"Privacy is the power to selectively reveal oneself to the world." - Cypherpunk Manifesto, 1993.
Tuesday, 21 May 2013 from 17:00 to 20:00 (BST)
Room 305, New Academic Building Goldsmiths, University of London New Cross SE14 6NW London United Kingdom
The organisers are a small group of people at Goldsmiths College, with the help of volunteers from various communities:
Ain't No Party Like a CryptoParty!
Want to keep your emails private? Creeped out by websites that track your browsing habits? Feeling stalked by social networks? Then come on down to the first Goldsmiths CryptoParty, part of a global movement of people teaching each other the basics of crypto programs and how to use them.
"It's like a Tupperware party for learning crypto" - Cory Doctorow
This isn't an event for geeks but for anyone who wants to know the basic steps of protecting themselves and their data from intrusive surveillance. We'll be sharing skills on how to have private conversations over instant messaging, how to encrypt emails, how to browse anonymously and how to encrypt your hard disk.
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. Privacy is the power to selectively reveal oneself to the world." ~ Cypherpunk Manifesto, 1993
Ways to Contribute to Goldsmiths CryptoParty
- Tweet about it (use #cryptoparty)
- Drag a friend along (maybe the special someone you might like to send encrypted messages to?)
- Design a better logo
- Prepare a lightning talk (~5 mins) on something to do with cryptography or anonymity etc.for the end of the evening (email us to confirm you have a slot)
- Check out the CryptoParty Handbook https://cryptoparty.org/wiki/CryptoPartyHandbook and the resources on the CryptoParty wiki https://cryptoparty.org/wiki/Resources
- 5-6pm = drop-in, general intro, self-organisation(!)
- 6-8pm = rotating sessions depending on what skills are in the house
- 8-8.30pm = lightening talks
- file/drive encryption and secure file wiping,
- securely getting rid of paper documents
- How to use smartphones as securely as possible: chapter 11 of security-in-a-box