Seguridad digial para defensores de derechos humanos en contextos mineros
From Gender and Tech Resources
Title | Training with Derechos Humanos sin Fronteras |
---|---|
Category | Digital Security |
Start | 2018/05/22 |
End | 2018/05/22 |
Hours | 9 |
Scale | Regional |
Geolocalization | -12° 32' 56", -74° 0' 14"
Loading map...
|
Organisation | Training with Derechos Humanos sin Fronteras, CEDEP AYLLU, |
Website | https://es-la.facebook.com/derechossinfronteras.pe/ |
Target audience | Human right defenders |
Number of participants | 12 |
Context and motivations | DHSF is an organization that works on territorial conflicts related to extractive industries. During the training the organization shared about several physical security incidents it has had in the past and their suspicion of having their phones intecepted. |
Topics | digital security, mobil, encrypt |
Links | |
Media | [[File:]] |
Agenda | The training was divided in three parts. During the first part we worked on the general aspects of privacy and digital security in the Latin-American context. In the second part we worked on threats for cellphones. During the third part we worked on secure communication through e-mail and encryption of folders to protect sensitive information.
During the training all participants configured a Wire account, analyzed the security of their cellphone devices, create a secure mail account in a secure server and use veracrypt to encrypt their folders. |
---|---|
Methodologies | Popular education, |
Resources | [[Existing toolkits and resources::https://gendersec.tacticaltech.org (Mobil topics)
From the training part of My shadow [1]the following material was: How Mobile Communication Works How the Internet works Mobile Communication Mobile Phone Settings (Hands-on) Additionally we used the following websites. https://trackography.org/]] |
Gendersec | myshadow.org |
Feelings | The presence of the directives of the organization was important since we reached several agreements on the implementation of digital security tools that we worked on during the training. |
---|---|
Feedbacks | the participants commented that the workshop was useful and the methodology was adequate |
Start | |
Stop | |
Keep |