The Cryptoparty Handbook
Adam Hyde
Computers & Technology
The Cryptoparty Handbook
Free
Description
Contents
Reviews

Attend a CryptoParty to learn and teach how to use basic cryptography tools . A CryptoParty is free, public and fun. It is an open format where everyone is welcome independent of their age, gender or knowledge. People bring their computers, mobile devices, and a willingness to learn! CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the Tor anonymity network, public key encryption (PGP/GPG), and OTR (Off The Record messaging).



The CryptoParty Handbook tries to provide a comprehensive guide to the various topics that might come up while investigating the realms of computer and internet security and is designed to be a practical guide during Cryptoparties.


To ensure you have downloaded correct files, you should always check the integrity of downloaded files using commands like sha256sum and compare the resulting hashes against hashes provided by other sources. So if you spread the news about the book, please spread the hashes as well! :
cryptoparty.epub 305055fce24180dfef4e530a0b73c8c598ce2667068f31fb1cc0dc3d4320ad5d

cryptoparty.mobi 281a1689d38f29bde24f2a0de71630a2ffdf925cf453f94622321fe156c7d1b1

cryptoparty.pdf c9299ab65fe3d959aa7d42bcbca0418dc6191d0e123b70799673df2aa0936c7b

Language
English
ISBN
Unknown
the CryptoParty handbook
Introducing Cryptoparty
A CryptoParty History: Party Like It's 1984
A CryptoParty Manifesto
How To CryptoParty
Why Privacy Matters
About This Book
Understanding Email
Basic Tips
In brief:
Passwords
Reading Email in Public Places
Cache Cunning
Securing your communication
Account Separation
A note about hosted email
Types of Email
Remotely hosted email ('webmail'), resourced using a web browser
Remotely hosted email, resourced using an email program or using a web browser
Context considerations
Self-administered email server
'Free' email services
Non-profit
Notes on email forwarding
Fears
Random abuse and theft by malicious hackers
Targeted abuse, harassment, and spying
When Encryption Goes Wrong
Secure Connections
Can other people read along when I check my email?
Notes
Secure Emails
What software can I use to encrypt my email?
Understanding Browsing
Basic Tips
In Brief:
Your browser talks about you behind your back
Web sites can track you as you browse
Searching online can give away information about you
More eyes than you can see
Your right to be unknown
Fears
Social Networking - what are the dangers?
Who can steal my identity?
Wireless networks
The browser cache
Securing your line
Can I get in trouble for Googling weird stuff?
Who is keeping a record of my browsing and am I allowed to hide from them?
How to not reveal my Identity?
How to avoid being tracked?
What happens when you browse
A topography of you: footprints
Accounts and Security
Can malicious web sites take over my accounts?
Tracking
How do they track us?
How can I prevent tracking?
A word of warning
Anonymity
Intro
Proxy
Tor
VPN
Publishing And Distribution
Publishing Anonymously
Several Don'ts
Anonymous Email
Sending From Throw-away Email Accounts
Be Careful about what you say!
File Sharing
BitTorrent
SoulSeek
I2P
Secure Calls And Sms
Secure Calls
Secure Messaging
Basic Email Security
Start Using Thunderbird
Installing Thunderbird on Windows
Installing Thunderbird on Ubuntu
Installing Thunderbird on Ubuntu 12.04 or newer
Installing Thunderbird on Mac OS X
Starting Thunderbird for the first time
Setting up secure connections
Configuration requirements
Preparing a Gmail account for use with Thunderbird
Configuring Thunderbird to use SSL/TLS
Manual setup
Finishing the setup, different encryption methods
Returning to the configuration screens
Some Additional Security Settings
Junk mail settings
Scam detection and warning system
Anti-virus integration
Set a master password
Adaptive junk mail controls
Email Encryption
Introducing mail encryption (PGP)
Using a key-pair to encrypt your mail
Sending encrypted mails to other people: you need their public key
Receiving encrypted mails from other people: they need my public key
Conclusion: encryption requires public key distribution!
Installing PGP on Windows
Installing PGP (GPG) on Microsoft Windows
Installing with the Enigmail extension
Installation steps
Installing PGP on OSX
Getting started
Downloading and installing the Software
Installing up Engimail
Installing PGP on Ubuntu
Installing GPG on Android
APG
GPG enabled e-mail on Android: K-9 Mail
Creating your PGP keys
Daily PGP usage
Encrypting attachments
Entering your pass-phrase
Receiving encrypted e-mails
Sending and receiving public keys
Receiving public keys and adding them to your keyring
Using public key servers
Signing emails to an individual
Sending encrypted mails to an individual
Automating encryption to certain recipients
Verifying incoming e-mails
Revoking your GPG key-pair
What to do when you have lost your secret key, or forgot your passphrase
What to do when your secret key has been stolen, or compromised
