Material: Tails USB keys freshly cut, Threat modeling sheet, one spare laptop (contact person @tom)
Signage: CIJ t-shirts (contact person @tom), posters designed by @fabionatali and printed by @tom (2 of each)
Wifi: @fabionatali has a portable 4G hotspot that has been tested to work with Tor. @tom should be able to buy a SIM card from the same phone company.
We expect good mix of both people working in large newsrooms and independent freelancers so the tools we recommend really depend on their particular environment and projects, of course.
It does get busy and we work on a drop in basis - so if someone comes up to you and you end up showing them how to install/use Signal, for example, we usually say to the other people on the table that I’m about to do a Signal install for encrypted messaging/VOIP on phones if anyone wants to join in.
For the record, here is the talk description that was submitted & accepted:
title: Get your secure leak platform today
description: Investigative journalists should maintain a secure communication channel for exchanging information and documents with their sources. You may think that such channels are difficult and expensive to set up and operate, but the contrary is true: it is simple and cheap. If all you understand about security is that HTTPS is a good thing, there is something for you … and it will be more secure than systems designed for receiving classified documents. Sounds like a paradox? Think about what happens when you are forced to use a password so complex no human being can remember it. It will end up being written on a sticker next to your keyboard, no longer providing any kind of security. After you learn more about security, 2FA, E2E, live systems, etc., familiarize yourself with practical solutions for applying these skills and activating stronger protection. Eventually, you will be able and equipped to protect the next Edward Snowden and save us all from George Orwell’s worst nightmare.
We have the Infosec clinic to organize together. I’m still unsure about the details and sent a mail asking the organizers where they want us to do that, for how long, etc.
The InfoSec clinic descriptions reads contact us with any specific questions beforehand.. What about adding a link to this forum thread or any other way people could use to contact us?
[WIFI] I have a portable 4G hotspot that I tested with Tor - it works; I brought it to Tom the other day with the idea that he should be able to buy a SIM card from the same phone company; Tom should get back to us in a few days
[WIFI] I was also thinking of setting up a spare machine as a backup hotspot (via a WIFI dongle) but I’m not sure I can make it on Thu, so it’s good to have the 4G hotspot working
[T-shirts] No idea about the T-shirts, sorry
[Signage] Tom should be able to print the posters we reviewed together, 2 copies for each page - we discussed this the other day, so it should be fine
Maybe worth to touch base on Mon and see if there’s any progress on the points above or anything else is needed?
On another note, I didn’t have the time to organise anything in terms of workshops, but happy to discuss this next week if you like.
Sure! I’ll also be available to help if you setup something. There are not many of us for the infosec clinic though, how can we keep the table busy if there is a workshop ?