IT-Sicherheit (ESC-IT)
Willkommen im WIki von ESC-IT :)
ESC-IT (gesprochen escape it oder escape IT) ist ein Kollektiv welches Inhalte für IT-Sicherheitstrainings für Aktivist*innen erstellt. Zielgruppe sind Aktivist*innen und Trainer*innen im Kontext des politischen Aktivismus.
Zur Aktualität und Qualität des Inhalts:
"Auch wir wissen natürlich nicht alles. Um Fehler in unserem Material zu vermeiden, gehen alle Inhalte vor der Veröffentlichung durch einen Review-Prozess. Für die Veröffentlichung muss mindestens eine zweite Person zustimmen.
Dennoch können Fehler passieren. Falls euch etwas auffällt, freuen wir uns über Hinweise. Am besten erstellst du hierfür einen Issue in unserem git-Repository oder schreibst uns eine Mail."
Dieses Wiki wird hier automatisch durch einen Bot eingebunden und aktuell gehalten.
Es kann nur durch den oben beschriebenen Prozess im Git-Repo bearbeitet werden.
Instructions
Backups
[!toc] Table of Contents In the article on backups in the countermeasures section, we descri...
Vera-Crypt-Encryption
[!toc] Table of Contents The software VeraCrypt is required for all methods mentioned here. T...
Vera-Crypt-Installation
[!toc] Table of Contents Downloading the installer file To install VeraCrypt, you must first ...
Auto-Reboot
[!toc] Table of Contents Because all encrypted devices store their encryption keys in their R...
Nextcloud-App-Passwords
[!toc] Table of Contents Nextcloud allows you to create app passwords. This allows you to ass...
Diceware
[!toc] Table of Contents Diceware is a method for generating passphrases/passwords using dice...
Signal
[!toc] Table of Contents Credit: The article is a translation of the LG Wiki Signal section. ...
System-Updates
[!toc] Table of Contents One of the first answers to questions about IT security is always: I...
Graphene-Os
[!toc] Table of Contents Recommended Apps Install Accrescend Download the Accrescend App Stor...
Keepassxc
[!toc] Table of Contents [!info] Getting Started {static} The official English-language Kee...
Nextcloud-Webdav
[!toc] Table of Contents Nextcloud Sync Client The Nextcloud Sync Client is Nextcloud's own s...
Nextcloud
[!toc] Table of Contents Nextcloud is often used as a privacy-preserving alternative to Googl...
Countermeasures
Backups
[!toc] Table of Contents Much has been written about why backups are so important, and better...
Wifi-Sd-Cards
[!toc] Table of Contents Photographers in particular often face the problem that their newly ...
Data-Hygiene
[!toc] Table of contents Whether it's network surveillance, digital forensics, or house searc...
Communication-Encryption
[!toc] Table of Contents The encryption of all communication plays an essential role in our d...
Passwords
[!toc] Table of Contents Good passwords are one of the most important countermeasures against...
Recommendations
Password-Manager
[!toc] Table of Contents [!info] Info {static} A password manager is an essential tool for ...
Messenger
[!toc] Table of Contents While emails are still regularly used for digital communication, mes...
Clear-Metadata
[!toc] Table of Contents [!tip] Tip {static} If you don't know exactly what metadata is, re...
Graphene-Os
[!toc] Table of Contents GrapheneOS is a mobile operating system based on Android. It is ofte...
Modules
Network-Role-Play
[!toc] Table of Contents This game aims to illustrate the process, but not the functionality,...
Confiscation
[!toc] Table of Contents After seizures, there is often a lot of speculation about what infor...
Keepass-As-Group
[!toc] Table of Contents KeePassXC is not actually cloud software, which is one of the reason...
Threats
Public-Chargers
[!toc] Table of Contents Public “chargers” can be found, for example, in public transportatio...
Forensics
[!toc] Table of Contents Introduction Forensics is a collective term for fields of work in wh...
Phishing
[!toc] Table of Contents Phishing via email or text message is generally more commonly associ...
Silent-Sms
[!toc] Table of Contents SMS is the protocol by which standard text messages are delivered to...
Shoulder-Surfing
[!toc] Table of Contents Shoulder surfing is when someone secretly looks over your shoulder t...
Meta-Data
[!toc] Table of Contents Here we describe what metadata is and where it can be found. If you ...
Data-Dogs
[!toc] Table of Contents [!info] TL;DR {static} Data dogs, similar to drug detection dogs, ...
Radio-Cell-Interrogation
[!toc] Table of Contents To understand this chapter, it is necessary to understand the basic ...
Mobile-Communication
[!toc] Table of Contents First, some basic information about threats in the field of mobile c...
Network-Surveillance
[!toc] Table of Contents Monitoring of traffic data This is usually what is meant when people...
Logger
[!toc] Table of Contents Loggers are devices that can be used to ‘log’ or record something. T...
Imsi-Catcher
[!toc] Table of Contents An IMSI catcher, also known as Cell-Site Simulator or "Stingray", is...