- We've posted a prep sheet for Monday's Encryption & Operational Security for Journalists event. Read it here: j.mp/15qyvUg #hhnyc
http://twitter.com/HacksHackersNYC/status/378616380972892160
— Hacks/Hackers NYC (@HacksHackersNYC)Fri, Sep 13 2013 20:29:14 - Coming to tonight’s @HacksHackersNYC crypto/security for journalists event? 1: Download tools ahead of time: github.com/hackshackers/h…
http://twitter.com/mtigas/status/379631767504027648
— Mike Tigas (@mtigas)Mon, Sep 16 2013 15:44:01 - Interested in another encryption & install fest? Join the current wait list — we're using it to gauge interest: j.mp/hhnyc-130916
http://twitter.com/HacksHackersNYC/status/378551593236709376
— Hacks/Hackers NYC (@HacksHackersNYC)Fri, Sep 13 2013 16:11:47 - NSA isn't your worry. Leak investigations, subpoenas, accidental disclosure & chilling effects on sources are. —@JenValentino #hhnyc
http://twitter.com/HacksHackersNYC/status/379745475366514688
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:15:51 - Example of leaks: James Rosen (Fox reporter) Gen. Petraeus ("not journalism related, but still interesting") & John McAfee of Vice. #hhnyc
http://twitter.com/HacksHackersNYC/status/379746175827861504
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:18:38 - Reasons journos need security: 1. Prepare yourself for the day you may have more sensitive work. —@JenValentino
http://twitter.com/HacksHackersNYC/status/379746384200876032
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:19:28 - Reasons journos need security: 2. Protect other journos by normalizing security, making it less of a "red flag." —@JenValentino #hhnyc
http://twitter.com/HacksHackersNYC/status/379746534822510592
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:20:03 - Caveats: Encryption can be a red flag. Security is only as good as your weakest link. —@jenvalentino (1/2)
http://twitter.com/HacksHackersNYC/status/379746834400681984
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:21:15 - Caveats: If a gov't actor really wants into your machine, it will crack it. (2/2) —@jenvalentino #hhnyc
http://twitter.com/HacksHackersNYC/status/379746947969867776
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:21:42 - If your work is v. sensitive, operational security is equally important. It's also tedious and difficult. —@jenvalentino #hhnyc
http://twitter.com/HacksHackersNYC/status/379747216757645312
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:22:46 - Threat modeling: Know your adversary & what they can do. What are you concerned about? (subpoenas, phone tracking, your own employer) #hhnyc
http://twitter.com/HacksHackersNYC/status/379747455711330304
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:23:43 - .@jenvalentino suggest journos read this overview to help you think about threat modeling: j.mp/1972cau #hhnyc
http://twitter.com/HacksHackersNYC/status/379747740760420353
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:24:51 - Tools we'll be installing tonight (complete list: j.mp/165ohv1) #hhnyc
http://twitter.com/HacksHackersNYC/status/379748175525187584
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:26:35 - Tor Browser Bundle, helps anonymize 'net activities, including browsing & IM. Weakness: Slow. Last link is in the clear #hhnyc
http://twitter.com/HacksHackersNYC/status/379748288280682497
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:27:01 - Encrypted chat via Adium for Mac, Pidgin for Windows + an additional feature called Off the Record (OTR). #hhnyc
http://twitter.com/HacksHackersNYC/status/379748520401854464
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:27:57 - Encrypted chat with OTR makes text unintelligible to observer; if used w/Tor, metadata is hidden. Weakness: Chat clients are vulnerable.
http://twitter.com/HacksHackersNYC/status/379748747791847424
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:28:51 - PGP / GPG (open source) encodes text and files. It works using a key system. #hhnyc
http://twitter.com/HacksHackersNYC/status/379749025270210560
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:29:57 - PGP email more easily sends PGP messages. Weaknesses: Does not protect metadata, i.e., subject line, addresses #hhnyc
http://twitter.com/HacksHackersNYC/status/379749201221263360
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:30:39 - CryptoCat is a good training tool for getting the newsroom into the habit of using crypto, however… #HHNYC
http://twitter.com/HacksHackersNYC/status/379750073867177984
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:34:07 - Weaknesses: CryptoCat is very young, anyone with your chatroom name can join, there's a lack of verification in group chats #hhnyc
http://twitter.com/HacksHackersNYC/status/379750164908740608
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:34:29 - .@jenvalentino recommends using CryptoCat primarily as a training tool, but not for communicating outside the newsroom. #hhnyc
http://twitter.com/HacksHackersNYC/status/379750347730092032
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:35:12 - .@jenvalentino will post her slides online after the event. And now we begin the install fest: j.mp/165ohv1 #hhnyc
http://twitter.com/HacksHackersNYC/status/379753638299983872
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:48:17 http://twitter.com/HacksHackersNYC/status/379754230380507136
— Hacks/Hackers NYC (@HacksHackersNYC)Mon, Sep 16 2013 23:50:38- Now that was a great talk & an intense install fest. Thanks @jenvalentino & @mtigas! & thanks, @Meetup, for hosting! #hhnyc
http://twitter.com/HacksHackersNYC/status/379787093482160128
— Hacks/Hackers NYC (@HacksHackersNYC)Tue, Sep 17 2013 02:01:13 - Slides from @jennifervalentino's encryption talk: j.mp/18thDP1 & installation details from @mtigas: j.mp/1gqNHlN #hhnyc
http://twitter.com/HacksHackersNYC/status/379791247076229120
— Hacks/Hackers NYC (@HacksHackersNYC)Tue, Sep 17 2013 02:17:44
Operational Security for Journalists
Hacks/Hackers NYC offered a "Bootcamp" on encryption and operational security for journalists. Here are tools and techniques recommended by Jennifer Valentino-DeVries (@jenvalentino), a reporter at The Wall Street Journal, and Mike Tigas (@mtigas), developer of a Tor-power browser for iOS.
by
Justin Lancy37 Views
Justin Lancy37 Views
