mirror of
https://github.com/torproject/community.git
synced 2024-11-27 03:30:33 +00:00
Create digital privacy guides page
TODO: Add the digital privacy guides page to the community generator plugin to enable filtering
This commit is contained in:
parent
e34d69c8f2
commit
94577cf463
@ -14,7 +14,7 @@ subtitle: Foster a safe, engaging environment.
|
||||
---
|
||||
cta: Code of Conduct
|
||||
---
|
||||
key: 3
|
||||
key: 4
|
||||
---
|
||||
html: two-columns-page.html
|
||||
---
|
||||
|
25
content/training/digital-privacy-guides/contents.lr
Normal file
25
content/training/digital-privacy-guides/contents.lr
Normal file
@ -0,0 +1,25 @@
|
||||
_model: community-resources
|
||||
---
|
||||
section: Digital Privacy Guides
|
||||
---
|
||||
section_id: digital-privacy-guides
|
||||
---
|
||||
color: primary
|
||||
---
|
||||
_template: layout.html
|
||||
---
|
||||
title: Digital Privacy Guides
|
||||
---
|
||||
subtitle: Do you teach your community about using Tor? These resources are for you.
|
||||
---
|
||||
cta: Check out our resources
|
||||
---
|
||||
key: 3
|
||||
---
|
||||
html: community-resources.html
|
||||
---
|
||||
body:
|
||||
|
||||
Our Community team delivers digital security training about Tor to human rights defenders, journalists, activists and marginalized communities around the world.
|
||||
To request a Tor training for your organization or community, please contact us and send an email to [training at torproject.org](mailto:training@torproject.org).
|
||||
Or, if you want to teach your community about Tor, these training materials are for you!
|
@ -9,12 +9,14 @@
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
},
|
||||
"formats": {
|
||||
"PDF": "whatever"
|
||||
}
|
||||
},
|
||||
"todo sobre tor": {
|
||||
"name": "Todo sobre Tor",
|
||||
"author": "Tor Project",
|
||||
"formats": ["odp", "pdf"],
|
||||
"description": "Un conjunto completo de diapositivas para los entrenamientos de Tor",
|
||||
"date": "2019",
|
||||
"cover": "/static/images/training/todo-sobre-tor.png",
|
||||
@ -27,7 +29,6 @@
|
||||
"tor network workshop": {
|
||||
"author": "Tor Project",
|
||||
"name": "The Tor network",
|
||||
"formats": ["odp","pdf"],
|
||||
"description": "Learn about the Tor network and how to run a relay",
|
||||
"date": "2019",
|
||||
"cover": "/static/images/training/the-tor-network.png",
|
||||
@ -35,13 +36,11 @@
|
||||
"languages": {
|
||||
"en": "English"
|
||||
},
|
||||
"formats": "Slides",
|
||||
"link": "https://community.torproject.org/training/resources/tor-relay-workshop/"
|
||||
},
|
||||
"Private bridges workshop": {
|
||||
"author": "Tor Project",
|
||||
"name": "Running Tor bridges",
|
||||
"formats": ["odp","pdf"],
|
||||
"description": "Learn how to run a private unlisted Tor bridge",
|
||||
"date": "2021",
|
||||
"cover": "/static/images/training/running-tor-bridges.png",
|
||||
@ -56,7 +55,6 @@
|
||||
{
|
||||
"author": "Tor Project",
|
||||
"name": "Introduction to Onion Services",
|
||||
"formats": ["odp","pdf"],
|
||||
"description": "Learn more about Onion Services and their benefits",
|
||||
"date": "2022",
|
||||
"cover": "/static/images/training/onion-services.png",
|
||||
@ -66,63 +64,6 @@
|
||||
},
|
||||
"link": "https://gitlab.torproject.org/tpo/community/training/-/raw/master/2022/onion-services/intro-onion-service-2022.odp?inline=false"
|
||||
},
|
||||
|
||||
"exploring-the-tor-network": {
|
||||
"name": "Exploring the Tor network (poster)",
|
||||
"author": "Article19",
|
||||
"description": "A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.",
|
||||
"link": "https://catnip.article19.org/data/ARTICLE19-Catnip-Tor-Network-2021-web.pdf",
|
||||
"cover": "/static/images/training/exploring-the-tor-network.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
|
||||
"understanding-and-circumventing-network-censorship": {
|
||||
"name": "Understanding and Circumventing Network Censorship",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||||
"link": "https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"how-to-use-tor": {
|
||||
"name": "How to: Use Tor",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||||
"link": "https://ssd.eff.org/en/node/97",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"whats-fingerprinting": {
|
||||
"name": "What's fingerprinting?",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.",
|
||||
