mirror of
https://github.com/torproject/community.git
synced 2024-11-30 05:00:34 +00:00
205 lines
8.0 KiB
JSON
205 lines
8.0 KiB
JSON
|
{
|
||
|
"exploring-the-tor-network": {
|
||
|
"name": "Exploring the Tor network (poster)",
|
||
|
"author": "Article19",
|
||
|
"description": "A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.",
|
||
|
"link": "https://catnip.article19.org/data/ARTICLE19-Catnip-Tor-Network-2021-web.pdf",
|
||
|
"cover": "/static/images/training/exploring-the-tor-network.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
|
||
|
"understanding-and-circumventing-network-censorship": {
|
||
|
"name": "Understanding and Circumventing Network Censorship",
|
||
|
"author": "Electronic Frontier Foundation (EFF)",
|
||
|
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||
|
"link": "https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship",
|
||
|
"cover": "/static/images/training/eff-ssd-guide.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"multiple_languages": "Multiple languages"
|
||
|
}
|
||
|
},
|
||
|
"how-to-use-tor": {
|
||
|
"name": "How to: Use Tor",
|
||
|
"author": "Electronic Frontier Foundation (EFF)",
|
||
|
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||
|
"link": "https://ssd.eff.org/en/node/97",
|
||
|
"cover": "/static/images/training/eff-ssd-guide.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"multiple_languages": "Multiple languages"
|
||
|
}
|
||
|
},
|
||
|
"whats-fingerprinting": {
|
||
|
"name": "What's fingerprinting?",
|
||
|
"author": "Electronic Frontier Foundation (EFF)",
|
||
|
"description": "Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.",
|
||
|
"link": "https://ssd.eff.org/en/module/what-fingerprinting",
|
||
|
"cover": "/static/images/training/eff-ssd-guide.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"multiple_languages": "Multiple languages"
|
||
|
}
|
||
|
},
|
||
|
"evadir-la-censura-y-la-vigilancia-con-tor": {
|
||
|
"name": "Evadir la censura y la vigilancia con Tor",
|
||
|
"author": "Código Sur",
|
||
|
"description": "",
|
||
|
"link": "https://milpadigital.org/milpadigital-8",
|
||
|
"cover": "/static/images/training/milpa-digital.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"use-tor-browser-to-become-harder-to-trace": {
|
||
|
"name": "Use Tor Browser to Become Harder to Trace",
|
||
|
"author": "Security Planner",
|
||
|
"description": "",
|
||
|
"link": "https://securityplanner.consumerreports.org/tool/browse-privately-with-tor",
|
||
|
"cover": "/static/images/training/become-harder-to-trace.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"curricula-capacitacion-seguridad-digital-holistica": {
|
||
|
"name": "Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos",
|
||
|
"author": "Cibermujeres",
|
||
|
"description": "",
|
||
|
"link": "https://cyber-women.com/es/anonimato/anonimato/",
|
||
|
"cover": "/static/images/training/cibermujeres-anonimato.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"como-usar-tb-en-tu-computadora": {
|
||
|
"name": "Cómo usar Tor Browser en tu computadora",
|
||
|
"author": "Venezuela Inteligente",
|
||
|
"description": "Guide explaining how to use Tor Browser and Tor bridges",
|
||
|
"link": "https://vesinfiltro.com/bloqueos/torbrowser/",
|
||
|
"cover": "/static/images/training/como-usar-tor-browser.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"digital-safety-kit": {
|
||
|
"name": "Digital Safety kit",
|
||
|
"author": "Committee to Protect Journalists (CPJ)",
|
||
|
"description": "A tailored digital security guide made for journalists.",
|
||
|
"link": "https://cpj.org/2019/07/digital-safety-kit-journalists/",
|
||
|
"cover": "/static/images/training/digital-safety-kit.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español",
|
||
|
"fr": "Français",
|
||
|
"ru": "Русский",
|
||
|
"fas": "در فارسی"
|
||
