the book is on the table.
How To Create a Private Online Identity with An Anonymous Email Address and a Virtual Phone.
Research & writing by @geminiimatt
Edited by Sage C.First published: June 15, 2019
Last updated: October10, 2020
Privacy Recipe, is a creative commons , series based on the security research, projects, and field work i have done. It is for educational purposes only.
INGREDIENTS:
1 visa/mastercard gift card or credit card not linked to you. ($25 USD)
1 new/used smartphone thats not already linked to you (optional, but recommended)
1 internet connected device, laptop, or computer.
0 previous knowledge. …
The verification process.
f754ba5880a3d3f73aaabaacce5e5e705cd78c9cab6d9df49d2efe26b77e1738
To Serve The People: Public Interest Technologist
To Serve The People: Public Interest Technologist by Matt Mitchell is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at https://docs.google.com/presentation/d/15h3mh61Qhh-VmBpL_TxBdGF-KZjbNkkJa3gsCsruqlM/edit?usp=sharing.
Below are resources for people who attended our advanced operational security session, “Beyond Tor and Signal” at AMC 2017. This article will be fleshed out throughout the Summer and is part of a series. In this example we are looking at the evidence collected against Reality Winner . The idea of this session was learning from actual cases, real details, FOIA or unsealed public records, and verified published accounts of how circumvention technologies can be defeated. The hope is to improve operation security (#opsec) and glean sources, capabilities , methods of various security forces and law enforcement agencies. …
Are you attending the Allied Media Projects #AMC2017 conference ? Do you have digital security & operational security questions that you would like answered? Mozilla Open Web Fellow Matt Mitchell (matt mitchell) , Aleks (The1ncredible), Nima Fatemi, & other experts will be staffing a table in the vendor area to offer free advice and keep you safe. Free information share, knowledge shop style. More information coming soon.
AMC SESSION: Beyond “Install Tor & Signal”
Saturday, June 17 • 2:00pm — 3:30pm
State Hall Room: 111
#beyondSignalAndTor
If you are an activist in the world today, you are operating for positive change in a historic time. Some say we are creeping toward authoritarianism on a global level. We will teach you advanced methods to keep safe when using computer software, mobile apps, circumvention tech and hardware. Learn from case files of real security forces on operational security mistakes made by others. Your presenters will show you how to keep resisting in the face of highly skilled adversaries. We…
updated: September 2020
In computing command line, there is a command: $whoami. It invokes info on the user who typed it, echoed out on to the screen. The earliest versions of it are credited to Richard Mlynarik. Here is what a real-world “whoami” would echo out about yours truly.
Authors:
Rachel Weidinger ( https://twitter.com/rachelannyes )
Cooper Quintin ( https://twitter.com/cooperq )
Martin Shelton ( https://twitter.com/mshelton )
matt mitchell ( https://twitter.com/geminiimatt )
Inspired by: a session & discussion at Aspiration Tech Dev Summit 2016 Document written in: english translated to: english First Published: February 9, 2017 Last Updated: February 13, 2017 Expiration Date/Best By: July 2017 License: How To Give a Digital Security Training by Rachel Weidinger, Cooper Quintin , Martin Shelton , matt mitchell is licensed under a Creative Commons Attribution 4.0 International License. This license lets others distribute, remix, tweak, and build upon our work, even commercially, as long…
Authors:
Rachel Weidinger ( https://twitter.com/rachelannyes )
Cooper Quintin ( https://twitter.com/cooperq )
Martin Shelton ( https://twitter.com/mshelton )
matt mitchell ( https://twitter.com/geminiimatt )
Inspired by: a session & discussion at Aspiration Tech Dev Summit 2016 Document written in: english translated to: english First Published: November 18, 2016 License: Digital Security training resources for security trainers, Winter 2016 Edition by Rachel Weidinger, Cooper Quintin , Martin Shelton , matt mitchell is licensed under a Creative Commons Attribution 4.0 International License. This license lets others distribute, remix, tweak, and build upon our work, even commercially, as long as they credit us for the original…
technology fellow @Ford Foundation