An insight to Digital Privacy and Security Resources
What is security?
In simple words it is about protection. Earlier, we had physical security to protect our valuable assets in the physical world. But when we move more toward the cyber world, we need a new set of software and tools to protect our data and privacy.
The three pillars of security are :
- Confidentiality — this focuses on protecting the “Read” operation. You do not want unauthorized people to read your confidential information, for example, your credit card number, your passwords or payroll amount.
- Integrity — this focuses on protecting the “Write” operation. You do not want to unauthorized people to modify your data. For example, you do not want someone to withdraw money from your bank account without your permission.
- Availability — this means the systems and data are always accessible when you need them. For example, an online banking system or an online shopping site should always be on.
Powerful Tool-kits available today
The Internet only stays healthy if we trust it as a safe place - to explore, transact, connect, and create.www.mozilla.org
MyShadow helps you take control of your data.
What is a Digital Shadow ? Watch this to understand.
Electronic Frontier Foundation (EFF). The leading nonprofit defending digital privacy, free speech, and innovation.
Surveillance Self-Defense. Provides Tips, Tools and How-tos for Safer Online Communications. We’re the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years.
Security Education Companion. A free resource for digital security educators. SEC is a resource for people teaching digital security to their friends and neighbors.
The Security Education Companion is a resource for people teaching digital security to their friends and neighbors.sec.eff.org
Privacy Badger. Privacy Badger automatically learns to block invisible trackers.
Tor Project. We believe everyone should be able to explore the internet with privacy.We advance human rights and defend your privacy online through free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.
Defend yourself against tracking and surveillance. Circumvent censorship.www.torproject.org
DEFEND and DETOX. An amazing step by step guide to running a digital safety class. This curriculum was created for a Defend and Detox event for women in New York City to teach the digital women how to protect herself online. The curriculum can be adapted for women anywhere.
The Security Question Test is a simulation intended to show how easy it is to share personal information.thimbleprojects.org
Mozilla Privacy Toolkit Handout.
Data Security Exchange. Civil society organizations face a number of different threats. We link them with digital security providers to help.
Speak Up & Stay Safe(r): A Guide to Protecting Yourself From Online Harassment
A Guide to Protecting Yourself From Online Harassment Feeling overwhelmed? Don't have time to read the whole thing…onlinesafety.feministfrequency.com
Security in a Box — Digital security tools and tactics. The Tactics Guides in this toolkit cover basic principles, including advice on how to use social media and mobile phones more safely. The Tool Guides offer step-by-step instructions to help you install, configure and use some essential digital security software and services.
Security in a Box - Digital security tools and tacticssecurityinabox.org
Accessnow. Access Now defends and extends the digital rights of users at risk around the world. By combining direct technical support, comprehensive policy engagement, global advocacy, grassroots grantmaking, and convenings such as RightsCon, we fight for human rights in the digital age.
We have shared the entire project on GitHub. Feel free to comment, fork, or contact us there! The U.S. elections and…www.accessnow.org
Data Detox kits: Small steps to change your habits and reduce data traces. The Data Detox Kit is an 8-day step-by-step guide on how to reduce data traces online. Each day has a different focus — from cleaning up your apps, to social media, to your phone’s connectivity — informing you of the data processes, walking you through some changes you can make, and giving you a small challenge at the end of each day.
Open Web Application Security Project (OWASP) is a worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible in order to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide.
There are thousands of active wiki users around the globe who review the changes to the site to help ensure quality. If…www.owasp.org
Motherboard. A Practical Checklist For Leading Your First Training.Do you want to teach people about infosec, opsec and how to stay safe online? Here’s where to start.
Articles worth Reading
How To Make Sure Your Home Address Isn’t Easily Available Online
This week, I stumbled across this thread on Twitter. And I was stunned. In it, a (rightly) concerned citizen of the…www.autostraddle.com
Remember Gamergate? Or when the identity of that dentist who killed Cecil the Lion was posted? Or that man who was…www.propublica.org
How to Use Signal Without Giving Out Your Phone Number
Just a few years ago, sending encrypted messages was a challenge. Just to get started, you had to spend hours following…theintercept.com
Don’t like being tracked online? Set up a VPN in 5 min for free
“A computer lets you make more mistakes faster than any other invention with the possible exceptions of handguns and…medium.freecodecamp.org
A DIY Guide to Feminist Cybersecurity
Your casual internet browsing yields a treasure trove of personal data for anyone who can see what you're doing…hackblossom.org
Phishing’s No Phun; Here’s How To Resist The Bait
feature image via Shutterstock. Likely you've heard about the massive phishing scam of the week. Some malicious human…www.autostraddle.com
Equality Labs Privacy + Security Curriculum Guide
This curriculum was co-developed by qualified digital security trainers of color who have experience working in…www.equalitylabs.org
For this exercise, I decided to pick a highly controversial political topic: Facts. I believe that what we know about…theintercept.com
While the indictment of Julian Assange centers on an alleged attempt to break a password-an attempt that was not…freedom.press
There are dozens of messaging apps for iPhone and Android, but one in particular continues to stand out in the crowd…theintercept.com
Encrypting Your Laptop Like You Mean It
TIME AND AGAIN, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass…theintercept.com
Free professional resources, conferences, podcasts and webinars
OWASP Global Appsec
Daily Stormcasts by SANS Internet Stormcasts
Crypto Gram Security Podcasts
The Hated One
Security Now with Steve Gibson
Down the Security Rabbit Hole
Resources and Webinars :
Motherboard's Lorenzo Franceschi-Bicchierai explains what threat modeling is, and how it can keep you - and your data …video.vice.com
IT Security Training & Resources by Infosecresources.infosecinstitute.com
Thanks for Reading.
If anything is to be added to the list, please ping me @Kai Iyer.