[Noisebridge-discuss] CryptoParty! or, keysigning parties go all ScaryCaps

Ryan Ruggles ryanlruggles at gmail.com
Tue Sep 11 03:21:54 UTC 2012


If the dicussion or presentation at the cryptoparty is going to be on
threat modelling, hard disk encryption using LUKS, and GnuPG, i'd like
to go.

On Mon, Sep 10, 2012 at 7:38 PM, Danny O'Brien <danny at spesh.com> wrote:
> So, just to be specific about good times to do this, I have a few
> times that mean I personally  or others may be able to bring
> interesting people to cryptoparty at Noisebridge:
>
> On September 19th, I'm talking to a bunch of working journalists about
> digital security down the road (see
> http://www.eventbrite.com/event/4316151726 ). The event finishes at
> 8.30, but I could see if I can drag some stragglers off to Noisebridge
> for some technical advice with a wider group. In a paaarty atmosphere
> of course.
>
> On October 10th, I'm running a (small) summit for CPJ on future mobile
> infrastructure vulnerabilities for technologists and African
> journalists downtown. I'm not sure how the dates will intersect. Not
> sure when people are flying in yet, but as with last year, I'll have a
> bunch of interesting people in town that week, and could bring them
> over on either the 9th or the 11th maybe.
>
> Friday, October 19th thru Sunday, October 21st, 2012  is Hackmeet at
> Noisebridge, where activists and hackers often talk about such issues.
> Running a cryptoparty in co-operation with this would be a great idea.
> https://hackmeet.org/
>
> I think all of these events would be a great way not just to showcase
> technical tools or strategies, but for those working on tech to speak
> and learn from those experiencing targetted attacks from state actors
> right now. I totally agree with Quinn about talking about threat
> modelling and drawing on real scenarios is  vital. The motives,
> capabilities and aims of sophisticated attackers is a rapidly-moving
> target right now.
>
> I was absolutely serious that this is something we could and can do
> every week at Noisebridge: the biggest challenge wouldn't be our own
> resources, but ensuring that the advice gets out to the people who
> need it.
>
> My experience is that you advertise something that says "do you want
> to protect your communications from interception?", you get a lot of
> people who really *aren't* going to experience targetted surveillance
> but are very worried about such things nonetheless. I'd rather reach a
> broader spectrum of folks who *aren't* concerned, but should be,
> either because of mass surveillance strategies or because the
> increasing ease of surveillance means that they may find themselves
> vulnerable down the line -- activists, anti-corruption reporters,
> those in SF but may be returning to repressive regimes, young adults
> with invasive families, people in abusive relationships with
> tech-savvy partners, and, heck, people in our own community who don't
> always practice what we preach.
>
> Basically, if you hold a cryptoparty, I can try and bring you some of
> the uncrypto'ed masses, and tell you about real threats. I'm not sure
> I have the actual cycles to organize one myself though.
>
> d.
>
> Digital Security Tools for Working Journalists
> Wednesday, September 19, 2012 from 6:30 PM to 8:30 PM (PDT)
> Bryan Cave Conference Center
> 560 Mission Street
> 25th Floor
> Register at: http://www.eventbrite.com/event/4316151726
>
> Heard about the security flaws at Apple and Amazon that led to hackers
> wiping out everything on Wired journalist Mat Honan's computer?
>
> Headed overseas on a reporting trip and worried about foreign
> governments sneaking into your computer to see what you're up to?
>
> Or do you simply work with sensitive sources and want to be
> double-secret-probation sure that no one can intercept your digital
> communications?
>
> Paying attention to digital security is no longer an option. Every
> reporter should know how to protect their digital communications and
> guard the information on their computers, to make sure nothing
> inadvertently falls into the wrong hands. Join us on Wednesday,
> September 19 as we learn from the experts about measures every
> journalist should take and tools they should use to keep their notes
> and communications secure.
>
>
>
>
> On Fri, Sep 7, 2012 at 3:35 PM, Ari Lacenski <alacenski at gmail.com> wrote:
>> http://betabeat.com/2012/09/have-yourself-a-merry-little-cryptoparty/
>>
>> Following posting this on G+, I was advised to poke the list about a
>> similar event at Noisebridge.
>>
>> Throwing such an event /might/ lend credence to BetaBeat's claim that
>> it's "going viral", which phrase really needs to be taken out back
>> with the rest of 2007 and made into glue. But it would be really
>> useful, as a practical event: workshops/keysigning/install-parties.
>> I'd like an SF version to not simply be a replay of Agency Salon from
>> a few months ago. The Tennessee hackerspace wiki has some good ideas.
>>
>> Ari
>> _______________________________________________
>> Noisebridge-discuss mailing list
>> Noisebridge-discuss at lists.noisebridge.net
>> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss
>>
> _______________________________________________
> Noisebridge-discuss mailing list
> Noisebridge-discuss at lists.noisebridge.net
> https://www.noisebridge.net/mailman/listinfo/noisebridge-discuss



More information about the Noisebridge-discuss mailing list