Search Results: different threat models in the same room
Locking Down Social Media
Using social media safely and comfortably is an ongoing challenge for many learners. In this lesson, we’ll go over some basic concepts and...
Different Types of Encryption
Develop your understanding of how encryption keeps your and your learners’ messages unreadable and protected. Learn to differentiate between the...
Thinking About Different Devices and Operating Systems
Learn to be open-minded about the devices and operating systems your learners use. Expand your framework to include users with different...
A Word on Touching Other People’s Devices: Don’t.
Hands off! Give people room to learn and help participants feel more comfortable with their own devices.
Encouraging Ongoing Learning and Engagement
People learn at different paces. Explore how to help each person advance in how they approach digital security.
The Harm Reduction Approach
Navigate the complex process of teaching your learners how to avoid risky security practices, while providing a safe learning environment. Harm...
When You Are Out of Scope
Find out when to say “I don’t know” in order to reduce harm, limit misinformation, and help learners develop their intuitions. Discover where...
The Cloud is Just Someone Else’s Computer
We asked trainers what concepts were “aha moments for them. Here’s one such concept.
"The cloud is just someone else’s...
Fear is the Mind Killer: Rethinking Demos
Explore how insecurity demonstrations can be used to destroy trust between learners and trainers, and can even harm the training by making...
Am I the Right Person?
Figure out if you’re positioned to lead a training in the community you’d like to help. Evaluate your preparedness: set you and your learners up...
Browser Extensions to make you safer: HTTPS Everywhere and Privacy Badger
Browsing the web can be tricky: avoiding unsecured HTTP sites and avoiding the data collection of trackers can be a challenge. That’s where two...
Two-Factor Authentication
Two-factor authentication (also called “2FA”) is one of the simplest things users can do to protect their accounts. Teaching 2FA can sometimes...
Software Updates and Why They're Important
“Keep your software updated!” is the closest thing we have to security advice that will work for everyone. But the reasoning behind...