SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
cryptoparty.at
@CryptoPartyWIEN
Jasmin

@bekassine

Kristina

@meep_vie

Mahriah

@Mahriah
Vorstellungsrunde
● Wie heißt du, was machst du?
● Warum möchtest du Email-Verschlüsselung lernen?
● Was erwartest du dir vom Workshop heute?
● Welches Betriebssystem verwendest du
(Windows, Mac OX X, Linux)?
● Verwendest du einen Mailclient oder Webmail? Wer ist dein
Emailanbieter (gmail, hotmail, etc.)
Ablauf für heute
●
●
●
●
●
●

Crypto-Grundbegriffe
Bedrohungsszenarien
Warum verschlüsseln?
Pause
Workshop
Q & A und Reflexion
Ihr könnt jederzeit
Fragen stellen!
Crypto-Grundbegriffe
CRYPTOPARTY
DSZQUPQBSUZ
CRYPTOPARTY
11111111111
DSZQUPQBSUZ
CRYPTOPARTY
44444444444
GVCTXSTEVXC
CRYPTOPARTY
12312312312
DTBQVRQCUUA
Asymmetrische Verschlüsselung
Public Key gebe ich weiter
Private Key hüte ich wie meinen Augapfel
Bedrohungsszenarien
From:

jasmin@email.com

To:

mahriah@email.com

Subject:

Treffen morgen

Date, Time:

14. November 2013, 14:05

…:

…

Hallo Mahriah,
treffen wir uns morgen um vier zur Vorbesprechung?
Liebe Grüße,
Jasmin
From:

jasmin@email.com

To:

mahriah@email.com

Subject:

Treffen morgen

Date, Time:

14. November 2013, 14:05

…:

…

-----BEGIN PGP MESSAGE----Comment: GPGTools - http://gpgtools.org
hQEMA62SpJxQZFOjAQf9HZsZ2dUzMns9Bmi8oegqTFsOxQR6jNAw4blQTj3Um1dd/jVa9bJ0cBylTVZsC2ZIqc/qqL0URFE/FiBOO0uFIn/D
RxXiev58das6tKbnsHrTkXrOPla+1Ij0ffnFtS8lkIq7ubZOvmP/o0sN8f5ZP2DNnVffcxKoJkTpUMnUNLXlbEtaqV645rT/uKid0q5dCdxb
06eNlu173kU79LNTkLb5+UpiM8CdUqV30tVb3vto8ibLp4Dj28Qaa4/WgI0WEDYyfwg4QfCvAffdcwILQdSsgP63llp/KQtKyj+ZPnu13C7N
X1lrXBGsMWcmDbMu0LxYqhYXnF9kUmRgyuHWnoUBDAN2DgWChMB3JgEH/2r828A+NzHuIuML02u63yK4DoZyN7ncJ70YBoT4bajmhAPnmAO+
IV0xvN+stTEKttKpByR9NNxxU1RalwBOF9B5KUS9tWVOnogKn9sF4tn2QiBZytJMqH2NqDKDY1zpXL0mVxOGwnHcB6BoKMJfYtccRE3N9AJu
aOavWMvwUStUfuEx0R02H5GF52XA+BUa81AuaDQd5yWX98AvYienc2Hu7Kc3G14bXTzGzWo3jiqzd+xUcvHqNfjLofB3Y74Yu85d6k7H3aQP
Ndgv5ei8A+MIyMYoDJXXwADeZ4KO7wgPy3/4j7Wrw23CAhymQ6JKoHNZFd7MOvLhCikBNgGbryTSlAGIUlAwGgA2j0wejnQjAKLi/Pn5hzEd
IawybyRjFBUMr9Rvgn/gkWH+kDURttRpZDHCNIkWsX47HjErSIBnhl1yuSa0rKxFrlwSm4/uSpqZlAlkigIJ3joQU4+64AzUnWmeD6pxkMw+
7SjyzUlPL5ZDvOEY6vYMZ0XOrvRyl5dLTCIxHFKrRyf8mEmDUKwv+UfVq2Q==JVlx
-----END PGP MESSAGE-----
ELT
SS
LÜ
CH
S

From:

jasmin@email.com

To:

mahriah@email.com

Subject:

Treffen morgen

Date, Time:

14. November 2013, 14:05

…:

