Week 10: Security, Surveillance, and Privacy


Who is watching our online activities? How do you protect a source in the 21st Century? Who gets to access to all of this mass intelligence, and what does the ability to survey everything all the time mean both practically and ethically for journalism? In this lecture we will talk about who is watching and how, and how to create a security plan using threat modeling.



Cryptographic security


Assignment: Use threat modeling to come up with a security plan for a given scenario.

Comments are closed.