The purpose of our project is to educate the general public in the accessible encryption software that is freely available, and can be easily implemented by a layperson. The effect is two fold: to safeguard privacy on the Internet from hackers and governments alike, and to help demystify and destigmatize the use of encryption tools and services. 

Computer encrypion is based off the practice of cytptography, which seeks to translate messages into a secret code that only the intended receiver can translate and understand. This prevents an adevesary from interceting and deciphering the message. Encryption relie on a "key",  a set of intructions (algorithem) that expmalains to the intended receiver how to decipher the message. If for example I write a message, and then encrypt it by chaninging every letter in each word by 2 places down in alphabetical order (e.g. A -> C, G -> I, etc...), then the ecryption key would read "shift each letter up 2 spaces by alphabetical order". Only the intended reciever, with this set of instrucitons, could decipher and read the message. This is the basis for computer encyrption. 

Our project seeks to provide practical encryption tools for everyday internet users. 

 

 

Torr Bowser:

TOR - Encryption software that masks your IP. Tor uses it’s client’s computers as nodes to relay information, creating an efficient way to stop traffic analysis. Tor is an excellent anonymous browser bundle that allows the user to protect themselves. With TOR users are less susceptible to packet sniffing, identity theft, and censorship.

 

1. Download Tor Browser Bundle off torproject.org.

2. Extract files from the downloaded .zip file.

3. Run Tor.

 

 

VPN:

VPN stands for Virtual Private Network. VPN establishes a secure peer-to-peer connection between you and the website or person you would like to communicate with. Consider the internet like a vast open ocean, and your computer is an island in the ocean. You wish to share information with your friend, who is another island in the ocean. If you take a fairy to your friends island to meet him/her, this travel is not secure. That is, you have no idea who else is on the fairy with you, or if someone watched you leave. VPN is like establish private invisible bridge between your island and your friends island that is separate from the ocean of the internet, which only you can use. This insures security of communication between you and your friend. 

Recommended VPN service:

1. Go to www.vpnbook.com

2. Click on the "Free OpenVPN Account" button

3. Download the Euro1 or Euro2 OpenVPN Certificate bundle by clicking on the corresponding link

4. Next, click the "OpenVPN Client" link

5. Click on the links below for you corresponding operating system, to view screen shot instructions on how to download the VPN client appropriate for your operating system.

6. As long as VPN is active your browsing is encrypted!

PGP:

PGP stands for "Pretty Good Privacy" . It works using asymmetrical-keys. The process is a little complicated, but PGP is the standard for file sharing encryption and is used by spy agencies and governments alike. The software is easy to use with a little reading and can be downloaded from http://www.pgpi.org. http://www.pitt.edu/~poole/PGP.htm#step1 provides a good step-by-step guide for those interested. Everyone when sending emails should use this software. 

Term
Winter 2014
Category
Privacy & Surveillance
Short Summary

CryptoParty is a community organized encryption event in which information of the various encryption softwares readily available to average users is disseminated. The project aims first educate the populace on encryption technologies and usages, while seeking to destigmatize the use of such technologies, and to help users to download, install, and practically implement basic encryption software into their regular web usage, in order to promote "good web hygiene".

Files