How to Guides – Digital Citizenship and Surveillance Society https://dcssproject.net UK State-Media-Citizen Relations after the Snowden Leaks Wed, 28 Nov 2018 12:14:41 +0000 en-GB hourly 1 https://wordpress.org/?v=5.3.3 Surveillance Self-Defense https://dcssproject.net/surveillance-self-defense/ Mon, 23 Nov 2015 13:00:00 +0000 http://sites.cardiff.ac.uk/dcssproject/?p=2142 Continue reading

]]>
Description: “Modern technology has given those in power new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF’s guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.”

Web link

Author(s): Electronic Frontier Foundation

]]>
Encrypting Your Laptop Like You Mean It https://dcssproject.net/resources20/ Wed, 29 Apr 2015 08:49:43 +0000 http://sites.cardiff.ac.uk/dcssproject/?p=815 Continue reading

]]>
Description: “Time and again, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive online tracking to cybercriminals: Encryption. As President Obama put it earlier this year, speaking in between his administration’s attacks on encryption, “There’s no scenario in which we don’t want really strong encryption.” Even after helping expose all the ways the government can get its hands on your data, NSA whistleblower Edward Snowden still maintained, “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”

Web Link

Author(s): The Intercept

]]>
How to Detect Sneaky NSA ‘Quantum Insert’ Attacks https://dcssproject.net/surveillance-news50/ Fri, 24 Apr 2015 08:42:02 +0000 http://sites.cardiff.ac.uk/dcssproject/?p=793 Continue reading

]]>
Description: “Among all of the NSA hacking operations exposed by whistleblower Edward Snowden over the last two years, one in particular has stood out for its sophistication and stealthiness. Known as Quantum Insert, the man-on-the-side hacking technique has been used to great effect since 2005 by the NSA and its partner spy agency, Britain’s GCHQ, to hack into high-value, hard-to-reach systems and implant malware.”

Web link

Author(s): Wired

]]>
Off-the-Record Communication, or, Why Not To Use PGP https://dcssproject.net/off-the-record-communication-or-why-not-to-use-pgp/ Mon, 13 Apr 2015 11:39:44 +0000 http://sites.cardiff.ac.uk/dcssproject/?p=751 Continue reading

]]>
Description: “Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryption keys (subject to compromise) for confidentiality, and digital signatures (which provide strong, and in some jurisdictions, legal, proof of authorship) for authenticity.”

Web link

Author(s): Nikita Borisov – UC Berkeley, Ian Goldberg – Zero-Knowledge Systems, Eric Brewer – UC Berkeley

]]>