community/databags/digital-security-guides.json

205 lines
8.0 KiB
JSON

{
"exploring-the-tor-network": {
"name": "Exploring the Tor network (poster)",
"author": "Article19",
"description": "A tabloid containing an amazing graphic about the Tor network. Part of the book How the Internet really works.",
"link": "https://catnip.article19.org/data/ARTICLE19-Catnip-Tor-Network-2021-web.pdf",
"cover": "/static/images/training/exploring-the-tor-network.jpg",
"topics": [],
"languages": {
"en": "English"
}
},
"understanding-and-circumventing-network-censorship": {
"name": "Understanding and Circumventing Network Censorship",
"author": "Electronic Frontier Foundation (EFF)",
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
"link": "https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship",
"cover": "/static/images/training/eff-ssd-guide.png",
"topics": [],
"languages": {
"multiple_languages": "Multiple languages"
}
},
"how-to-use-tor": {
"name": "How to: Use Tor",
"author": "Electronic Frontier Foundation (EFF)",
"description": "This resource is part of Surveillance Self-Defense (SSD) guides maintained by EFF.",
"link": "https://ssd.eff.org/en/node/97",
"cover": "/static/images/training/eff-ssd-guide.png",
"topics": [],
"languages": {
"multiple_languages": "Multiple languages"
}
},
"whats-fingerprinting": {
"name": "What's fingerprinting?",
"author": "Electronic Frontier Foundation (EFF)",
"description": "Surveillance Self-Defense article explaining web browser fingerprinting and how Tor Browser protects you.",
"link": "https://ssd.eff.org/en/module/what-fingerprinting",
"cover": "/static/images/training/eff-ssd-guide.png",
"topics": [],
"languages": {
"multiple_languages": "Multiple languages"
}
},
"evadir-la-censura-y-la-vigilancia-con-tor": {
"name": "Evadir la censura y la vigilancia con Tor",
"author": "Código Sur",
"description": "",
"link": "https://milpadigital.org/milpadigital-8",
"cover": "/static/images/training/milpa-digital.jpg",
"topics": [],
"languages": {
"es": "Español"
}
},
"use-tor-browser-to-become-harder-to-trace": {
"name": "Use Tor Browser to Become Harder to Trace",
"author": "Security Planner",
"description": "",
"link": "https://securityplanner.consumerreports.org/tool/browse-privately-with-tor",
"cover": "/static/images/training/become-harder-to-trace.png",
"topics": [],
"languages": {
"en": "English"
}
},
"curricula-capacitacion-seguridad-digital-holistica": {
"name": "Currícula de capacitación en seguridad digital holística para defensoras de derechos humanos",
"author": "Cibermujeres",
"description": "",
"link": "https://cyber-women.com/es/anonimato/anonimato/",
"cover": "/static/images/training/cibermujeres-anonimato.jpg",
"topics": [],
"languages": {
"es": "Español"
}
},
"como-usar-tb-en-tu-computadora": {
"name": "Cómo usar Tor Browser en tu computadora",
"author": "Venezuela Inteligente",
"description": "Guide explaining how to use Tor Browser and Tor bridges",
"link": "https://vesinfiltro.com/bloqueos/torbrowser/",
"cover": "/static/images/training/como-usar-tor-browser.png",
"topics": [],
"languages": {
"es": "Español"
}
},
"digital-safety-kit": {
"name": "Digital Safety kit",
"author": "Committee to Protect Journalists (CPJ)",
"description": "A tailored digital security guide made for journalists.",
"link": "https://cpj.org/2019/07/digital-safety-kit-journalists/",
"cover": "/static/images/training/digital-safety-kit.jpg",
"topics": [],
"languages": {
"es": "Español",
"fr": "Français",
"ru": "Русский",
"fas": "در فارسی"
}
},
"cuidados-digitales-que-es-tor-browser": {
"name": "Cuidados Digitales: ¿Qué es el Tor Browser?",
"author": "SurSiendo",
