en:protectionnumerique:nosateliers

Training and workshops

Nothing2Hide provides trainings related to digital security and online investigation. Our training material are available online (in French at the moment, English translation ongoing) and published under creative commons license. Feel free to use it !

Online investigation

Workshop, up to 10 trainees
Length : 2h.

  • File metadata analysis
  • Technically determine the origin or first publication date of a picture or a video
  • Technical validation of a picture or video authenticity

Workshop, up to 10 trainees
Length : 2h.
Smart phone or computer needed for the trainees

  • Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting)
  • Operators combination for advanced search
  • Advanced use of Google cache and other archiving online system
  • Open source intelligence

Digital security

Lecture
Length : 2h

  • Digital safety : the basics
  • Protect your on line accounts
  • Learn about on line surveillance and how to get rid of it - hacking live demo
  • Smart phones, spy phones and dumb phones - hacking live demo

Workshop, up to 10 trainees
Length : 2h.

  • Mandatory check points on a computer
  • Understand and create strong passwords
  • Remove your traces on a computer

Workshop, up to 10 trainees
Length : 2h.

  • Reminder: Data interception over the Internet
  • Tools to protect your online surfing
  • VPN + Tor

Workshop, up to 10 trainees
Length : 2h.

  • Protect your on line accounts
  • Who should you open your publications to
  • Learn about compartmentalisation

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Which data are sent by you mobile phone (IMEI, IMSI, etc.)
  • Where does your mobile phone stores your data
  • Data encryption
  • Communication encryption
  • Data backup with Google drive or iCloud : pros and cons

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures)
  • Secure data erasing
  • Where to save your data? Locally, with the Gafam, on a personal cloud, at home? Pros and cons
  • Data encryption

Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees

  • Difference between encryption and anonymity
  • How to communication anonymously
  • How to encrypt your communications

Workshop, up to 10 trainees
Length : 1 day
Smart phone or computer needed for the trainees

  • Symmetric and asymmetric cryptography
  • PGP what for? How to use it?
  • Authentication
  • “Off The Record” chat
  • understand and use the most secured live OS: Tails

Workshop
Length : 2h

  • Threat modeling in 5 questions
  • Context analysis and adapted response strategies
You could leave a comment if you were logged in.