"link": "https://ssd.eff.org/en/module/what-fingerprinting",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"evadir-la-censura-y-la-vigilancia-con-tor": {
|
||||
"name": "Evadir la censura y la vigilancia con Tor",
|
||||
"author": "Código Sur",
|
||||
"description": "",
|
||||
"link": "https://milpadigital.org/milpadigital-8",
|
||||
"cover": "/static/images/training/milpa-digital.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"how-to-bypass-internet-censorship": {
|
||||
"name": "How to bypass internet censorship",
|
||||
"author": "Totem Project",
|
||||
@ -134,152 +75,6 @@
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"use-tor-browser-to-become-harder-to-trace": {
|
||||
"name": "Use Tor Browser to Become Harder to Trace",
|
||||
"author": "Security Planner",
|
||||
"description": "",
|
||||
"link": "https://securityplanner.consumerreports.org/tool/browse-privately-with-tor",
|
||||
"cover": "/static/images/training/become-harder-to-trace.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"curricula-capacitacion-seguridad-digital-holistica": {
|
||||
"name": "Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos",
|
||||
"author": "Cibermujeres",
|
||||
"description": "",
|
||||
"link": "https://cyber-women.com/es/anonimato/anonimato/",
|
||||
"cover": "/static/images/training/cibermujeres-anonimato.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"como-usar-tb-en-tu-computadora": {
|
||||
"name": "Cómo usar Tor Browser en tu computadora",
|
||||
"author": "Venezuela Inteligente",
|
||||
"description": "Guide explaining how to use Tor Browser and Tor bridges",
|
||||
"link": "https://vesinfiltro.com/bloqueos/torbrowser/",
|
||||
"cover": "/static/images/training/como-usar-tor-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"digital-safety-kit": {
|
||||
"name": "Digital Safety kit",
|
||||
"author": "Committee to Protect Journalists (CPJ)",
|
||||
"description": "A tailored digital security guide made for journalists.",
|
||||
"link": "https://cpj.org/2019/07/digital-safety-kit-journalists/",
|
||||
"cover": "/static/images/training/digital-safety-kit.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español",
|
||||
"fr": "Français",
|
||||
"ru": "Русский",
|
||||
"fas": "در فارسی"
|
||||
}
|
||||
},
|
||||
"cuidados-digitales-que-es-tor-browser": {
|
||||
"name": "Cuidados Digitales: ¿Qué es el Tor Browser?",
|
||||
"author": "SurSiendo",
|
||||
"description": "E-learning platform based on Moodle.",
|
||||
"link": "https://cuidadosdigitales.sursiendo.org/mod/page/view.php?id=13",
|
||||
"cover": "/static/images/training/que-es-el-tor-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"in-depth-guide-to-choosing-a-web-browser": {
|
||||
"name": "An in-depth guide to choosing a web browser",
|
||||
"author": "Freedom of Press Foundation",
|
||||
"description": "A guide comparing Tor Browser and other browser's security.",
|
||||
"link": "https://freedom.press/training/-depth-guide-choosing-web-browser/",
|
||||
"cover": "/static/images/training/guide-to-choosing-a-web-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"tor-como-protegerte-mientras-navegas-en-internet": {
|
||||
"name": "Tor: ¿Cómo protegerte mientras navegas en Internet?",
|
||||
"author": "Artículo 19",
|
||||
"description": "A short video explaining what's Tor and how Tor works.",
|
||||
"link": "https://www.youtube.com/watch?v=Zj0FYhcngZ8",
|
||||
"cover": "/static/images/training/como-protegerte-mientras-navegas-en-internet.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"que-no-quede-huella": {
|
||||
"name": "'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales",
|
||||
"author": "Tormenta",
|
||||
"description": "A feminist fanzine discussing the Internet, anonymity, Tor, Tails.",
|
||||
"link": "https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf",
|
||||
"cover": "/static/images/training/que-no-quede-huella.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"onion-browser-tutorial": {
|
||||
"name": "Onion Browser Tutorial",
|
||||
"author": "Guardian Project",
|
||||
"description": "This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.",
|
||||
"link": "https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/",
|
||||
"cover": "/static/images/training/onion-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"onion-browser-video-tutorial": {
|
||||
"name": "Onion Browser Video Tutorial",
|
||||
"author": "Guardian Project",
|
||||
"description": "Video tutorial with best practices to browse the web securely on iOS using Onion Browser",