…

ER
NV
U

-----BEGIN PGP MESSAGE-----

LT
SE
ÜS
HL
C

Comment: GPGTools - http://gpgtools.org

hQEMA62SpJxQZFOjAQf9HZsZ2dUzMns9Bmi8oegqTFsOxQR6jNAw4blQTj3Um1dd/jVa9bJ0cBylTVZsC2ZIqc/qqL0URFE/FiBOO0uFIn/D
RxXiev58das6tKbnsHrTkXrOPla+1Ij0ffnFtS8lkIq7ubZOvmP/o0sN8f5ZP2DNnVffcxKoJkTpUMnUNLXlbEtaqV645rT/uKid0q5dCdxb
06eNlu173kU79LNTkLb5+UpiM8CdUqV30tVb3vto8ibLp4Dj28Qaa4/WgI0WEDYyfwg4QfCvAffdcwILQdSsgP63llp/KQtKyj+ZPnu13C7N
X1lrXBGsMWcmDbMu0LxYqhYXnF9kUmRgyuHWnoUBDAN2DgWChMB3JgEH/2r828A+NzHuIuML02u63yK4DoZyN7ncJ70YBoT4bajmhAPnmAO+
IV0xvN+stTEKttKpByR9NNxxU1RalwBOF9B5KUS9tWVOnogKn9sF4tn2QiBZytJMqH2NqDKDY1zpXL0mVxOGwnHcB6BoKMJfYtccRE3N9AJu
aOavWMvwUStUfuEx0R02H5GF52XA+BUa81AuaDQd5yWX98AvYienc2Hu7Kc3G14bXTzGzWo3jiqzd+xUcvHqNfjLofB3Y74Yu85d6k7H3aQP
Ndgv5ei8A+MIyMYoDJXXwADeZ4KO7wgPy3/4j7Wrw23CAhymQ6JKoHNZFd7MOvLhCikBNgGbryTSlAGIUlAwGgA2j0wejnQjAKLi/Pn5hzEd
IawybyRjFBUMr9Rvgn/gkWH+kDURttRpZDHCNIkWsX47HjErSIBnhl1yuSa0rKxFrlwSm4/uSpqZlAlkigIJ3joQU4+64AzUnWmeD6pxkMw+
7SjyzUlPL5ZDvOEY6vYMZ0XOrvRyl5dLTCIxHFKrRyf8mEmDUKwv+UfVq2Q==JVlx

RS
VE

-----END PGP MESSAGE-----
Warum will ich Emails
verschlüsseln?
Kommunikation
mit oder als
Anwältin, Therapeutin, Ärztin
Verschicken von
Zugangsdaten
(Benutzername, Passwort)
Kommunikation als oder mit
politischer Aktivistin
Briefgeheimnis im digitalen
Zeitalter durchsetzen
Habt ihr noch
Fragen?
PAUSE
WORKSHOP
1) Software installieren
2) Email-Konto einrichten
3) Keys generieren
4) verschlüsselte Emails verschicken
Ihr braucht:
1) Thunderbird (Email-Client)
2) GPG (Verschlüsselungssoftware)
3) Enigmail (Add-on für Thunderbird)
cryptoparty.at/email_encryption
Email-Client einrichten
IMAP (Internet Message Access Protocol)
● Zugriff auf Email von mehreren Geräten
● Belässt Emails auf dem Mailserver
POP (Post Office Protocol)
● Zugriff auf Email von einem Gerät
● Lädt Emails auf Gerät und löscht sie
(standardmäßig) vom Server
Ein gutes Passwort
When I find myself in times of trouble, Mother
Mary comes to me. Speaking words of wisdom,
let it be.
WIfmitot,MMctm.Swof,lib.
Dieses Passwort nicht mehr verwenden!
Ein gutes Passwort
● möglichst lange
● Mundartsatz
● Sonderzeichen, Zahlen
DO
● Backup vom eigenen Schlüssel
machen
● Backup vom Revoke Certificate
machen
● Private Key geheim halten (!!!)
DON’T
● Fremde Schlüssel ungefragt auf Keyserver
hochladen
● Auf verschlüsselte Emails unverschlüsselt
antworten (Quotes!)
Public Key holen:
hkp://keys.gnupg.net

Verschlüsselte Email an:
flit.cryptoparty@gmail.com
Abschließende
Fragen und Reflexion
nächste

25.11.2013 ab 19:00
im Metalab
Danke fürs Kommen!

Mais conteúdo relacionado

Destaque

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destaque (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

FLIT CryptoParty zu Email-Verschlüsselung