Crypto Party: Basics

  1. Firefox
  2. Securing Cookies
  3. Search and Bookmarks
  4. Add Ons
  5. TOR
  6. Jitsi
  7. Wrap Up

What is this and Caveats

The following document was written for use at DTU Environment to increase the privacy of web based browsing and communications by its staff. Governments either cannot, or chose not to, protect our privacy. Every person must take their own actions.

These instructions are offered as some assistance. Dont rely solely on this. Talk to your friends, employer's IT service and local hacker collective.

The images used in this document will be out of date at publication. They are offered to help; please read the text.

The target audience are using Windows 7, 64 bit.

Not fit for ...

Legal disclaimer: this document does not guarantee anything.

It is not claimed to be fit for any purpose (though the author hopes you can read it).

Knives cut, oxygen oxidises, and bits sit on a storage medium.

Research

A large collection of videos and documents are available to obtain more background on the motivations for this work.

They are only available from within DTU Environment's and DTU (Wireless)'s networks.

Site Export

You can download a zip archive of the pages of this site (not including the research materials).


2014-05-10, Copyright CC-BY-NC, DTU Environment