|
||||
"link": "https://www.youtube.com/playlist?list=PL4-CVUWabKWeHeBpadBLjzlWVa7binXpj",
|
||||
"cover": "/static/images/training/onion-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"getting-your-hands-started-with-tails": {
|
||||
"name": "Getting your hands started with Tails",
|
||||
"author": "geb",
|
||||
"description": "Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.",
|
||||
"link": "mailto:geb@riseup.net",
|
||||
"cover": "/static/images/training/tails-logo.svg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"ebook-defend-dissent": {
|
||||
"name": "Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements",
|
||||
"author": "Glencora Borradaile",
|
||||
"description": "An introduction book to cryptography, Tor, and surveillance used against social movements in US.",
|
||||
"link": "https://open.oregonstate.education/defenddissent/",
|
||||
"cover": "/static/images/training/defend-dissent.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"leak-onion-soup": {
|
||||
"name": "Leak and Onion Soup",
|
||||
"author": "Exposing the invisible (Tactical Tech)",
|
||||
"description": "A guide about using Tor to read, verify and process leaked data, which might come with a risk.",
|
||||
"link": "https://exposingtheinvisible.org/en/guides/leak-and-onion-soup",
|
||||
"cover": "/static/images/training/leak-and-onion-soup.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"tails-tu-computadora-segura-en-cualquier-lugar": {
|
||||
"name": "Tails: Tu computadora segura en cualquier lugar",
|
||||
"author": "Tails",
|
||||
|
204
databags/digital-safety-guides.json
Normal file
204
databags/digital-safety-guides.json
Normal file
@ -0,0 +1,204 @@
|
||||
{
|
||||
"exploring-the-tor-network": {
|
||||
"name": "Exploring the Tor network (poster)",
|
||||
"author": "Article19",
|
||||
"description": "A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.",
|
||||
"link": "https://catnip.article19.org/data/ARTICLE19-Catnip-Tor-Network-2021-web.pdf",
|
||||
"cover": "/static/images/training/exploring-the-tor-network.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
|
||||
"understanding-and-circumventing-network-censorship": {
|
||||
"name": "Understanding and Circumventing Network Censorship",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||||
"link": "https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"how-to-use-tor": {
|
||||
"name": "How to: Use Tor",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
|
||||
"link": "https://ssd.eff.org/en/node/97",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"whats-fingerprinting": {
|
||||
"name": "What's fingerprinting?",
|
||||
"author": "Electronic Frontier Foundation (EFF)",
|
||||
"description": "Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.",
|
||||
"link": "https://ssd.eff.org/en/module/what-fingerprinting",
|
||||
"cover": "/static/images/training/eff-ssd-guide.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"multiple_languages": "Multiple languages"
|
||||
}
|
||||
},
|
||||
"evadir-la-censura-y-la-vigilancia-con-tor": {
|
||||
"name": "Evadir la censura y la vigilancia con Tor",
|
||||
"author": "Código Sur",
|
||||
"description": "",
|
||||
"link": "https://milpadigital.org/milpadigital-8",
|
||||
"cover": "/static/images/training/milpa-digital.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"use-tor-browser-to-become-harder-to-trace": {
|
||||
"name": "Use Tor Browser to Become Harder to Trace",
|
||||
"author": "Security Planner",
|
||||
"description": "",
|
||||
"link": "https://securityplanner.consumerreports.org/tool/browse-privately-with-tor",
|
||||
"cover": "/static/images/training/become-harder-to-trace.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"curricula-capacitacion-seguridad-digital-holistica": {
|
||||
"name": "Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos",
|
||||
"author": "Cibermujeres",
|
||||
"description": "",
|
||||
"link": "https://cyber-women.com/es/anonimato/anonimato/",
|
||||
"cover": "/static/images/training/cibermujeres-anonimato.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"como-usar-tb-en-tu-computadora": {
|
||||
"name": "Cómo usar Tor Browser en tu computadora",
|
||||
"author": "Venezuela Inteligente",
|
||||
"description": "Guide explaining how to use Tor Browser and Tor bridges",
|
||||
"link": "https://vesinfiltro.com/bloqueos/torbrowser/",
|
||||