"description": "E-learning platform based on Moodle.",
"link": "https://cuidadosdigitales.sursiendo.org/mod/page/view.php?id=13",
"cover": "/static/images/training/que-es-el-tor-browser.png",
"topics": [],
"languages": {
"es": "Español"
}
},
"in-depth-guide-to-choosing-a-web-browser": {
"name": "An in-depth guide to choosing a web browser",
"author": "Freedom of Press Foundation",
"description": "A guide comparing Tor Browser and other browser's security.",
"link": "https://freedom.press/training/-depth-guide-choosing-web-browser/",
"cover": "/static/images/training/guide-to-choosing-a-web-browser.png",
"topics": [],
"languages": {
"en": "English"
}
},
"tor-como-protegerte-mientras-navegas-en-internet": {
"name": "Tor: ¿Cómo protegerte mientras navegas en Internet?",
"author": "Artículo 19",
"description": "A short video explaining what's Tor and how Tor works.",
"link": "https://www.youtube.com/watch?v=Zj0FYhcngZ8",
"cover": "/static/images/training/como-protegerte-mientras-navegas-en-internet.jpg",
"topics": [],
"languages": {
"es": "Español"
}
},
"que-no-quede-huella": {
"name": "'Que no quede huella... que no, que no': diálogos feministas para las libertades y autocuidados digitales",
"author": "Tormenta",
"description": "A feminist fanzine discussing the Internet, anonymity, Tor, Tails.",
"link": "https://www.derechosdigitales.org/wp-content/uploads/que-no-quede-huella.pdf",
"cover": "/static/images/training/que-no-quede-huella.jpg",
"topics": [],
"languages": {
"es": "Español"
}
},
"onion-browser-tutorial": {
"name": "Onion Browser Tutorial",
"author": "Guardian Project",
"description": "This resource explains the features and how to use Onion Browser. Onion Browser is the only browser for iOS recommended by the Tor Project.",
"link": "https://guardianproject.info/2020/06/02/onion-browser-release-2.6-tutorial/",
"cover": "/static/images/training/onion-browser.png",
"topics": [],
"languages": {
"en": "English"
}
},
"onion-browser-video-tutorial": {
"name": "Onion Browser Video Tutorial",
"author": "Guardian Project",
"description": "Video tutorial with best practices to browse the web securely on iOS using Onion Browser",
"link": "https://www.youtube.com/playlist?list=PL4-CVUWabKWeHeBpadBLjzlWVa7binXpj",
"cover": "/static/images/training/onion-browser.png",
"topics": [],
"languages": {
"en": "English"
}
},
"getting-your-hands-started-with-tails": {
"name": "Getting your hands started with Tails",
"author": "geb",
"description": "Step by step tutorial used to introduce Tails to journalism students. Actually used in journalism schools in France. Topics: Tor, persistence, metadata, secure removal, Veracrypt, OnionShare etc. On request ; please click to contact author.",
"link": "mailto:geb@riseup.net",
"cover": "/static/images/training/tails-logo.svg",
"topics": [],
"languages": {
"en": "English"
}
},
"ebook-defend-dissent": {
"name": "Defend Dissent: Digital Suppression and Cryptographic Defense of Social Movements",
"author": "Glencora Borradaile",
"description": "An introduction book to cryptography, Tor, and surveillance used against social movements in US.",
"link": "https://open.oregonstate.education/defenddissent/",
"cover": "/static/images/training/defend-dissent.jpg",
"topics": [],
"languages": {
"en": "English"
}
},
"leak-onion-soup": {
"name": "Leak and Onion Soup",
"author": "Exposing the invisible (Tactical Tech)",
"description": "A guide about using Tor to read, verify and process leaked data, which might come with a risk.",
"link": "https://exposingtheinvisible.org/en/guides/leak-and-onion-soup",
"cover": "/static/images/training/leak-and-onion-soup.png",
"topics": [],
"languages": {
"en": "English"
}
}
}