6. Safe communications

Description The training materials for this workshop are published online and available online under an open license.

2. Threat modeling

Context analysis and implementation of adapted strategies: 5 questions to develop your threat model.

5. Data protection

Store your data securely: local or cloud, advantages and disadvantages. An update on metadata.

4. Smartphones

Which tools to use to communicate securely on your smartphone.

3. Safe browsing

Reminder about potential interception points, how to protect your online activity, understand https, VPNs and Tor.

1. Digital safety : the basics

The basics of digital hygiene: creating strong passwords, learning how to protect your devices and accounts online.