
Attend a CryptoParty to learn and teach how to use basic cryptography tools . A CryptoParty is free, public and fun. It is an open format where everyone is welcome independent of their age, gender or knowledge. People bring their computers, mobile devices, and a willingness to learn! CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the Tor anonymity network, public key encryption (PGP/GPG), and OTR (Off The Record messaging).
The CryptoParty Handbook tries to provide a comprehensive guide to the various topics that might come up while investigating the realms of computer and internet security and is designed to be a practical guide during Cryptoparties.
To ensure you have downloaded correct files, you should always check the integrity of downloaded files using commands like sha256sum and compare the resulting hashes against hashes provided by other sources. So if you spread the news about the book, please spread the hashes as well! :
cryptoparty.epub 305055fce24180dfef4e530a0b73c8c598ce2667068f31fb1cc0dc3d4320ad5d
cryptoparty.mobi 281a1689d38f29bde24f2a0de71630a2ffdf925cf453f94622321fe156c7d1b1
cryptoparty.pdf c9299ab65fe3d959aa7d42bcbca0418dc6191d0e123b70799673df2aa0936c7b
- the CryptoParty handbook
- Introducing Cryptoparty
- A CryptoParty History: Party Like It's 1984
- A CryptoParty Manifesto
- How To CryptoParty
- Why Privacy Matters
- About This Book
- Understanding Email
- Basic Tips
- In brief:
- Passwords
- Reading Email in Public Places
- Cache Cunning
- Securing your communication
- Account Separation
- A note about hosted email
- Types of Email
- Remotely hosted email ('webmail'), resourced using a web browser
- Remotely hosted email, resourced using an email program or using a web browser
- Context considerations
- Self-administered email server
- 'Free' email services
- Non-profit
- Notes on email forwarding
- Fears
- Random abuse and theft by malicious hackers
- Targeted abuse, harassment, and spying
- When Encryption Goes Wrong
- Secure Connections
- Can other people read along when I check my email?
- Notes
- Secure Emails
- What software can I use to encrypt my email?
- Understanding Browsing
- Basic Tips
- In Brief:
- Your browser talks about you behind your back
- Web sites can track you as you browse
- Searching online can give away information about you
- More eyes than you can see
- Your right to be unknown
- Fears
- Social Networking - what are the dangers?
- Who can steal my identity?
- Wireless networks
- The browser cache
- Securing your line
- Can I get in trouble for Googling weird stuff?
- Who is keeping a record of my browsing and am I allowed to hide from them?
- How to not reveal my Identity?
- How to avoid being tracked?
- What happens when you browse
- A topography of you: footprints
- Accounts and Security
- Can malicious web sites take over my accounts?
- Tracking
- How do they track us?
- How can I prevent tracking?
- A word of warning
- Anonymity
- Intro
- Proxy
- Tor
- VPN
- Publishing And Distribution
- Publishing Anonymously
- Several Don'ts
- Anonymous Email
- Sending From Throw-away Email Accounts
- Be Careful about what you say!
- File Sharing
- BitTorrent
- SoulSeek
- I2P
- Secure Calls And Sms
- Secure Calls
- Secure Messaging
- Basic Email Security
- Start Using Thunderbird
- Installing Thunderbird on Windows
- Installing Thunderbird on Ubuntu
- Installing Thunderbird on Ubuntu 12.04 or newer
- Installing Thunderbird on Mac OS X
- Starting Thunderbird for the first time
- Setting up secure connections
- Configuration requirements
- Preparing a Gmail account for use with Thunderbird
- Configuring Thunderbird to use SSL/TLS
- Manual setup
- Finishing the setup, different encryption methods
- Returning to the configuration screens
- Some Additional Security Settings
- Junk mail settings
- Scam detection and warning system
- Anti-virus integration
- Set a master password
- Adaptive junk mail controls
- Email Encryption
- Introducing mail encryption (PGP)
- Using a key-pair to encrypt your mail
- Sending encrypted mails to other people: you need their public key
- Receiving encrypted mails from other people: they need my public key
- Conclusion: encryption requires public key distribution!
