![]() Unless any of the participants are using VPN clients or any other kind of proxy tool, the IP Address and location for everybody should appear to be the same. Invite participants to visit the site themselves, using their own devices.Explain the concept of sites like these, which is to show users by which IP address their device and its current location are being identified - in the case of this step, the location indicated on either website should align with the actual location of your training. ![]() In a browser, visit either What Is My IP? or What Is My IP Address, which includes a map to show perceived location. The Tor Browser Bundle is quite large, so it’s a good idea to prepare this ahead of time, especially if you have a slow Internet connection in the training room.ĭeepening Step 1. A copy of the Tor Browser Bundle installer (a self-extracting archive) for distribution to participants.Tor Browser Bundle, installed on the trainer’s device.Parent Topic(s) Safer Browsing - Anonymity & Circumvention Safer Browsing - Identity Protection and Privacyĭuration 45-60 minutes Materials to Prepare Participants will use the Tor Browser Bundle to create an anonymous connection, confirm that it is working, and change their Tor exit relay. In this Deepening session, participants will learn how to use the Tor Browser Bundle for anonymity and circumvention, to conduct safer browsing actions while accessing sensitive or blocked content online. Safer Communication: PGP/GPG Email EncryptionĬredits Lindsay Beck, Chris Walker Last Updated 2016-05.Safer Browsing - Identity Protection and Privacy.Safer Browsing - Anonymity and Circumvention.Digital Security: Motivations, Resistances and Barriers.How To: Using the LevelUp Trainers' Curriculum.Building your Own Emotional Resilience as a Security Trainer.Stress and Traumatic Stress Reactions in Security Training.Raising and Lowering the Pressure in a Group.Psychosocial Underpinnings of Security Training.Step 4 - Communications and Content Planning.Step 3 - Analysis and Design Considerations.Step 1 - Initial Contact and Assessing Need.Setting Expectations For Participants, Organizers, and Yourself.Roles and Responsibilities of a Digital Security Trainer.Icebreakers, Energizers and Thematic Activities.How To Handle Surprises During Training.Resources for the global digital safety training community.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |