This is an old revision of the document!
Training and workshops
Nothing2Hide provides trainings related to digital security and online investigation. Our training material are available online (in French at the moment, translation ongoing) and published under creative commons license. Feel free to use it !
Online investigation
Online fact checking
Workshop, up to 10 trainees
Length : 2h.
- File metadata analysis
- Technically determine the origin or first publication date of a picture or a video
- Technical validation of a picture or video authenticity
Advanced online search
Workshop, up to 10 trainees
Length : 2h.
Smart phone or computer needed for the trainees
- Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting)
- Operators combination for advanced search
- Advanced use of Google cache and other archiving online system
- Open source intelligence
Digital security
Digital security introduction
Lecture
Length : 2h
- Digital safety : the basics
- Protect your online accounts
- Learn about online surveillance and how to get rid of it
- Smart phones, spy phones and dumb phones
Digital safety : the basics
Workshop, up to 10 trainees
Length : 2h.
- Mandatory check points on a computer
- Understand and create strong passwords
- Remove your traces on a computer
Secure your surf
Workshop, up to 10 trainees
Length : 2h.
- Reminder: Data interception over the Internet
- Tools to protect your online surfing
- VPN + Tor
Social network
Workshop, up to 10 trainees
Length : 2h.
- Protect your online accounts
- Who should you open your publications to
- Lear about compartmentalisation
Smartphones
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Which data are sent by you mobile phone (IMEI, IMSI, etc.)
- Where does your mobile phone stores your data
- Data encryption
- Communication encryption
- Data backup with Google drive or iCloud : pros and cons
Manage your data
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures)
- Secure data erasing
- Where to save your data? Locally, with the Gafam, on a personal cloud, at home? Pros and cons
- Data encryption
"Crypto for dummies"
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Difference between encryption and anonymity
- Communiquer de façon anonyme
- Communiquer de manière chiffrée
Advanced cryptography
Atelier, 8 à 10 personnes maximum
Durée : 1 journée.
Ordinateur ou smartphone obligatoire pour les participants.
- Chiffrement symétrique et asymétrique
- PGP à quoi ça sert
- L’authentification
- Discuter “Off The Reccord”
- Tails, le couteau suisse de la sécurité
Threat modeling
En plénière, 10 à 30 personnes
Durée : 2heures.
- Le modèle de menaces en cinq questions
- Analyse de contexte et mise en place de stratégies adaptées