Stop being watched - Online Privacy Bootcamp
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
The long war with Eurasia drags on, and your dangerous doublethink is starting to pique the interest of those of us that know best for you.
Of course, you have nothing to hide.
The watchers are watching - and they're getting better at it. You need tools. Let's go over them, as well as the current best practices to use them effectively.
Let's also have a bit of snarky fun.
Course may include Adult Situations and Language, Mild Violence, Nudity, Firearms, Burning buildings, and Colonel Sanders. Viewer discretion is advised.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
Welcome to stop being watched.
Here's my "mashup" introduction.
My use of rage faces is, of course, ironic - because I am a cypherpunk hipster.AND FOR THOSE OF YOU THAT LOVE LINKS:
|Section 1: Browsing|
An introduction to Tor, via the TBB
Adjust the rearview, empty the ashtray, pop the clutch, loosen your scarf.
Here are some you might find interesting:
|Section 2: Email|
Side note: I really really promise to get a better audio rig once I've shoveled my way out from under your veritable snowdrifts of money.
This section is about using TAILS to set up an email account with tormail.
Here's the command to generate a key:
gpg --gen-keyHere's how to export yours so others can use it:
gpg --armor --export
Here is how to import a key (use CTRL-D when you're done):
|Tormail - a free email service that bridges .onion sites and the "real" internet - to sign up you'll need to visit their .onion|
Configuring claws with pincers:
Setting up Claws - IMAP:
Setting up Claws - SMTP:
Choosing a passphrase can be daunting, but here are some protips.
Web of trust
I keep avoiding it, because in my experience for webs of radius greater than about two, the SNR gets to be so high that you may as well not be using it. Either people make mistakes and sign keys they didn't mean to, or you're conversing with someone you'll never meet in person anyway. SSL certificates suffer from the same sorts of problems. See also.
WE MADE IT.I will now return to a more irreverent form of instruction, as I was about ready to launch my monitor through the window after recording this.
|Section 3: Chat|
|Section 4: Gotchas and No-Nos|
How a clipboard slip can ruin your whole day.
|Section 5: Denouement|
Those of you that have a firm grasp on visages of random historical figures should be in for a treat! Hoo hoo! Try to keep your vicious knee-slapping to a minimum so that you do not disrupt the rest of the class.
|Lecture 13||1 page|
Sorry the links don't come through the in-browser .pdf viewer... Thanks, guys.
If you download it, you can click through to all sorts of exciting, freemium content!
Andrew is the network operations manager for an all fiber-optic ISP in Oregon, having worked his way up from being the only other technician there over mumble mumble years ago. He keeps his staff simultaneously entertained and fearing for their safety.
He has spent twenty five years in various technology fields - including assembly language and driver development, writing web services in Python, network troubleshooting and penetration testing, deployment of VoIP services, and domain-specific language design. Returning from nearly every vacation he's ever taken, the office has been described as "eerily quiet" while he was away.
Andrew is a lifelong polymath, and strives to bring students a nonlinear teaching style full of interesting side notes, etymology, pertinent historical perspective, and the je ne sais quoi of his own bombastic personal narrative.
He demonstrates code related to udemy at this site.