- Installing PGP on Windows
- Installing PGP (GPG) on Microsoft Windows
- Installing with the Enigmail extension
- Installation steps
- Installing PGP on OSX
- Getting started
- Downloading and installing the Software
- Installing up Engimail
- Installing PGP on Ubuntu
- Installing GPG on Android
- APG
- GPG enabled e-mail on Android: K-9 Mail
- Creating your PGP keys
- Daily PGP usage
- Encrypting attachments
- Entering your pass-phrase
- Receiving encrypted e-mails
- Sending and receiving public keys
- Receiving public keys and adding them to your keyring
- Using public key servers
- Signing emails to an individual
- Sending encrypted mails to an individual
- Automating encryption to certain recipients
- Verifying incoming e-mails
- Revoking your GPG key-pair
- What to do when you have lost your secret key, or forgot your passphrase
- What to do when your secret key has been stolen, or compromised
- Receiving a revocation certificate
- Preparing for the worst: backup your keys
- Further reading
- Webmail and PGP
- Safer Browsing
- Accessing Firefox on Ubuntu
- Installing on Mac OS X
- Installing Firefox on Windows
- Windows Vista Users
- Troubleshooting
- Extending Firefox
- HTTPS Everywhere
- Installation
- Configuration
- Usage
- If networks block HTTPS
- Adding support for additional sites in HTTPS Everywhere
- Adblock Plus
- Getting started with Adblock Plus
- Choosing a filter subscription
- Creating personalized filters
- Enabling and disabling AdBlock Plus for specific elements or Web sites
- Other extensions that can improve your security
- Proxy Settings
- Default Firefox proxy configuration
- Using Tor?
- Using Tor Browser Bundle
- Downloading Tor Browser Bundle
- Installing from a single file
- Installing from split files
- Using Tor Browser
- Browsing the Web using Tor Browser
- If this does not work
- Extending Google Chrome
- Disabling Instant Search
- AdBlock for Chrome
- HTTPS Everywhere
- PrivacyFix
- Passwords
- Keeping passwords safe
- Password length and complexity
- Easy to remember and secure passwords
- Minimizing damage
- Using a password manager
- Physical protection
- Other caveats
- Installing KeePass
- Installing KeePassX on Ubuntu
- Installing KeePass on Windows
- Installing KeePass on Mac OS X
- Encrypting Passwords with a Password Manager
- Encrypting Passwords with KeePassX on Ubuntu
- Encrypting Passwords with KeePass on Windows
- Encrypting Passwords with Keychain on Mac OSX
- Using Vpn
- Getting, setting-up and testing a VPN account
- An account from a commercial VPN provider
- Setting up OpenVPN client
- VPN on Ubuntu
- Preparing Network Manager for VPN networks
- Installing OpenVPN extension for Network Manager
- Configuring an OpenVPN network
- Using your new VPN connection
- VPN on MacOSX
- Setup
- VPN on Windows
- Setup
- Making Sure Your VPN Works
- Disk Encryption
- Installing TrueCrypt
- Installing on Ubuntu/Debian
- Installing on OSX
- Installing on Windows
- Using TrueCrypt
- Creating a TrueCrypt Container
- Mounting the Encrypted Volume
- What does this mean?
- Remember to dismount!
- Setting up a hidden volume
- Securely destroying data
- A note on Solid State Hard Drives
- Securely delete data under Windows
- Securely delete data under MacOSX
- Erasing Free Space
- Securely Erasing Files
- Securely delete data under Ubuntu/Linux
- Call Encryption
- Installing CSipSimple
- Introducing The OSTN Network
- CSipSimple
- Instant Messaging Encryption
- Setting up Encrypted Instant Messaging
- Android - Installing Gibberbot
- iOS - Installing ChatSecure
- Ubuntu - Installing Pidgin
- OS X - Installing Adium
- Windows - Installing Pidgin
- All OS - crypto.cat
- Chat Log Files
- Secure File Sharing
- Installing I2P on Ubuntu Lucid Lynx (and newer) and derivatives like Linux Mint & Trisquel
- Instructions for Debian Lenny and newer
- Starting I2P
- Anonymous Bittorrent with I2PSnark
- Appendices
- The necessity of Open Source
- Cryptography and Encryption
- Encryption examples
- A Warning!
