If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
As a result of the Snowden leaks, we are learning more and more about the capabilities of potential adversaries such as the NSA, GCHQ, and agencies within China, Russia, and Israel with every passing day. With each new revelation, there is greater uncertainty about privacy and security best practices, especially if your threat model includes a state-level adversary.
This talk will discuss the following points:
What resources already exist?
How should best practices change in light of the Snowden leaks?
What makes a good security/privacy resource?
How did the Electronic Frontier Foundation confront these questions while rewriting their Internet privacy guide?