Buy Magic Mushrooms
Magic Mushroom Gummies Best Amanita Muscaria Gummies

February 2nd: All-Day CryptoParty

 Uncategorized  Comments Off on February 2nd: All-Day CryptoParty
Jan 122019
 

Photo by the Whitney Museum of American Art.

CryptoParty returns to NYC Resistor on February 2nd, 2019 for a full day of learning about your digital defense in the age of mass surveillance from Fort Meade and Madison Ave. Stop by anytime between 3PM and 9PM and enjoy snacks and skills from a variety of online security practitioners and researchers. We’re hosting a full day mix of and hands-on-help with everything from vetting a good VPN to navigating Signal and more!

If you’ve never been to Resistor before, check our Participate page for more info, including the Code of Conduct. Hope to see you there! If you’ve never been to a CryptoParty before, please check out the CryptoParty Guiding Principles.

BONUS: If you happen to already use PGP, dust off that encryption key and come down for a key-signing ceremony to add some signatures to your public key. Gotta catch them all, etc etc. Time TBA.

When:

Saturday, February 2nd, 2019 3:00PM – 9:00PM.

Where:

NYC Resistor (between Bergen and Dean)
87 3rd Ave. Floor 4 (use this OSM link if you’re Richard Stallman)
Brooklyn, NY 11217

Mar 042015
 

Managing private communication on the internet is a bit like space travel: It’s not impossible but the technology involved is difficult to use. Bring your laptop and your crypto-curiosity to Resistor on March 11th, 7:00pm for hands-on help with end-to-end secure email, anonymous web browsing, and general good practices for online privacy with folks that have been using this stuff for slightly longer than most. If you’re already an uber l337 cypherpunk and have a PGP key already, stick around for a key signing and probably some snacks!

CryptoParty

Nov 162014
 

Are you worried that you’re not paranoid enough about your communications security and want to improve your OpSec? Edward Snowden says to trust in encryption, but you still need to worry about the systems that run it:

Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.

One step towards going “Full-Snowden” is with hardware storage of your PGP secret keys! The Yubikey Neo and Neo-N USB tokens are a neat (and not too expensive) way to keep the secret part of your RSA2048 keys locked in a hardware device rather than stored as a file on your harddrive. The hardware tokens are compatible with the OpenPGP card protocol, which recent versions of gnupg support out-of-the-box. All of the public-key cryptography happens inside the tamper-proof device, so your secret key is never decrypted in the memory nor stored on disk of your machine.

Since setting up the key pairs and transferring the secret ones to the device can be tricky the first time, I wrote a brief guide to configuring Yubikeys as OpenPGP crypto-hardware tokens. They integrate nicely with Apple’s Mail.app (or mutt with gpg-agent), so there is one less excuse for not protecting your email.