Privacy Recipe, is a creative commons , series based on the security research, projects, and field work i have done. It is for educational purposes only.

INGREDIENTS:
1 visa/mastercard gift card or credit card not linked to you. ($25 USD)
1 new/used smartphone thats not already linked to you (optional, but recommended)
1 internet connected device, laptop, or computer.
0 previous knowledge. …


The verification process.

f754ba5880a3d3f73aaabaacce5e5e705cd78c9cab6d9df49d2efe26b77e1738


DOCUMENT LAST UPDATED: 2:45PM EST JULY 4th, 2017

Below are resources for people who attended our advanced operational security session, Beyond Tor and Signalat AMC 2017. This article will be fleshed out throughout the Summer and is part of a series. In this example we are looking at the evidence collected against Reality Winner . The idea of this session was learning from actual cases, real details, FOIA or unsealed public records, and verified published accounts of how circumvention technologies can be defeated. The hope is to improve operation security (#opsec) and glean sources, capabilities , methods of various security forces and law enforcement agencies. …


Are you attending the Allied Media Projects #AMC2017 conference ? Do you have digital security & operational security questions that you would like answered? Mozilla Open Web Fellow Matt Mitchell (matt mitchell) , Aleks (The1ncredible), Nima Fatemi, & other experts will be staffing a table in the vendor area to offer free advice and keep you safe. Free information share, knowledge shop style. More information coming soon.


AMC SESSION: Beyond “Install Tor & Signal”
Saturday, June 17 • 2:00pm — 3:30pm
State Hall Room: 111
#beyondSignalAndTor

If you are an activist in the world today, you are operating for positive change in a historic time. Some say we are creeping toward authoritarianism on a global level. We will teach you advanced methods to keep safe when using computer software, mobile apps, circumvention tech and hardware. Learn from case files of real security forces on operational security mistakes made by others. Your presenters will show you how to keep resisting in the face of highly skilled adversaries. We…


updated: June 2021

Mateo ( geminiimatt ) a.k.a matt mitchell , photo by Nick Lee

In computing command line, there is a command: $whoami. It invokes info on the user who typed it, echoed out on to the screen. The earliest versions of it are credited to Richard Mlynarik. Here is what a real-world “whoami” would echo out about yours truly.

TL;DR BIOGRAPHY

  • Tech fellow at Ford Foundation w/ BUILD: building institutions and networks
  • (former) director of digital safety & privacy at Tactical Tech
  • hacker
  • civil rights advocate
  • founder/lead CryptoHarlem
  • security researcher / bug bounty enthusiast
  • counter surveillance, Information & operational security
    trainer to NGOs, nonprofits, & journalists (via a private security firm)
  • 2020


Authors:
Rachel Weidinger
( https://twitter.com/rachelannyes )
Cooper Quintin ( https://twitter.com/cooperq )
Martin Shelton ( https://twitter.com/mshelton )
matt mitchell ( https://twitter.com/geminiimatt )

Inspired by: a session & discussion at Aspiration Tech Dev Summit 2016
Document written in: english translated to: english
First Published: February 9, 2017
Last Updated:
February 13, 2017
Expiration Date/Best By:
July 2017
License: How To Give a Digital Security Training by Rachel Weidinger, Cooper Quintin , Martin Shelton , matt mitchell is licensed under a Creative Commons Attribution 4.0 International License. This license lets others distribute, remix, tweak, and build upon our work, even commercially, as long as they credit us for…


Authors:
Rachel Weidinger
( https://twitter.com/rachelannyes )
Cooper Quintin ( https://twitter.com/cooperq )
Martin Shelton ( https://twitter.com/mshelton )
matt mitchell ( https://twitter.com/geminiimatt )

Inspired by: a session & discussion at Aspiration Tech Dev Summit 2016
Document written in: english translated to: english
First Published: November 18, 2016
License: Digital Security training resources for security trainers, Winter 2016 Edition by Rachel Weidinger, Cooper Quintin , Martin Shelton , matt mitchell is licensed under a Creative Commons Attribution 4.0 International License. This license lets others distribute, remix, tweak, and build upon our work, even commercially, as long as they credit us for the original creation. This is…

matt mitchell

technology fellow @Ford Foundation

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store