;br /&gt;
* https://help.riseup.net/ &lt;br /&gt;
* http://no-log.org/ &lt;br /&gt;
* http://autistici.org &lt;br /&gt;
* https://www.openmailbox.org/&lt;br /&gt;
* https://mailinabox.email/&lt;br /&gt;
&lt;br /&gt;
=== Disposable emails ===&lt;br /&gt;
* https://www.guerrillamail.com/&lt;br /&gt;
* https://www.sharklasers.com/&lt;br /&gt;
* http://maildrop.cc/&lt;br /&gt;
* http://throwawaymail.com/&lt;br /&gt;
* http://yopmail.com/&lt;br /&gt;
* http://clipmail.eu&lt;br /&gt;
* https://addons.mozilla.org/fr/firefox/addon/bloody-vikings/&lt;br /&gt;
&lt;br /&gt;
=== Encrypt mails with PGP ===&lt;br /&gt;
'''With a combination of thunderbird and enigmail plug-in  :'''&lt;br /&gt;
* PGP avec enigmail et thunderbird https://securityinabox.org/en/guide/thunderbird/windows&lt;br /&gt;
* Tutorial from FSF https://emailselfdefense.fsf.org/en/&lt;br /&gt;
* 15 reasons not to start using PGP http://secushare.org/PGP&lt;br /&gt;
=== Communication and exchange services ===&lt;br /&gt;
'''Let's use alternative services without any commercial purposes''' FLOSS (Free/Libre Open Source), to replace skype, dropbox, doodle, google doc, ... :&lt;br /&gt;
* Dégoogleise Internet https://degooglisons-internet.org/&lt;br /&gt;
[[Fichier:Carte-full.jpg|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Tchat ===&lt;br /&gt;
* pidgin with à OTR https://otr.cypherpunks.ca/&lt;br /&gt;
* https://crypto.cat/&lt;br /&gt;
* https://pond.imperialviolet.org/&lt;br /&gt;
* https://ricochet.im/&lt;br /&gt;
* https://blog.torproject.org/blog/tor-messenger-beta-chat-over-tor-easily&lt;br /&gt;
[[File:cryptocat.png|500px|centré]]&lt;br /&gt;
&lt;br /&gt;
=== Visioconference ===&lt;br /&gt;
* chat with visioconference with jit.s https://jitsi.org/Main/Download / installation : https://jitsi.org/Documentation/SetUpJitsiAccount / open an account https://jit.si/&lt;br /&gt;
* directly in the browser : https://meet.jit.si/ or https://www.mozilla.org/fr/firefox/hello/&lt;br /&gt;
* Tox to replace skype https://tox.im/&lt;br /&gt;
&lt;br /&gt;
== Preserve your anonymity, circumvent censorship ==&lt;br /&gt;
'''Use Tor''' (The Onion Router), '''Tails''' (Live Linux amnesic operating system), '''a VPN''' (create a tunnel between you and your vpn provider)&lt;br /&gt;
* TOR : https://www.torproject.org/projects/torbrowser.html.en&lt;br /&gt;
* TAILS : https://tails.boum.org/install/index.fr.html&lt;br /&gt;
* VPN : https://help.riseup.net/fr/vpn&lt;br /&gt;
'''Understand the difference between encryption and anonymity''' &lt;br /&gt;
* video gpg tactical tech https://tacticaltech.org/projects/decrypting-encryption https://vimeo.com/132517596&lt;br /&gt;
* tor browser : https://www.youtube.com/user/TheTorProject &lt;br /&gt;
&lt;br /&gt;
== Social network ==&lt;br /&gt;
=== Let's ask some good questions ===&lt;br /&gt;
'''How is the web service on which I'm willing to sign in is earning money ? What is its economical model ? '''&lt;br /&gt;
&lt;br /&gt;
'''Set up the privacy settings of your account''', strong passwords, use d'https&lt;br /&gt;
&lt;br /&gt;
'''Define which kind of information you are publishing''', did everybody agreed ?  :&lt;br /&gt;
*who can see the informations I published&lt;br /&gt;
*Who is the owner of the information I published&lt;br /&gt;
*What kind of personal informations can I transfer to other people&lt;br /&gt;
*Are my contacts ok with the fact that I share informations about them with others ?&lt;br /&gt;
*Do I trust all the persons with which I'm in contact ?&lt;br /&gt;
Consider that event if you are not inscribed on Facebook, Facebook will build a shadow profile about you (Friends inviting me on facebook ...), be careful when using your Facebook or google account to sign in another web service&lt;br /&gt;
&lt;br /&gt;
=== Choose between 4 strategies concerning your on-line identity ===&lt;br /&gt;
* '''Real name'''&lt;br /&gt;
**''Risk'': Using your &amp;quot;real world&amp;quot; identity online means you are easily identifiable by family members, colleagues, and others, and your activities can be linked back to your identity.&lt;br /&gt;
**''Reputation'': Others can easily identify you, thus gaining reputation and trust is easier. &lt;br /&gt;
**''Effort'': It requires little effort.&lt;br /&gt;
*'''Total anonymity '''&lt;br /&gt;
**''Risk:'' It can be beneficial at times, but also be very difficult to maintain. Choose this option carefully.&lt;br /&gt;
**''Reputation'': There are few opportunities to network with others thus to gain trust and reputation.&lt;br /&gt;
**''Effort'': Intensive as it requires considerable caution and knowledge. It will probably require the use of anonymisation tools (for example '''Tor''' or '''TAILS''')&lt;br /&gt;
*'''Persistent pseudonymity'''&lt;br /&gt;