"cover": "/static/images/training/como-usar-tor-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"digital-safety-kit": {
|
||||
"name": "Digital Safety kit",
|
||||
"author": "Committee to Protect Journalists (CPJ)",
|
||||
"description": "A tailored digital security guide made for journalists.",
|
||||
"link": "https://cpj.org/2019/07/digital-safety-kit-journalists/",
|
||||
"cover": "/static/images/training/digital-safety-kit.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español",
|
||||
"fr": "Français",
|
||||
"ru": "Русский",
|
||||
"fas": "در فارسی"
|
||||
}
|
||||
},
|
||||
"cuidados-digitales-que-es-tor-browser": {
|
||||
"name": "Cuidados Digitales: ¿Qué es el Tor Browser?",
|
||||
"author": "SurSiendo",
|
||||
"description": "E-learning platform based on Moodle.",
|
||||
"link": "https://cuidadosdigitales.sursiendo.org/mod/page/view.php?id=13",
|
||||
"cover": "/static/images/training/que-es-el-tor-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"in-depth-guide-to-choosing-a-web-browser": {
|
||||
"name": "An in-depth guide to choosing a web browser",
|
||||
"author": "Freedom of Press Foundation",
|
||||
"description": "A guide comparing Tor Browser and other browser's security.",
|
||||
"link": "https://freedom.press/training/-depth-guide-choosing-web-browser/",
|
||||
"cover": "/static/images/training/guide-to-choosing-a-web-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"tor-como-protegerte-mientras-navegas-en-internet": {
|
||||
"name": "Tor: ¿Cómo protegerte mientras navegas en Internet?",
|
||||
"author": "Artículo 19",
|
||||
"description": "A short video explaining what's Tor and how Tor works.",
|
||||
"link": "https://www.youtube.com/watch?v=Zj0FYhcngZ8",
|
||||
"cover": "/static/images/training/como-protegerte-mientras-navegas-en-internet.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"que-no-quede-huella": {
|
||||
"name": "'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales",
|
||||
"author": "Tormenta",
|
||||
"description": "A feminist fanzine discussing the Internet, anonymity, Tor, Tails.",
|
||||
"link": "https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf",
|
||||
"cover": "/static/images/training/que-no-quede-huella.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"es": "Español"
|
||||
}
|
||||
},
|
||||
"onion-browser-tutorial": {
|
||||
"name": "Onion Browser Tutorial",
|
||||
"author": "Guardian Project",
|
||||
"description": "This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.",
|
||||
"link": "https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/",
|
||||
"cover": "/static/images/training/onion-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"onion-browser-video-tutorial": {
|
||||
"name": "Onion Browser Video Tutorial",
|
||||
"author": "Guardian Project",
|
||||
"description": "Video tutorial with best practices to browse the web securely on iOS using Onion Browser",
|
||||
"link": "https://www.youtube.com/playlist?list=PL4-CVUWabKWeHeBpadBLjzlWVa7binXpj",
|
||||
"cover": "/static/images/training/onion-browser.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"getting-your-hands-started-with-tails": {
|
||||
"name": "Getting your hands started with Tails",
|
||||
"author": "geb",
|
||||
"description": "Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.",
|
||||
"link": "mailto:geb@riseup.net",
|
||||
"cover": "/static/images/training/tails-logo.svg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"ebook-defend-dissent": {
|
||||
"name": "Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements",
|
||||
"author": "Glencora Borradaile",
|
||||
"description": "An introduction book to cryptography, Tor, and surveillance used against social movements in US.",
|
||||
"link": "https://open.oregonstate.education/defenddissent/",
|
||||
"cover": "/static/images/training/defend-dissent.jpg",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
},
|
||||
"leak-onion-soup": {
|
||||
"name": "Leak and Onion Soup",
|
||||
"author": "Exposing the invisible (Tactical Tech)",
|
||||
"description": "A guide about using Tor to read, verify and process leaked data, which might come with a risk.",
|
||||
"link": "https://exposingtheinvisible.org/en/guides/leak-and-onion-soup",
|
||||
"cover": "/static/images/training/leak-and-onion-soup.png",
|
||||
"topics": [],
|
||||
"languages": {
|
||||
"en": "English"
|
||||
}
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user