Tech Learning Collective

Technology education for radical organizers and revolutionary communities.

  • May 20, 2020 3:30 PM (-0400) May 20, 2020 5:00 PM
  • Remote
  • Status: CONFIRMED

Tickets are no longer available for this event.

View upcoming events or subscribe to our events calendar to make sure you catch the next one.

Event description

You don’t need to have your doctorate in theoretical mathematics to understand crypto enough to use it safely, but you do need to use it safely to be secure! Come learn the magic behind the math in this cryptography primer for those of us who are not “number people.” Using simplified examples and hands-on demonstrations, this workshop (finally!) offers a practical, accessible introduction to the foundations of modern cryptographic security protocols such as RSA public-key cryptography, stream and block ciphers, digital signatures, one-way hash functions, Hash-based Message Authentication Codes (HMACs), and more.

Workshop Description

Every time you use a modern computer, you invoke numerous simple mathematical functions that make it possible to do things like logging in to Web sites safely or “locking” (encrypting) your secret documents behind passwords. At their root, these functions, called cryptographic primitives, are not that much more complicated than simple addition or division. But when used in concert with the massive storage capacities and processing speeds of our modern electronic devices, they serve as the bedrock atop which every provably secure system works, from password vaults to Virtual Private Networks (VPNs) to BitCoin and beyond.

Today, everyone has full access to bulletproof “military grade encryption” for free, even if they don’t realize it. Signal Private Messenger’s “Safety Numbers?” Those are cryptographic hash functions! One-time passwords generated by apps like Google Authenticator or Authy? They use nonces! The Tor anonymity network? That’s a mixnet! The padlock icon in the address bar of your Web browser? Block ciphers (and public-key cryptography, and digital signatures, oh my)!

Knowledge of cryptography was deemed so dangerous during the Cold War that ever since the end of World War II the United States and its military allies attempted to regulate access to these crypto powers by classifying them as “munitions” (i.e., mathematical weapons, literally) and criminalizing their sale or export. But as the Internet gained widespread commercial adoption and more people became familiar with the underlying math, the government largely relented. It eventually lost what is now retroactively known as the “Crypto Wars” in the 1990’s.

In this workshop, you’ll learn the kind of math that governments tried to keep secret for decades, even if you’re “not a math person.” You’ll see hash functions in practice, learn why longer “keys” are stronger by understanding how RSA secrets are generated, practice developing your own simple ciphers, and start combining primitives to create security protocols that satisfy multiple requirements like confidentiality (privacy), integrity-protection (authenticity), and more. By the end of this workshop, the dizzying vocabulary crytographers use will be well within your reach, as will the ability to understand any new “encryption” product on the market.

As this is a remote/online-only event, there is no physical class space, but attendance is still limited to 15 students, so purchase your ticket now to reserve your spot.

To participate in our webinars, you will need access to a modern Web browser such as an up-to-date copy of Mozilla Firefox or Google Chrome. You will also need a reliable Internet connection. We recommend disabling Wi-Fi and plugging your computer in to a hard-wired Ethernet network cable for the duration of the webinar, if possible.

If you would like to share your video screen or appear on camera, you will need to have and activate your own camera, such as the one built-in to many modern laptops. Similarly, to speak with the rest of the webinar participants, you will need a microphone. If you do choose to activate your microphone, we ask that you please plug in headphones/ear buds or use a headset in order to help reduce audio feedback loops that can degrade the webinar experience for other participants.

Please refer to our workshops and webinars FAQ for additional tips and advice before you join the video conference.

As with all Tech Learning Collective events, racism, queerphobia, transphobia, sexism, “brogrammer,” “manarchist,” or any kind of similarly awful behavior will result in immediate removal from class without a refund. Please refer to our lightweight social rules for details on our strictly enforced no-tolerance policy against bigotry of any kind.

About Tech Learning Collective

Tech Learning Collective is an apprenticeship-based technology school that trains politically self-motivated individuals in the arts of hypermedia, Information Technology, and radical political practice. We offer unparalleled free, by-donation, and low-cost computer classes on topics ranging from fundamental computer literacy to the same offensive computer hacking techniques used by national intelligence agencies and military powers (cyber armies). For more information and to enroll, visit TechLearningCollective.com.

Performances by

Presented by