Welcome! Here's our 90 minute CryptoParty Schedule

5 min Opening & Rules of Engagement

Welcome to the CryptoParty! In the spirit of community, we propose the following initial pillars of engagement to help guide our interactions this afternoon:

Be excellent to each other

No harassment will be tolerated

Permission to not know granted, ask questions courageously

Honor the vault of confidentiality

Move slowly and repair things

Why a CryptoParty?

DLINQ cryptoparties are an extension of our mission to advance our collective understanding of how our lives are impacted by the digital realm. Events like this help expand how we think about complex issues like digital privacy and data, empowering us to take more control. Such conversations and explorations may also help us normalize alternative digital practices as we navigate issues of privacy and security.

<aside> 💡 The United Nations Declaration of Human Rights, Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

</aside>

15 min Introduction: Chatstorm!

Use the chat feature in Zoom to complete this sentence string:

When I think about Zoom (and creating community/digital security/my life) I feel...

Threat Modeling for Digital Spaces

What is Zoombombing?

"Zoombombing or Zoom raiding refers to the unwanted, disruptive intrusion, generally by Internet trolls, into a video-conference call. In a typical Zoombombing incident, a teleconferencing session is hijacked by the insertion of material that is lewd, obscene, racist, homophobic, Islamophobic, or antisemitic in nature, typically resulting in the shutdown of the session." - Wikipedia, accessed Feb 14, 2021

Recent Zoombombing Headlines

<aside> 💡 Zoombombing Often an ‘Inside Job’, Inside Higher Education, Feb 17, 2021

</aside>

<aside> 💡 Offensive Zoom bombs interrupt virtual Activities Fair booths, Middlebury Campus, March 11, 2021

</aside>

<aside> 💡 Rutgers University Black History Month events targeted by 'racist and bigoted Zoom-bombings': Chancellor, ABC News, Feb 14, 2021

</aside>

<aside> 💡 Penn State president denounces ‘Zoom bombing’ of Black Caucus, EdScoop, Feb 1, 2021

</aside>

<aside> 💡 Midd officials condemn racist incident at meeting, Addison Independent, July 30, 2020

</aside>

https://youtu.be/9OlZ_vwEHXA

Threat Modeling

<aside> 💡 Threat modeling is the process of brainstorming all possible threats, deciding which threats to take seriously, and making a plan to protect against those threats. In this session, we're only considering one threat, Zoombombing, but thinking about our classes—class size, subject matter, positionality, etc.—can help us to decide what features to enable or disable in Zoom to make our online learning spaces safer. It's impossible to guard against every threat or adversary, and enacting every protection measure we have at our disposal can make interacting cumbersome. Threat modeling can help us strike the right protection balance between most likely and most safe.

</aside>