|
}
|
||
|
},
|
||
|
"cuidados-digitales-que-es-tor-browser": {
|
||
|
"name": "Cuidados Digitales: ¿Qué es el Tor Browser?",
|
||
|
"author": "SurSiendo",
|
||
|
"description": "E-learning platform based on Moodle.",
|
||
|
"link": "https://cuidadosdigitales.sursiendo.org/mod/page/view.php?id=13",
|
||
|
"cover": "/static/images/training/que-es-el-tor-browser.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"in-depth-guide-to-choosing-a-web-browser": {
|
||
|
"name": "An in-depth guide to choosing a web browser",
|
||
|
"author": "Freedom of Press Foundation",
|
||
|
"description": "A guide comparing Tor Browser and other browser's security.",
|
||
|
"link": "https://freedom.press/training/-depth-guide-choosing-web-browser/",
|
||
|
"cover": "/static/images/training/guide-to-choosing-a-web-browser.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"tor-como-protegerte-mientras-navegas-en-internet": {
|
||
|
"name": "Tor: ¿Cómo protegerte mientras navegas en Internet?",
|
||
|
"author": "Artículo 19",
|
||
|
"description": "A short video explaining what's Tor and how Tor works.",
|
||
|
"link": "https://www.youtube.com/watch?v=Zj0FYhcngZ8",
|
||
|
"cover": "/static/images/training/como-protegerte-mientras-navegas-en-internet.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"que-no-quede-huella": {
|
||
|
"name": "'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales",
|
||
|
"author": "Tormenta",
|
||
|
"description": "A feminist fanzine discussing the Internet, anonymity, Tor, Tails.",
|
||
|
"link": "https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf",
|
||
|
"cover": "/static/images/training/que-no-quede-huella.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"es": "Español"
|
||
|
}
|
||
|
},
|
||
|
"onion-browser-tutorial": {
|
||
|
"name": "Onion Browser Tutorial",
|
||
|
"author": "Guardian Project",
|
||
|
"description": "This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.",
|
||
|
"link": "https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/",
|
||
|
"cover": "/static/images/training/onion-browser.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"onion-browser-video-tutorial": {
|
||
|
"name": "Onion Browser Video Tutorial",
|
||
|
"author": "Guardian Project",
|
||
|
"description": "Video tutorial with best practices to browse the web securely on iOS using Onion Browser",
|
||
|
"link": "https://www.youtube.com/playlist?list=PL4-CVUWabKWeHeBpadBLjzlWVa7binXpj",
|
||
|
"cover": "/static/images/training/onion-browser.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"getting-your-hands-started-with-tails": {
|
||
|
"name": "Getting your hands started with Tails",
|
||
|
"author": "geb",
|
||
|
"description": "Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.",
|
||
|
"link": "mailto:geb@riseup.net",
|
||
|
"cover": "/static/images/training/tails-logo.svg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"ebook-defend-dissent": {
|
||
|
"name": "Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements",
|
||
|
"author": "Glencora Borradaile",
|
||
|
"description": "An introduction book to cryptography, Tor, and surveillance used against social movements in US.",
|
||
|
"link": "https://open.oregonstate.education/defenddissent/",
|
||
|
"cover": "/static/images/training/defend-dissent.jpg",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
},
|
||
|
"leak-onion-soup": {
|
||
|
"name": "Leak and Onion Soup",
|
||
|
"author": "Exposing the invisible (Tactical Tech)",
|
||
|
"description": "A guide about using Tor to read, verify and process leaked data, which might come with a risk.",
|
||
|
"link": "https://exposingtheinvisible.org/en/guides/leak-and-onion-soup",
|
||
|
"cover": "/static/images/training/leak-and-onion-soup.png",
|
||
|
"topics": [],
|
||
|
"languages": {
|
||
|
"en": "English"
|
||
|
}
|
||
|
}
|
||
|
}
|