Version 1 (modified by Daniel Kahn Gillmor, 14 years ago) (diff)


Computer and communications security workshop at the 2008 NYC Anarchist Book Fair

Logistical Details

This will be a 75 minute workshop on Saturday, 2008-04-12, from 12:45 to 14:00.

We're expecting around 20-25 people, most of whom will be non-techies, but anarchists and activists who are interested in how to better understand the online tools they use.


  • Introduce presenters (~2 minutes)
  • Highlight ideas to keep in mind (~2 minutes)
  • introduce role play (~2 minutes)
  • role play (~30 minutes)
  • discussion and wrapup (~30 minutes)

Underlying Ideas

We want to help people to evaluate their online activities in reference to ideas that they're already somewhat comfortable with from their everyday life. Four useful ideas people can use to evaluate their communications strategies are:

Who can see my communications? Is it only the people i expect? What does privacy mean when sending the same message to many people? Who can breach the privacy?
When i receive messages, how do i know who they're from? Are they really from that person? When i communicate messages where my identity is important and relevant, how can the people i'm communicating with know that my messages are really from me?
When i want to communicate without divulging my identity (whistleblowing, etc), how can i be sure that my identity is protected?
Is the communications mechanism i'm using something i can rely on? Who controls the mechanism? Can the mechanism be shut down or interrupted?

Role Play

We're going to lead a role play where each participant is issued an identity, objectives, and complicating restrictions.