Howdy! How can we help you?
-
気候変動1
-
ブラウザ72
-
戦争36
-
ヘイトスピーチ13
-
偽情報、誤情報11
-
ジェンダー3
-
国家安全保障10
-
fediverse21
-
alternative_app18
-
デジタルセキュリティツール15
-
国内の監視社会化と反監視運動6
-
VPN10
-
GIFCT2
-
政府・国際機関の動向167
-
スパイウェア20
-
OS関係20
-
教育・学校9
-
監視カメラ16
-
労働現場の監視9
-
プライバシー159
-
デジタルID(マイナンバーなど)12
-
GPS1
-
AI78
-
オリンピックと監視社会7
-
文化12
-
労働運動17
-
リンク集12
-
金融監視3
-
COVID-19と監視社会18
-
検閲110
-
海外動向417
-
オンライン会議システム14
-
暗号化69
-
アクティビストとセキュリティ32
-
ビッグテック、大量監視267
-
SNSのセキュリティ20
-
共謀罪1
-
メールのセキュリティ43
-
Articles1
(書籍)反対派を防衛する
以下に紹介されている本は下記からダウンロードできます。(英語)
反対派を防衛する
副題:社会運動のデジタル弾圧と暗号による防御
著者:Glencora Borradaile
書籍紹介:『Defend Dissent』は、米国の社会運動に焦点を当てた、監視の社会的影響と暗号化の保護の可能性を組み合わせた暗号技術の紹介である。各章の最後には、現代の米国の抗議活動に対して行われた監視から、80年代に南アフリカのアパルトヘイトと闘うためにアフリカ民族会議が使用した一部手動の暗号化まで、資料に社会的背景をもたらすストーリーが掲載されている。
この本は順を追って読むこともできるし、学びたいことを選んで読むこともできる。各章には、最初に読むべき内容(背景)が書かれており、最後に次に読むべき内容が書かれている。
日本語:パート1
出典:https://open.oregonstate.education/defenddissent/
目次
Contents
Acknowledgments
Introduction: Why Digital Security?(日本語はこちら)
Downloading a “Secure” App Isn’t Enough
Political Scope of This Book
Overview of This Book
Part 1: An Introduction to Cryptography
What Is Encryption?
A Simple Cipher: The Caesar Cipher
A Slightly More Complicated Cipher: The Vigenère Cipher
In Context: The Unbreakable Onetime Pad
Modern Cryptography
Security through Requiring Brute-Force Attacks
Security Is Not Guaranteed through Obscurity
Security Is Provided by Transparency
Security Is Provided by Protecting Your Encryption Key
Security Is Provided by Distrusting the Infrastructure
In Context: The Enigma Machine
Exchanging Keys for Encryption
A Physical Example: Exchanging a Message without Exchanging a Key
A Mathematical Example: Exchanging a Message without Exchanging a Key
A Physical Example: Agreeing on a Secret over an Insecure Channel
Diffie-Hellman Key Exchange
Using Diffie-Hellman Key Exchange
In Context: When Good Things Go Bad
Cryptographic Hash
Using Cryptographic Hash Functions to Prove How Smart You Are
What Do Hash Functions Look Like?
In Context: Cryptographic Hashes Violate Your Fourth Amendment Rights
The Man in the Middle
A Physical Man-in-the-Middle Attack
A Man-in-the-Middle Attack against Diffie-Hellman Key Exchange
Spotting a Man-in-the-Middle Attack with Cryptographic Hashes: Fingerprinting
In Context: The Great Firewall of China
Passwords
When “Password Protected” Does Not Mean Encrypted
Password Cracking
Best Practices for Passwords
Generating Encryption Keys from Passwords
In Context: When Precautions Are Not Enough
Public-Key Cryptography
Revisiting Diffie-Hellman Key Exchange: Public-Key or Symmetric-Key Cryptography?
Combining Public-Key and Symmetric-Key Cryptography
In Context: Antinuclear Activism and Pretty Good Privacy
Authenticity through Cryptographic Signing
Cryptographically Signing Cryptographic Hashes
Applications of Cryptographic Signing
In Context: Warrant Canaries
Metadata
What Is Metadata?
Metadata and the Internet
In Context: Protecting a Whistleblower
Anonymous Routing
Trusting a Middle Man: Virtual Private Networks
Not Trusting the Middle Man: The Onion Router
Use and Prevention of Anonymous Browsing Technologies
In Context: Disruptj20
Part 2: Digital Suppression of Social Movements (in the US)
Mechanisms of Social Movement Suppression
Modes of Suppression
Information Technology Interference
In Context: COINTELPRO and the COINTELPRO Era
Digital Threats to Social Movements
Surveillance Adversaries
Surveillance Strategies
Surveillance Tactics
In Context: Standing Rock
Part 3: Defending Social Movements (in the US)
Defending against Surveillance and Suppression
Reducing the Threat
Where Is Your Data?
In Context: Edward Snowden
Security Culture
Security Culture Meets Digital Security
In Context: Saint Paul Principles
Protecting Your Devices
Physical Attacks
Remote Attacks
In Context: Compromising Protesters’ Phones
Protecting Your Communications
Encrypted or Not
In-Transit Encryption
End-to-End Encryption
Authentication
In Context: Multiparty Video Chatting
Protecting Your Remote Data
In Context: Trusted or Encrypted Cloud Storage
Protecting Your Identity
Anonymity versus Pseudonymity
Ways to Use Tor
Hiding Your Physical Location
Tor Warnings
In Context: Getting the Real Tor Browser
Conclusion: Selecting Digital Security Tools
Required Criteria
Additional Desirable Technical Criteria
Nontechnical Criteria
Creative Commons License
Recommended Citations
Versioning