OpSec Resources

Linux

The workshops based on the Ubuntu Desktop installation and usage tutorial offer a comprehensive introduction to the world of Linux operating systems. Participants embark on a journey to understand the fundamentals of Ubuntu, a popular and user-friendly distribution. Through step-by-step guidance, they learn how to install Ubuntu Desktop on various hardware configurations, gaining invaluable hands-on experience in setting up a functional operating environment. As they progress, participants explore essential desktop features, such as navigating the graphical user interface, managing applications, and customising system settings to suit their preferences. Additionally, they delve into Ubuntu's vast software ecosystem, discovering how to install, update, and remove packages using the command line and graphical package managers. By the end of the workshops, participants emerge with a solid foundation in Ubuntu Desktop, equipped to leverage its power and flexibility for personal and professional computing needs.

TailsOS

The workshops based on the Tails installation tutorial introduce participants to a unique approach to privacy-focused computing. Participants embark on an exploration of Tails, a live operating system designed to preserve anonymity and security. Through guided instruction, they learn how to create a Tails USB stick, enabling them to boot into a secure, encrypted environment on any compatible computer. They delve into the intricacies of Tails' features, such as its built-in Tor browser for anonymous web browsing and cryptographic tools for secure communication. Additionally, participants gain proficiency in utilising Tails' amnesic nature, understanding how their activities leave no trace once the session ends. By the conclusion of the workshops, participants emerge with a deep understanding of Tails' principles and practical skills in deploying this powerful tool to safeguard their digital privacy and security effectively.

Password Management

The workshops based on the Bitwarden learning resources introduce participants to an essential aspect of digital security and organisation. Participants delve into the functionalities of Bitwarden, a robust and user-friendly password management solution. Through structured learning materials, they grasp the significance of secure password practices and explore how Bitwarden simplifies the process of generating, storing, and managing passwords across various devices and platforms. They learn to navigate the Bitwarden interface, understanding features such as secure password sharing, two-factor authentication, and encrypted storage. Additionally, participants discover advanced capabilities like secure note-taking and form autofill, maximising their efficiency and security in the digital realm. By the conclusion of the workshops, participants emerge equipped with practical skills and knowledge to enhance their online security posture using Bitwarden effectively.

2FA

The workshops based on the Aegis Authenticator learning guides introduce participants to the critical concept of two-factor authentication (2FA) and its implementation through Aegis Authenticator. Participants delve into the fundamentals of digital security, understanding the importance of adding an additional layer of protection to their online accounts. Through structured learning materials, they explore the various methods of 2FA and how Aegis Authenticator streamlines the process, providing a convenient and secure way to manage multiple authentication tokens. They learn to set up and configure Aegis Authenticator for their accounts, gaining practical experience in securing their digital identities across various platforms and services. Additionally, participants discover advanced features of Aegis Authenticator, such as backup and sync, ensuring seamless access to their authentication tokens across devices. By the conclusion of the workshops, participants emerge equipped with the knowledge and skills to enhance their online security through the effective implementation of two-factor authentication using Aegis Authenticator.






TOR

Embark on a journey into the realm of online anonymity with the TOR Browser, an essential tool for safeguarding privacy and accessing the web securely. The workshops, enriched by the integration of GL.iNet routers and based on the TOR Browser manual, offer a comprehensive introduction to this powerful tool, empowering users to navigate the internet with confidence and confidentiality. Participants delve into the fundamentals of TOR, a decentralised network renowned for its ability to anonymise internet traffic and circumvent censorship. With meticulous guidance, they learn how to download and install the TOR Browser on various operating systems, ensuring seamless integration into their digital workflow. As they progress, participants explore the intricacies of TOR Browser usage, mastering essential features to protect their online identity. They uncover techniques for configuring security settings, maximising privacy protections, and mitigating potential risks associated with online activity. Additionally, participants delve into advanced functionalities, such as accessing TOR hidden services and configuring custom bridges to bypass network restrictions. Through hands-on exercises and real-world simulations, they develop the skills necessary to navigate the web anonymously and securely. By the culmination of the workshops, participants emerge equipped with a profound understanding of the TOR Browser and its role in preserving online privacy. Empowered to navigate the digital landscape with confidence, they are poised to leverage TOR's capabilities for personal security and freedom on the internet.

Secure Mail


The workshops, enriched by step-by-step guidance from their respective support resources, offer a comprehensive introduction to secure email communication with ProtonMail and Tutanota. Embark on a journey into the realm of these privacy-focused email services, empowering users to communicate online with confidence and confidentiality. Participants delve into the fundamentals of ProtonMail and Tutanota, renowned for their end-to-end encryption and commitment to user privacy. With meticulous guidance, they learn how to create accounts, set up email addresses, and navigate the intuitive interfaces of both platforms.

Nostr


The workshops offer a comprehensive introduction to Nostr, an innovative platform revolutionising online collaboration and project management. Embark on a journey into the realm of efficient teamwork and streamlined workflows with Nostr, empowering users to collaborate effectively and achieve their goals with ease. Participants delve into the fundamentals of Nostr, renowned for its intuitive interface and robust features designed to enhance productivity. With meticulous guidance, they learn how to create accounts, set up projects, and invite team members to collaborate seamlessly. As they progress, participants explore advanced functionalities such as task management, file sharing, and real-time communication tools, maximising their ability to coordinate and execute tasks efficiently. Additionally, participants learn how to customise project settings, track progress, and leverage analytics to optimise team performance. Through hands-on exercises and practical examples, they develop the skills necessary to harness the full potential of Nostr for successful project management and collaboration. By the culmination of the workshops, participants emerge equipped with a profound understanding of Nostr, ready to empower their teams and achieve their objectives with precision and efficiency.

Umbrel


The workshops provide an insightful introduction to using Umbrel as a secure server for backups and running a relay. Participants will learn how to set up Umbrel to manage and protect their data through reliable backup solutions, ensuring their information is secure and easily recoverable. Additionally, the sessions cover configuring Umbrel to run a relay, which enhances network connectivity and facilitates secure communication. Through hands-on practice, attendees will gain expertise in leveraging Umbrel’s features to maintain robust data security and optimise relay operations, enabling them to safeguard their digital assets and improve network performance with confidence.