** *''Risk'': Pseudonyms could be linked to your real world identity.&lt;br /&gt;
**''Reputation'': A persistent pseudonym that others can use to identify you across platforms is a good way to gain reputation and trust.&lt;br /&gt;
**''Effort'': Maintenance requires some effort, particularly if you are also using your real name elsewhere.&lt;br /&gt;
* '''Collective Identity'''&lt;br /&gt;
**''Risk'': Possible exposure of your real world identity by other people's actions in the group.&lt;br /&gt;
**''Reputation'': While not a way to gain individual reputation, you can still benefit from the reputation of the collective.                                                 &lt;br /&gt;
**''Effort'': Although secure communications are still important, it requires less effort than total anonymity.&lt;br /&gt;
&lt;br /&gt;
'''More about this question''' : https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual#Creating_and_managing_identities_online&lt;br /&gt;
&lt;br /&gt;
=== 4 strategies to alter our digital shadow ===&lt;br /&gt;
[[File:altering-our-digital-shadow.png|center]]&lt;br /&gt;
&lt;br /&gt;
== Téléphone mobile / intelligent ==&lt;br /&gt;
How a mobile phone is working,  triangulation, autorisations asked by applications, metadata, alternative operating system, signed applciations, rooting and jailbreaking&lt;br /&gt;
&lt;br /&gt;
=== Encrypt your phone, pass phrase, use FLOSS applications ===&lt;br /&gt;
'''Recommended softwares to communicate and exchange''' :&lt;br /&gt;
* See the market dedicated to Free Libre Open Source applications  http://f-droid.org/&lt;br /&gt;
* And the applications developed by par https://guardianproject.info/ (available in f-droid)&lt;br /&gt;
=== Mobile applications renowned as safe in june 2016 ===&lt;br /&gt;
Always check on https://securityinabox.org/en/mobile-tools to see if an application is still safe&lt;br /&gt;
*SMSSecure&lt;br /&gt;
*Signal&lt;br /&gt;
*Telegraph et Snapchat (not FLOSS but end to end encryption)&lt;br /&gt;
*Orbot + Orweb (web browsing threw Tor network)&lt;br /&gt;
*keepassDroid&lt;br /&gt;
*Android Privacy Guard (emails + GPG)&lt;br /&gt;
*Obscuracam to hide people's face&lt;br /&gt;
=== Free your phone ===&lt;br /&gt;
* '''Free your Android''' : http://fsfe.org/campaigns/android/liberate.fr.html + http://www.gnu.org/philosophy/android-and-users-freedom.html&lt;br /&gt;
&lt;br /&gt;
== Good practices, a synthesis ==&lt;br /&gt;
'''Backup, strong pass phrase,  FLOSS Opératiing system and softwares, Autonomous infrastructure (Yunohost, non commercial), holistic security, update of the threat model network of trust, Safe spaces'''&lt;br /&gt;
&lt;br /&gt;
After the workshop, what would you &lt;br /&gt;
*Start&lt;br /&gt;
*Stop&lt;br /&gt;
*Keep&lt;br /&gt;
doing ...&lt;br /&gt;
&lt;br /&gt;
== Identifying good resources ==&lt;br /&gt;
* Security in a box https://securityinabox.org/ tools revised by a pool of digital security trainers, download the software from there&lt;br /&gt;
* Me and my shadow https://myshadow.org/ tips for mobile phone and browser&lt;br /&gt;
* Zen manual https://gendersec.tacticaltech.org/wiki/index.php/Complete_manual focused on the gender and tech question : on-line identities, safe spaces, ...&lt;br /&gt;
* Holistic security : Physical security, Psycho-social security, digital security https://holistic-security.tacticaltech.org/&lt;br /&gt;
* About Dating apps : https://www.eff.org/deeplinks/2012/02/comparing-privacy-and-security-online-dating-sites http://www.forbrukerradet.no/appfail-en/ https://grindrmap.neocities.org/overview.html&lt;br /&gt;
* A webserie about privacy, big data, surveillance ...  &amp;quot;Do not track me&amp;quot; https://donottrack-doc.com/en/episodes/&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:1-what-is-ip-address.png&amp;diff=8114</id>
		<title>File:1-what-is-ip-address.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:1-what-is-ip-address.png&amp;diff=8114"/>
				<updated>2016-06-21T16:24:16Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	<entry>
		<id>https://gendersec.tacticaltech.org/wiki/index.php?title=File:Global-Global-IP.png&amp;diff=8113</id>
		<title>File:Global-Global-IP.png</title>
		<link rel="alternate" type="text/html" href="https://gendersec.tacticaltech.org/wiki/index.php?title=File:Global-Global-IP.png&amp;diff=8113"/>
				<updated>2016-06-21T16:22:24Z</updated>
		
		<summary type="html">&lt;p&gt;B01: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>B01</name></author>	</entry>

	</feed>