Training and workshops
Nothing2Hide provides trainings related to digital security and online investigation. Our training material are available online (in French at the moment, English translation ongoing) and published under creative commons license. Feel free to use it !
Online investigation
Online fact checking
Workshop, up to 10 trainees
Length : 2h.
- File metadata analysis
- Technically determine the origin or first publication date of a picture or a video
- Technical validation of a picture or video authenticity
Advanced online search
Workshop, up to 10 trainees
Length : 2h.
Smart phone or computer needed for the trainees
- Google Dorking : learn and discover Google advanced search operators operators (logical and and targeting)
- Operators combination for advanced search
- Advanced use of Google cache and other archiving online system
- Open source intelligence
Digital security
Digital security introduction
Lecture
Length : 2h
- Digital safety : the basics
- Protect your on line accounts
- Learn about on line surveillance and how to get rid of it - hacking live demo
- Smart phones, spy phones and dumb phones - hacking live demo
Digital safety : the basics
Workshop, up to 10 trainees
Length : 2h.
- Mandatory check points on a computer
- Understand and create strong passwords
- Remove your traces on a computer
Secure your surf
Workshop, up to 10 trainees
Length : 2h.
- Reminder: Data interception over the Internet
- Tools to protect your online surfing
- VPN + Tor
Social network
Workshop, up to 10 trainees
Length : 2h.
- Protect your on line accounts
- Who should you open your publications to
- Learn about compartmentalisation
Smartphones
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Which data are sent by you mobile phone (IMEI, IMSI, etc.)
- Where does your mobile phone stores your data
- Data encryption
- Communication encryption
- Data backup with Google drive or iCloud : pros and cons
Manage your data
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Metadata: what is it and how to handle it (or how not to leave any sensitive information in your documents, videos and pictures)
- Secure data erasing
- Where to save your data? Locally, with the Gafam, on a personal cloud, at home? Pros and cons
- Data encryption
"Crypto for dummies"
Workshop, up to 10 trainees
Length : 4h.
Smart phone or computer needed for the trainees
- Difference between encryption and anonymity
- How to communication anonymously
- How to encrypt your communications
Advanced cryptography
Workshop, up to 10 trainees
Length : 1 day
Smart phone or computer needed for the trainees
- Symmetric and asymmetric cryptography
- PGP what for? How to use it?
- Authentication
- “Off The Record” chat
- understand and use the most secured live OS: Tails
Threat modeling
Workshop
Length : 2h
- Threat modeling in 5 questions
- Context analysis and adapted response strategies