This site available here: https://tinyurl.com/dlinqcrypto

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/c6c12df0-ee38-4404-9264-07c31f9b61d8/Middlebury.png

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/e0ef2127-0e3a-4477-bb48-b480af014486/VqjNaRDX257jNtmUkQvWWpqaALAWKC1W-v0bI4t_XPMJ6pcke_DZ6XBXth4OQ2iTwIbCJuL-iUUq-p4d-ZK-KaoNCfcTlMskOEMLNp24TITYA1ZUEtkM1STnjO6li1dyMiaB1oq8oJYJMQva5cungdwBWgkmx5Mtl3hr6EcSIuGm9UmXlVRS0SEiNHakcf6-J_SiBpWCsN8d7gMFS-1wOj_w391.jpg

Overview / Plan

12:00 - 12:20 DLC Design Space Set Up & Getting Settled

12:20 - :25 Welcome & Rules of engagement

Be excellent to each other

No harassment tolerated

Permission to ask silly questions granted

Honor the vault of confidentiality

Other people’s keyboards are lava!

12:25 - :45 Introduction - Why a CryptoParty?

DLINQ is partnering to organize cryptoparties as an extension of our mission to advance our collective understanding of how our lives are impacted by the digital realm. Events like this help expand how we think about complex issues like digital privacy and data, empowering us to take more control. Such conversations and explorations may also help us normalize alternative digital practices as we navigate issues of privacy and security.

<aside> 💡 The United Nations Declaration of Human Rights, Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

</aside>

[(5 minutes) source: https://donottrack-doc.com/en/](https://donottrack-doc.com/en/episode/1)

(5 minutes) source: https://donottrack-doc.com/en/

(Toby 10 mins) Intro to threat modeling see: https://ssd.eff.org/en/module/your-security-plan

<aside> 💡 A way of thinking about the sorts of protection you want for your data so you can decide which potential threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. https://ssd.eff.org/en/glossary/threat-model

</aside>

Organizational Risk Assessment

How do these quantitative strategies boil down to the individual?

1-2-All Discussion: We've asked you to bring your personal phone device or laptop to today's session. Take a quiet moment to consider the following:

Threat Modeling Questions:

Additional resources:

Trace My Shadow, Tactical Technology Collective

Surveillance Self Defense, Electronic Frontier Foundation

12:45 - 1:30 Breakout Topics with Guides (15 minute sessions)