Completed
MOSCOW RULES
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Using Technology to Defend Digital Privacy Human Rights
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 3 TAKEAWAYS
- 3 Real-time cellphone location data leaked for all major US carriers
- 4 PRIVACY IS A HUMAN RIGHT
- 5 PERSONAL RISK ASSESSMENT
- 6 RISK TRADEOFFS
- 7 SURVEILLANCE AND TRACKING THREATS
- 8 COMMUNICATION THREATS
- 9 OLD SCHOOL + 1
- 10 WHAT ABOUT INCOGNITO/PRIVATE MODE
- 11 YOUR #1 TOOL: SECURITY & PRIVACY AWARENESS
- 12 PRIVACY AWARE BROWSERS
- 13 RECOMMENDED WEB BROWSER PLUGINS
- 14 TOR (THE ONION ROUTER)
- 15 TOR PROS AND CONS
- 16 VIRTUAL MACHINES
- 17 TAILS LIVE OPERATING SYSTEM
- 18 TAILS PROS AND CONS
- 19 Whonix Anonymous Operating System
- 20 WHONIX PROS AND CONS
- 21 VPNS VIRTUAL PRIVATE NETWORKS
- 22 OTHER SECURE MESSAGING SERVICES
- 23 SECURE EMAIL COMMUNICATION
- 24 SECURITY AND PRIVACY OF YOUR MOBILE DEVICES
- 25 DISPOSABLE DEVICES
- 26 MOSCOW RULES
- 27 SUMMARY