IT-Sicherheit (ESC-IT)
Willkommen im WIki von ESC-IT :)
ESC-IT (gesprochen escape it oder escape IT) ist ein Kollektiv welches Inhalte für IT-Sicherheitstrainings für Aktivist*innen erstellt. Zielgruppe sind Aktivist*innen und Trainer*innen im Kontext des politischen Aktivismus.
Zur Aktualität und Qualität des Inhalts:
"Auch wir wissen natürlich nicht alles. Um Fehler in unserem Material zu vermeiden, gehen alle Inhalte vor der Veröffentlichung durch einen Review-Prozess. Für die Veröffentlichung muss mindestens eine zweite Person zustimmen.
Dennoch können Fehler passieren. Falls euch etwas auffällt, freuen wir uns über Hinweise. Am besten erstellst du hierfür einen Issue in unserem git-Repository oder schreibst uns eine Mail."
Dieses Wiki wird hier automatisch durch einen Bot eingebunden und aktuell gehalten.
Es kann nur durch den oben beschriebenen Prozess im Git-Repo bearbeitet werden.
Instructions
Backups
[!toc] Table of Contents In the article on backups in the countermeasures section, we describ...
Auto-Reboot
[!toc] Table of Contents Because all encrypted devices store their encryption keys in their RA...
Nextcloud-App-Passwords
[!toc] Table of Contents Nextcloud allows you to create app passwords. This allows you to assi...
Diceware
[!toc] Table of Contents Diceware is a method for generating passphrases/passwords using dice ...
Signal
[!toc] Table of Contents Credit: The article is a translation of the LG Wiki Signal section. ...
System-Updates
[!toc] Table of Contents One of the first answers to questions about IT security is always: In...
Graphene-Os
[!toc] Table of Contents Recommended Apps Install Accrescend Download the Accrescend App Store...
Keepassxc
[!toc] Table of Contents [!info] Getting Started {static} The official English-language KeePa...
Nextcloud-Webdav
[!toc] Table of Contents Nextcloud Sync Client The Nextcloud Sync Client is Nextcloud's own so...
Nextcloud
[!toc] Table of Contents Nextcloud is often used as a privacy-preserving alternative to Google...
Vera-Crypt-Encryption: Vera-Crypt-Encryption
[!toc] Table of Contents The software VeraCrypt is required for all methods mentioned here. Th...
Vera-Crypt-Installation: Vera-Crypt-Installation
[!toc] Table of Contents Downloading the installer file To install VeraCrypt, you must first d...
Cryptomator
In this article we will describe how to set up Cryptomator. We highly recommend Cryptomator if yo...
Countermeasures
Backups
[!toc] Table of Contents Much has been written about why backups are so important, and better ...
Wifi-Sd-Cards
[!toc] Table of Contents Photographers in particular often face the problem that their newly c...
Data-Hygiene
[!toc] Table of contents Whether it's network surveillance, digital forensics, or house search...
Communication-Encryption
[!toc] Table of Contents The encryption of all communication plays an essential role in our di...
Passwords
[!toc] Table of Contents Good passwords are one of the most important countermeasures against ...
Recommendations
Password-Manager
[!toc] Table of Contents [!info] Info {static} A password manager is an essential tool for en...
Messenger
[!toc] Table of Contents While emails are still regularly used for digital communication, mess...
Clear-Metadata
[!toc] Table of Contents [!tip] Tip {static} If you don't know exactly what metadata is, read...
Graphene-Os
[!toc] Table of Contents GrapheneOS is a mobile operating system based on Android. It is ofte...
File-Encyption
There are several ways to encrypt files or entire folders. However, in most cases, the same under...
Modules
Network-Role-Play
[!toc] Table of Contents This game aims to illustrate the process, but not the functionality, ...
Confiscation
[!toc] Table of Contents After seizures, there is often a lot of speculation about what inform...
Keepass-As-Group
[!toc] Table of Contents KeePassXC is not actually cloud software, which is one of the reasons...
Threats
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportation...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in whi...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associa...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to ...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder to...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you j...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, ar...
Radio-Cell-Interrogation
[!toc] Table of Contents To understand this chapter, it is necessary to understand the basic c...
Mobile-Communication
[!toc] Table of Contents First, some basic information about threats in the field of mobile co...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people ...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. Tw...
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is ...