Receiving a revocation certificate
Preparing for the worst: backup your keys
Further reading
Webmail and PGP
Safer Browsing
Accessing Firefox on Ubuntu
Installing on Mac OS X
Installing Firefox on Windows
Windows Vista Users
Troubleshooting
Extending Firefox
HTTPS Everywhere
Installation
Configuration
Usage
If networks block HTTPS
Adding support for additional sites in HTTPS Everywhere
Adblock Plus
Getting started with Adblock Plus
Choosing a filter subscription
Creating personalized filters
Enabling and disabling AdBlock Plus for specific elements or Web sites
Other extensions that can improve your security
Proxy Settings
Default Firefox proxy configuration
Using Tor?
Using Tor Browser Bundle
Downloading Tor Browser Bundle
Installing from a single file
Installing from split files
Using Tor Browser
Browsing the Web using Tor Browser
If this does not work
Extending Google Chrome
Disabling Instant Search
AdBlock for Chrome
HTTPS Everywhere
PrivacyFix
Passwords
Keeping passwords safe
Password length and complexity
Easy to remember and secure passwords
Minimizing damage
Using a password manager
Physical protection
Other caveats
Installing KeePass
Installing KeePassX on Ubuntu
Installing KeePass on Windows
Installing KeePass on Mac OS X
Encrypting Passwords with a Password Manager
Encrypting Passwords with KeePassX on Ubuntu
Encrypting Passwords with KeePass on Windows
Encrypting Passwords with Keychain on Mac OSX
Using Vpn
Getting, setting-up and testing a VPN account
An account from a commercial VPN provider
Setting up OpenVPN client
VPN on Ubuntu
Preparing Network Manager for VPN networks
Installing OpenVPN extension for Network Manager
Configuring an OpenVPN network
Using your new VPN connection
VPN on MacOSX
Setup
VPN on Windows
Setup
Making Sure Your VPN Works
Disk Encryption
Installing TrueCrypt
Installing on Ubuntu/Debian
Installing on OSX
Installing on Windows
Using TrueCrypt
Creating a TrueCrypt Container
Mounting the Encrypted Volume
What does this mean?
Remember to dismount!
Setting up a hidden volume
Securely destroying data
A note on Solid State Hard Drives
Securely delete data under Windows
Securely delete data under MacOSX
Erasing Free Space
Securely Erasing Files
Securely delete data under Ubuntu/Linux
Call Encryption
Installing CSipSimple
Introducing The OSTN Network
CSipSimple
Instant Messaging Encryption
Setting up Encrypted Instant Messaging
Android - Installing Gibberbot
iOS - Installing ChatSecure
Ubuntu - Installing Pidgin
OS X - Installing Adium
Windows - Installing Pidgin
All OS - crypto.cat
Chat Log Files
Secure File Sharing
Installing I2P on Ubuntu Lucid Lynx (and newer) and derivatives like Linux Mint & Trisquel
Instructions for Debian Lenny and newer
Starting I2P
Anonymous Bittorrent with I2PSnark
Appendices
The necessity of Open Source
Cryptography and Encryption
Encryption examples
A Warning!
Historical ciphers
Modern ciphers
Quantum Cryptography
Challenges & Implications
Glossary
aggregator
anonymity
anonymous remailer
ASP (application service provider)
backbone
badware
bandwidth
bash (Bourne-again shell)
BitTorrent
blacklist
bluebar
block
bookmark
bridge
brute-force attack
cache
censor
censorware
CGI (Common Gateway Interface)
chat
cipher
circumvention
Common Gateway Interface
command-line interface
cookie
country code top-level domain (ccTLD)
cryptography
DARPA (Defense Advanced Projects Research Agency)
decryption
disk encryption
domain
DNS (Domain Name System)
DNS leak
DNS server
DNS tunnel
e-mail
embedded script
encryption
exit node
file sharing
file spreading engine
filter
Firefox
forum
frame
FTP (File Transfer Protocol)
full disk encryption
gateway
GNU Privacy Guard
GPG
honeypot
hop
HTTP (Hypertext Transfer Protocol)
HTTPS (Secure HTTP)
IANA (Internet Assigned Numbers Authority)
ICANN (Internet Corporation for Assigned Names and Numbers)
Instant Messaging (IM)
Internet
IRC (Internet relay chat)
ISP (Internet Service Provider)
JavaScript
KeePass, KeePassX
keychain software
keyword filter
latency
log file
low-bandwidth filter
malware
man in the middle
middleman node
monitor
network address translation (NAT)
network operator
node
non-exit node
obfuscation
open node
OTR/Off-the-Record messaging
packet
password manager
pastebin
peer-to-peer
perfect forward secrecy
Pretty Good Privacy (PGP)
PHP
plain text
plaintext
privacy
private key
POP3
port
protocol
proxy server
Psiphon node
private node
public key
public key encryption/public-key cryptography
publicly routable IP address
regular expression
remailer
router
root name server
RSS (Real Simple Syndication)
scheme
shell
SOCKS
screenlogger
script
smartphone
spam
SSH (Secure Shell)
SSL (Secure Sockets Layer)
steganography
subdomain
threat analysis
Top-Level Domain (TLD)
TLS (Transport Layer Security)
TCP/IP (Transmission Control Protocol over Internet Protocol)
Tor bridge
traffic analysis
tunnel
UDP (User Datagram Packet)
URL (Uniform Resource Locator)
Usenet
VPN (virtual private network)
whitelist
World Wide Web (WWW)
Webmail
Web proxy
WHOIS
The book hasn't received reviews yet.