- Historical ciphers
- Modern ciphers
- Quantum Cryptography
- Challenges & Implications
- Glossary
- aggregator
- anonymity
- anonymous remailer
- ASP (application service provider)
- backbone
- badware
- bandwidth
- bash (Bourne-again shell)
- BitTorrent
- blacklist
- bluebar
- block
- bookmark
- bridge
- brute-force attack
- cache
- censor
- censorware
- CGI (Common Gateway Interface)
- chat
- cipher
- circumvention
- Common Gateway Interface
- command-line interface
- cookie
- country code top-level domain (ccTLD)
- cryptography
- DARPA (Defense Advanced Projects Research Agency)
- decryption
- disk encryption
- domain
- DNS (Domain Name System)
- DNS leak
- DNS server
- DNS tunnel
- embedded script
- encryption
- exit node
- file sharing
- file spreading engine
- filter
- Firefox
- forum
- frame
- FTP (File Transfer Protocol)
- full disk encryption
- gateway
- GNU Privacy Guard
- GPG
- honeypot
- hop
- HTTP (Hypertext Transfer Protocol)
- HTTPS (Secure HTTP)
- IANA (Internet Assigned Numbers Authority)
- ICANN (Internet Corporation for Assigned Names and Numbers)
- Instant Messaging (IM)
- Internet
- IRC (Internet relay chat)
- ISP (Internet Service Provider)
- JavaScript
- KeePass, KeePassX
- keychain software
- keyword filter
- latency
- log file
- low-bandwidth filter
- malware
- man in the middle
- middleman node
- monitor
- network address translation (NAT)
- network operator
- node
- non-exit node
- obfuscation
- open node
- OTR/Off-the-Record messaging
- packet
- password manager
- pastebin
- peer-to-peer
- perfect forward secrecy
- Pretty Good Privacy (PGP)
- PHP
- plain text
- plaintext
- privacy
- private key
- POP3
- port
- protocol
- proxy server
- Psiphon node
- private node
- public key
- public key encryption/public-key cryptography
- publicly routable IP address
- regular expression
- remailer
- router
- root name server
- RSS (Real Simple Syndication)
- scheme
- shell
- SOCKS
- screenlogger
- script
- smartphone
- spam
- SSH (Secure Shell)
- SSL (Secure Sockets Layer)
- steganography
- subdomain
- threat analysis
- Top-Level Domain (TLD)
- TLS (Transport Layer Security)
- TCP/IP (Transmission Control Protocol over Internet Protocol)
- Tor bridge
- traffic analysis
- tunnel
- UDP (User Datagram Packet)
- URL (Uniform Resource Locator)
- Usenet
- VPN (virtual private network)
- whitelist
- World Wide Web (WWW)
- Webmail
- Web proxy
- WHOIS
Free Machine Learning Books
11 Books
- Pattern Recognition and Machine Learning (Information Science and Statistics)
- by Christopher M. Bishop
- Data mining
- by I. H. Witten
- The Elements of Statistical Learning: Data Mining, Inference, and Prediction
- by Various
Free Chemistry Textbooks
8 Books
- CK-12 Chemistry
- by Various
- Chemistry Grade 10 [CAPS]
- by Free High School Science Texts Project
- General Chemistry II
- by John Hutchinson
Free Mathematics Textbooks
21 Books
- Microsoft Word - How to Use Advanced Algebra II.doc
- by Jonathan Emmons
- Advanced Algebra II: Activities and Homework
- by Kenny Felder
- de2de
- by
Free Children Books
38 Books
- The Sun Who Lost His Way
- by
- Tania is a Detective
- by Kanika G
- Firenze_s-Light
- by
Free Java Books
10 Books
- Java 3D Programming
- by Daniel Selman
- The Java EE 6 Tutorial
- by Oracle Corporation
- JavaKid811
- by
- Jamaica Primary Social Studies 2nd Edition Student's Book 4
- by Eulie Mantock, Trineta Fendall, Clare Eastland
- Reggae Readers Student's Book 1
- by Louis Fidge
- Reggae Readers Student's Book 2
- by Louis Fidge