Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
en:protectionnumerique:nosateliers [2018/02/08 18:47] – barbayellow | en:protectionnumerique:nosateliers [2019/10/13 14:15] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Training and workshops ====== | ====== Training and workshops ====== | ||
- | Nothing2Hide provides trainings related to digital security | + | Nothing2Hide provides trainings related to digital security |
====== Online investigation ====== | ====== Online investigation ====== | ||
Line 13: | Line 13: | ||
* Technically determine the origin or first publication date of a picture or a video | * Technically determine the origin or first publication date of a picture or a video | ||
* Technical validation of a picture or video authenticity | * Technical validation of a picture or video authenticity | ||
+ | |||
===== Advanced online search ===== | ===== Advanced online search ===== | ||
Line 32: | Line 33: | ||
* Digital safety : the basics | * Digital safety : the basics | ||
- | * Protect your online | + | * Protect your on line accounts |
- | * Learn about online surveilance | + | * Learn about on line surveillance |
- | * Smart phones, spy phones and dumb phones | + | * Smart phones, spy phones and dumb phones |
===== Digital safety : the basics ===== | ===== Digital safety : the basics ===== | ||
Line 55: | Line 56: | ||
===== Social network ===== | ===== Social network ===== | ||
+ | //Workshop, up to 10 trainees// | ||
+ | //Length : 2h.//\\ | ||
- | //Atelier, 8 à 10 personnes maximum// | + | |
- | //Durée : 2 heures.// | + | * Who should you open your publications to |
- | + | * Learn about compartmentalisation | |
- | | + | |
- | * Maîtriser la diffusion | + | |
- | * Les stratégies de compartimentation | + | |
===== Smartphones | ===== Smartphones | ||
- | //Atelier, 8 à 10 personnes maximum//\\ | + | //Workshop, up to 10 trainees//\\ |
- | //Durée | + | //Length |
- | // Ordinateur ou smartphone obligatoire pour les participants.// | + | // Smart phone or computer needed for the trainees// |
- | * Détail des données envoyées par un mobile (IMEI, IMSI, etc) | + | * Which data are sent by you mobile |
- | * Détail des endroits de stockage des données sur un smartphone | + | * Where does your mobile phone stores your data |
- | * Chiffrer ses données | + | * Data encryption |
- | * Chiffrer ses communications | + | * Communication encryption |
- | * Sauvegarder ses données "hors Gafam" (sur son ordinateur, sur un service interne, que le cloud, avantages et inconvénients) | + | * Data backup with Google drive or iCloud : pros and cons |
===== Manage your data ===== | ===== Manage your data ===== | ||
- | //Atelier, 8 à 10 personnes maximum//\\ | + | //Workshop, up to 10 trainees//\\ |
- | //Durée | + | //Length |
- | // Ordinateur ou smartphone obligatoire pour les participants.// | + | // Smart phone or computer needed for the trainees// |
- | * Les méta données | + | |
- | | + | * Secure data erasing |
- | * Où sauvegarder ses données | + | * Where to save your data? Locally, with the Gafam, |
- | * Chiffrer ses données dans le cloud | + | * Data encryption |
===== " | ===== " | ||
- | //Atelier, 8 à 10 personnes maximum//\\ | + | //Workshop, up to 10 trainees//\\ |
- | //Durée | + | //Length |
- | // Ordinateur ou smartphone obligatoire pour les participants.// | + | // Smart phone or computer needed for the trainees// |
- | * Différence entre cryptographie et anonymat | + | * Difference between encryption and anonymity |
- | * Communiquer de façon anonyme | + | * How to communication anonymously |
- | * Communiquer de manière chiffrée | + | * How to encrypt your communications |
===== Advanced cryptography ===== | ===== Advanced cryptography ===== | ||
- | //Atelier, 8 à 10 personnes maximum//\\ | + | //Workshop, up to 10 trainees//\\ |
- | //Durée | + | //Length |
- | // Ordinateur ou smartphone obligatoire pour les participants.// | + | // Smart phone or computer needed for the trainees// |
- | * Chiffrement symétrique et asymétrique | + | * Symmetric and asymmetric cryptography |
- | * PGP à quoi ça sert | + | * PGP what for? How to use it? |
- | * L' | + | * Authentication |
- | * Discuter | + | * "Off The Record" |
- | * Tails, le couteau suisse de la sécurité | + | * understand and use the most secured live OS: Tails |
===== Threat modeling ===== | ===== Threat modeling ===== | ||
- | //En plénière, 10 à 30 personnes//\\ | + | //Workshop |
- | //Durée | + | //Length |
- | * Le modèle de menaces en cinq questions | + | * Threat modeling in 5 questions |
- | * Analyse de contexte et mise en place de stratégies adaptées | + | * Context analysis and adapted response strategies |