Uploaded on


More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. What is a CryptoParty CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the – Tor anonymity network, – public key encryption (PGP/GPG), and – OTR (Off The Record messaging). CryptoParties are free to attend, public, commercially and politically non-aligned events.
  • 2. Why CryptoParty/Cryptography? ● ● When mass surveillance and data mining define our online lives, privacy and data protection acquire a whole new meaning. Citizens should be empowered to take informed decisions and resist such surveillance.
  • 3. Some tools ● Lightbeam – To visualise how third parties track you when you access any website. ● Browser extensions – Do Not Track Me, HTTPSEverywhere ● Anonymous Browsing – TOR Browser ● Encrypted Emails – Thunderbird / PGP ● Password Management – Keepass ● Secure Operating Systems – TAILS
  • 4. User Google's datacenter Internet
  • 5. https://www.eff.org/https-everywhere
  • 6. Do Not Track Me www.abine.com
  • 7. Do Not Track Me www.abine.com
  • 8. TOR Browser www.torproject.org
  • 9. TOR Browser www.torproject.org Things to watch out for while using TOR – Internet speed might be reduced – Websites ask you to authenticate again – The last loop is unsecure
  • 10. Encrypted Emails How emails work
  • 11. Encrypted Emails
  • 12. Encrypted Emails Things you need ● Email Client (Thunderbird // Claws etc) ● OpenPGP Steps to Encrypted Emails ● Setup your email client ● Generate your public and private key ● Publish your private key, if you prefer to. ● Encrypt outgoing emails using the receipients' public key ● Decrypt incoming emails using your own private key
  • 13. Thank you Presentation by Surendran (@surendranb)