@licstart The following is the entire license notice for the
JavaScript code in this page.
Copyright (C) 2018 Mason SRCT
The JavaScript code in this page is free software: you can
redistribute it and/or modify it under the terms of the GNU
General Public License (GNU GPL) as published by the Free Software
Foundation, either version 3 of the License, or (at your option)
any later version. The code is distributed WITHOUT ANY WARRANTY;
without even the implied warranty of MERCHANTABILITY or FITNESS
FOR A PARTICULAR PURPOSE. See the GNU GPL for more details.
As additional permission under GNU GPL version 3 section 7, you
may distribute non-source (e.g., minimized or compacted) forms of
that code without the copy of the GNU GPL normally required by
section 4, provided you include this license notice and a URL
through which recipients can access the Corresponding Source.
@licend The above is the entire license notice
for the JavaScript code in this page.
*/
</script>
<metaname="description"content="CryptoParty is an event in April of 2018 that focuses on the attendee's digital privacy and ability to protect their data.">
Learn how to protect your digital privacy at this workshop hosted by Mason Competitive Cyber and Mason SRCT. You'll learn how to ensure the integrity and privacy of your data from a wide variety of potential threats, from government actors to a friend you leave alone with your laptop. End the afternoon reassured your data will be far less likely to be spied on or stolen. We will be providing breakfast, lunch and snacks to everyone attending.
</p>
<p>
<strong>CryptoParty 2018</strong> is organized by Mason student organizations
<ahref="https://srct.gmu.edu/">Student-Run Computing and Technology</a> and <ahref="https://competitivecyber.club">Mason Competitive Cyber</a>, with
financial support from the <ahref="https://volgenau.gmu.edu/program/view/20490">Cybersecurity Engineering program</a> and <ahref="https://ece.gmu.edu/">ECE department</a>.
</p>
</div>
<divclass="col-md-6 slight-bump">
<p>
Keeping your data private and secure is an issue of concern for more than just engineering students. Students from all disciplinary backgrounds are encouraged to join, especially from degree programs like English, journalism, and government, but note you'll largely be on your own if you intend to participate in the CTF. We will open with demonstrations to show you why it's important to protect your digital privacy, go through a series of workshops, <strike>a keynote</strike>, and discussions. Swing by!<br/>
<b>CryptoParty 2018 will be hosted March 3rd in HUB Rooms 3-4-5. <b>Please bring a laptop</b>. Confused about directions on campus? <ahref="/where.html">Click here.</a></b>
</p>
</div>
</div>
<divclass="row">
<divclass="col-md-2 slight-bump"></div>
<divclass="col-md-8 slight-bump">
<h3>Keynote</h3>
Unfortunately due to the rescheduling we had to cancel the keynote!
<!-- We're excited to announce our keynote will be provided by Aliya Sternstein, a freelance journalist who's written pieces such as <b><a href="https://arstechnica.com/tech-policy/2017/04/fbi-allays-some-critics-with-first-use-of-new-mass-hacking-warrant/">FBI allays some critics with first use of new mass-hacking warrant (Ars Technica)</a></b> and <b><a href="https://www.thedailybeast.com/airlines-are-giving-your-face-to-the-government">Airlines Are Giving Your Face to Homeland Security (Daily Beast)</a></b>. -->
The CTF will be rather advanced to encourage more beginning participants to take part in the actual workshop. Presently, we have funding for all of our prizes. Prizes include Yubikeys and (pending further funding) a full Raspberry Pi kit. We reserve the right to pause the CTF and halt any competition during the speaker. <b>We are limiting registration for this now, so please email masoncc+cryptoparty@gmu.edu if you want to participate in the CTF so we can get a more accurate depiction of it.</b>
</p>
</div>
<divclass="col-md-6 slight-bump">
<p>
We encourage those of you who are still starting out to participate in the workshop unless you've done a CTF before. It'll be jeopardy style, with a focus on challenges generally categorized as cryptography, but as we want to host a challenging one and we can't source too many cryptography experts while maintaining the overall quality of the event, it will include other conventional CTF categories.
</p>
</div>
</div>
<divclass="row">
<divclass="col-md-2 slight-bump"></div>
<divclass="col-md-8 slight-bump">
<h3>Prizes</h3>
<ul>
<li>First Place: Raspberry Pi CanaKit: <ahref="https://www.canakit.com/raspberry-pi-3-starter-kit.html">Retail $70</a></li>
<li>Top Three after that (2nd-4th): Yubikey 4 Series: <ahref="https://www.yubico.com/product/yubikey-4-series/">Retail $40</a></li>
<li>Swag and giveaways (like cheaper $18 model Yubikeys) will dissiminate it at our discretion, some at random and some not at random.</li>
<td>Those who get in sooner can socialize, as we all know nerds do</td>
</tr>
<tr>
<td>10:30am - 11:15am</td>
<td><strong>Welcome and Opening Remarks</strong></td>
<td>We'll be welcoming members and kicking off the event</td>
</tr>
<tr>
<td>11:15am - 11:30am</td>
<td><strong>Gauging People's Understanding, Branching off for CTF</strong></td>
<td>Those who are more advanced may find themselves interested in GMU CryptoParty CTF</td>
</tr>
<tr>
<td>11:30am - 12:15pm</td>
<td><strong>Historical Examples of Cryptography</strong></td>
<td>Ciphers, One Time Pad, XOR, and More</td>
</tr>
<tr>
<td>12:15pm - 1:30pm</td>
<td><strong>Lunch Break</strong></td>
<td></td>
</tr>
<tr>
<td>1:30pm - 2:15pm</td>
<td><strong>Leaked Password? No Problem! 2FA Introduction</strong></td>
<td>*Please do not tweet your passwords after this lesson</td>
</tr>
<tr>
<td>2:15pm - 3:15pm</td>
<td><strong>Computers Aren't THAT Smart: Asymmetric vs Symmetric, Prime Factors, and more</strong></td>
<td>How computers can't break crypto done by similar computers</td>
</tr>
<tr>
<td>3:15pm - 3:30pm</td>
<td><strong>Using Keybase.io and more on secure messaging</strong></td>
<td>Using Keybase.io as a conduit to using PGP and secure messaging, ensuring even your sweetest memes aren't intercepted</td>
</tr>
<tr>
<td>3:30pm - 4:00pm</td>
<td><strong>Understanding Metadata</strong></td>
<td>We'll go over the different kinds of metadata associated with each person's identity.</td>
</tr>
<tr>
<td>4:00pm - 4:30pm</td>
<td><strong>Tunneling your data with Virtual Private Network Connections</strong></td>
<td>It's like when kids run through <ahref="https://truimg.toysrus.com/product/images/playhut-6-foot-play-tunnel--866D8544.zoom.jpg?fit=inside|485:485">these</a>, but for your passwords.</td>
</tr>
<tr>
<td>4:30pm - 5:00pm</td>
<td><strong>Browsing Privately with Tor</strong></td>
<td>Keeping your web browsing safe and secure</td>
</tr>
<tr>
<td>5:00pm - 5:30pm</td>
<td><strong>Goodbyes and CTF Conclusion</strong></td>
<td><i>Don't Cry Because It's Over, Smile Because It Happened</i></td>
</tr>
<tr>
</tr>
</tbody>
</table>
</div>
</div>
<divclass="row">
<divclass="col-md-12">
<hr/>
<legendclass="text-center"><aname="PeopleOrgs"id='PeopleOrgs'href="#PeopleOrgs"><h2>People and Organizations</h2></a></legend>